07-18-2011
Sorry. How can it be checked out?
9 More Discussions You Might Find Interesting
1. Cybersecurity
Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall.
Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW?
I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies
2. Cybersecurity
Would it be possible to restrict access to internet pages in the following way?
A machine:
IP = 128.1.17.123
Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable.
B machine:
IP = 128.1.17.146
Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies
3. IP Networking
ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies
4. UNIX for Advanced & Expert Users
I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies
5. Cybersecurity
hi everyone
I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables.
anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies
6. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies
7. AIX
:b:Hi,,
How do configure firewall in aix.. similar to linux iptable.
Rgards,
k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies
8. SuSE
Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies
9. Cybersecurity
Hey Guys,
I am looking for a good firewall software to implement in medium/large office, with at least 150 users.
I was hopping you guys could help me on this one.
Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
LEARN ABOUT BSD
rcsfreeze
RCSFREEZE(1L) RCSFREEZE(1L)
NAME
rcsfreeze - freeze a configuration of sources checked in under RCS
SYNOPSIS
rcsfreeze [symbolic revision name]
DESCRIPTION
The rcsfreeze command has the purpose of assigning a symbolic revision number to a set of RCS files, which form a valid configuration.
The idea is to run rcsfreeze each time a new version is checked in. A unique symbolic revision number (C_number, where number is increased
each time rcsfreeze is run) is then assigned to the most recent revision of each RCS file of the main trunk.
If the command is invoked with an argument, then this argument is used as the symbolic name to freeze a configuration. The unique identi-
fier is still generated and is listed in the log file but it will not appear as part of the symbolic revision name in the actual RCS files.
A log message is requested from the user which is saved for future references.
The shell script works only on all RCS files at one time. It is important that all changed files are checked in (there are no precautions
against any error in this respect). Run rcsclean(1L) first and see whether any sources remain in the current directory.
FILES
[RCS/]rcsfreeze.version for the version number
[RCS/]rscfreeze.log for the log messages, most recent log message first.
AUTHOR
Stephan v. Bechtolsheim
SEE ALSO
rcs(1L), rlog(1L), rcsclean(1L)
BUGS
The program does not check whether there are any sources checked out and modified.
Purdue University RCSFREEZE(1L)