09-26-2011
Sorry, we do not provide info here that can be used to bypass your companies security polices.
7 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am tarring up a directory and then deleting the contents. I get a message that the file changed as tar was reading it, then my script fails on an error.
tar: /workdir/SRD.out.20080216: file changed as we read it
tar: Error exit delayed from previous errors
tar command failed, nothing... (1 Reply)
Discussion started by: prismtx
1 Replies
2. AIX
Hi all,
I am currently trying to tell /bin/ksh to behave like a login shell. I am invoking it from an interactive shell. In the documentation is stated, that calling it with
exec ksh -
it should behave like a login shell, work 1st on /etc/profile, ~/.profile and so on.
I tried that with... (0 Replies)
Discussion started by: zaxxon
0 Replies
3. Shell Programming and Scripting
What are some of the ways to get valid who data?
There's who and w but I have cases where we login as mailadmin or dbadmin and I want to trace those logins back as far as possible. We have mixed access to the env. Some use VPN client, some use ssh to a single host and then login to other... (4 Replies)
Discussion started by: star_man
4 Replies
4. AIX
Please help me in creating the script in AIX.
requirement is;
The new component's main function is to extract the data from DB2 tables and company's firewall directly.
The component function needs to check the timestamp in the DB2 tables ((CREDAT and CRETIM) with the requested timestamp and... (1 Reply)
Discussion started by: priyanka3006
1 Replies
5. UNIX for Advanced & Expert Users
So my workplace uses websense to block certain websites. I read while researching firesheep, that you can somehow bypass that by creating a proxy, and thus:
#1 protect yourself from people using firesheep (if using unsecure hot-spot)
and
#2 or visit un-approved websites at work.
I... (1 Reply)
Discussion started by: zixzix01
1 Replies
6. Shell Programming and Scripting
What I want to do is not unique, except that our environment has a twist.
I want to ssh to a remote server and issue a sudo command to run a script. This isn't working, but you'll get the gist.# ssh remotehost sudo -i -u oracle script.bashThe sudo to oracle is fine. The script.bash sets up the... (4 Replies)
Discussion started by: JustaDude
4 Replies
7. AIX
Hello, I find out that there is a way from putty to pass a command to your shell when trying to log in to a server and bypass .profile. Actually you can do this if you open a bash shell. The command to bypass .profile is the following: ssh -t hostname "bash --noprofile" Is there a way to... (32 Replies)
Discussion started by: omonoiatis9
32 Replies
LEARN ABOUT DEBIAN
gtk2::recentinfo
Gtk2::RecentInfo(3pm) User Contributed Perl Documentation Gtk2::RecentInfo(3pm)
NAME
Gtk2::RecentInfo - wrapper for GtkRecentInfo
HIERARCHY
Glib::Boxed
+----Gtk2::RecentInfo
METHODS
timestamp = $info->get_added;
timestamp = $info->get_modified;
timestamp = $info->get_visited;
cut
integer = $info->get_age
(exec, count, timestamp) = $info->get_application_info ($app_name)
o $app_name (string)
(applications) = $info->get_applications
string = $info->get_description
string = $info->get_display_name
boolean = $info->exists
(groups) = $info->get_groups
boolean = $info->has_application ($app_name)
o $app_name (string)
boolean = $info->has_group ($group_name)
o $group_name (string)
pixbuf = $info->get_icon ($size)
o $size (integer)
boolean = $info->is_local
string = $info->last_application
boolean = $info->match ($other_info)
o $other_info (Gtk2::RecentInfo)
string = $info->get_mime_type
unix timestamp = $info->get_modified
boolean = $info->get_private_hint
string = $info->get_short_name
string = $info->get_uri_display
string = $info->get_uri
unix timestamp = $info->get_visited
SEE ALSO
Gtk2, Glib::Boxed
COPYRIGHT
Copyright (C) 2003-2011 by the gtk2-perl team.
This software is licensed under the LGPL. See Gtk2 for a full notice.
perl v5.14.2 2012-05-27 Gtk2::RecentInfo(3pm)