09-01-2011
hmm...well, you gotta take a better look at the source code or the script of that appcmd file. It does not appear to be a permission or PATH variable problem. Would you mind posting the script on here?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I just set up an ftp server with Red Hat 5.2. I am doing the work, I'm baby stepping, but it seems like every step I get stuck. Currently, I'm trying to set up a crontab job, but I'm getting the following message: /bin/sh: /usr/bin/vi: No such file or directory. I see that vi exists in /bin/vi,... (3 Replies)
Discussion started by: kwalter
3 Replies
2. Shell Programming and Scripting
Hello,
I was wondering if I have something in my bin dir and I want to access it from another directory to make a change how can I go about it. Thank you. (7 Replies)
Discussion started by: gingburg
7 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I have a problem I don't understand with fuser.
I launch a simple shell script mysleep.sh:
I launch the command fuser -fu mysleep.sh but fuser doesn't return anything excepted:
mysleep:
Then I modify my script switching from #!/bin/sh to #!/bin/ksh
I launch the command fuser -fu... (4 Replies)
Discussion started by: Peuj
4 Replies
4. AIX
Is there any way I can restrict a user to 1 directory when logging in but give the access to another directory? For example restrict the user to /home/user at login but also allow then to access /opt/data/user. (1 Reply)
Discussion started by: daveisme
1 Replies
5. Shell Programming and Scripting
I have multiple .prm files that contain user ID's. The .prm files reside in multiple directories that allow users access to different areas of the system. (see below)
current directory /apps/fourgen/accounting/menu
drwxrwxrwx 16 phil infotech 512 Sep 7 2002 apmenu... (8 Replies)
Discussion started by: jamba1
8 Replies
6. OS X (Apple)
Q1. I understand that /usr/local/bin means I can install/uninstall stuff in here and have any chance of messing up my original system files or effecting any other users. I created this directory myself.
But what about the directory I didn't create, namely /Users/m/bin? How is that directory... (1 Reply)
Discussion started by: michellepace
1 Replies
7. UNIX for Advanced & Expert Users
Hi frds,
I have got a script restart.sh that kills and restarts a process. This scripts runs under a user called USER1 who is a normal user. Now my requirement is that i got other user named USER2 who should be able to run that script as USER1 as we dont want to share the password of user1 we... (2 Replies)
Discussion started by: phanidhar6039
2 Replies
8. Shell Programming and Scripting
there are two directories A and B
if cmd in in "A/user/bin A/bin A/user/sbin" but not "B/user/bin B/bin B/user/sbin" directory print them (1 Reply)
Discussion started by: yanglei_fage
1 Replies
9. AIX
Hi,
I am planning to install a version of Informatica on my AIX box. It requires a specific java build in pap6470_27sr2-20141101_01(SR2).
The current link for IBM 64-bit SDK for AIX®, JavaTM Technology Edition, Version 7 Release 1 has a more recent version in j7r164redist.7.1.0.75.bin.
Is... (4 Replies)
Discussion started by: meetpraveens
4 Replies
10. Shell Programming and Scripting
Some question about the usage of shell scripts:
1.) Are the commands of the base shell scripts a subset of bash commands?
2.) Assume I got a long, long script WITHOUT the first line.
How can I find out if the script was originally designed für "sh" or "bash"?
3.) How can I check a given... (3 Replies)
Discussion started by: pstein
3 Replies
LEARN ABOUT CENTOS
login.access
LOGIN.ACCESS(5) BSD File Formats Manual LOGIN.ACCESS(5)
NAME
login.access -- login access control table
DESCRIPTION
The login.access file specifies on which ttys or from which hosts certain users are allowed to login.
At login, the /etc/login.access file is checked for the first entry that matches a specific user/host or user/tty combination. That entry can
either allow or deny login access to that user.
Each entry have three fields separated by colon:
o The first field indicates the permission given if the entry matches. It can be either ``+'' (allow access) or ``-'' (deny access) .
o The second field is a comma separated list of users or groups for which the current entry applies. NIS netgroups can used (if configured)
if preceeded by @. The magic string ALL matches all users. A group will match if the user is a member of that group, or it is the user's
primary group.
o The third field is a list of ttys, or network names. A network name can be either a hostname, a domain (indicated by a starting period),
or a netgroup. As with the user list, ALL matches anything. LOCAL matches a string not containing a period.
If the string EXCEPT is found in either the user or from list, the rest of the list are exceptions to the list before EXCEPT.
BUGS
If there's a user and a group with the same name, there is no way to make the group match if the user also matches.
SEE ALSO
login(1)
AUTHORS
The login_access() function was written by Wietse Venema. This manual page was written for Heimdal.
HEIMDAL
March 21, 2003 HEIMDAL