Do you mean name completion?
That will depend of your configuration and environment, typically with ksh, you would have in your .profile:
To see if its something of the sort you were thinking about, just type:
And see if it works...
(Here its using Esc key twice...)
Hi all...
In my Unix system a program exists called "daemon2" which is responsible to enqueue program executions. For example, if I want to make the system to enqueue lpr executions for certain users, I call daemon2 with lpr as the parameter.
Is there an equivalent in Linux?
Thanks
Jaime (0 Replies)
Hi all,
I am preparing for a worst case scenario. Say i have a production server A, should A fails ( for whatever reason), i want another server B to take over. How can i move everything from A to B? Assuming i have regular backup of A.
I've searched in the forums, and briefly came across... (4 Replies)
In IBM Mainframe they have something called ACF2 rule which is essentially used to control the dataset access. It is kind of a list-based access control for mainframe datasets.
Is there anything equivalent to ACF2 available in Unix ?
Thanks
Rabi (1 Reply)
I moved to a Linux system from Windows a few months ago. Most of the programs I had been using were already native to Linux (Firefox, the GIMP, Pari, etc.) and most others I found a close enough program (Crimson Editor -> gedit, Visual Studio -> KDevelop, Primo -> Morain's ECPP).
Now I'm down... (1 Reply)
Hi Guys,
I am used to configuring DHCP on Solaris and foreach subnet added I place a corresponding entry in /etc/netmasks. I am now looking at configuring DHCP on linux, is there an equivalnet entry required somewhere or is this not needed in linux
Thanks (3 Replies)
Hi,
I need to mount a replicated nfs4 export on a number of AIX and Redhat hosts. To get the failover on the clients working smoothly, I need to change certain values on the AIX boxes like nfs_v4_fail_over_timeout, timeo and retrans values. Since I have no clue about Linux, I am not quite sure... (1 Reply)
I have a folder called "log" which has a few sub-folders say "fda" "fd7" "fdd" "fd6 .... "
I wish to fire the below command inside each subfolder starting with the folder with the latest time stamp.
grep "$greptime.*exit" Prod.$(hostname).log | grep $fdrdate_new
If the seach did not yield... (3 Replies)
We have asked UNIX.com users over the years what is their favorite editor and why. Here is the top three answers.
Here is a new YT video on this question:
What Editor Does Everyone Use?
https://youtu.be/gqE8RTZZt9g
Of course, vi was the overwhelming favorite.
Credits:
1080 HD... (3 Replies)
Discussion started by: Neo
3 Replies
LEARN ABOUT SUNOS
pfcsh
pfexec(1) User Commands pfexec(1)NAME
pfexec, pfsh, pfcsh, pfksh - execute a command in a profile
SYNOPSIS
/usr/bin/pfexec command
/usr/bin/pfexec -P privspec command [ arg ...]
/usr/bin/pfsh [ options ] [ argument ...]
/usr/bin/pfcsh [ options ] [ argument ...]
/usr/bin/pfksh [ options ] [ argument ...]
DESCRIPTION
The pfexec program is used to execute commands with the attributes specified by the user's profiles in the exec_attr(4) database. It is
invoked by the profile shells, pfsh, pfcsh, and pfksh which are linked to the Bourne shell, C shell, and Korn shell, respectively.
Profiles are searched in the order specified in the user's entry in the user_attr(4) database. If the same command appears in more than one
profile, the profile shell uses the first matching entry.
The second form, pfexec -P privspec, allows a user to obtain the additional privileges awarded to the user's profiles in prof_attr(4). The
privileges specification on the commands line is parsed using priv_str_to_set(3C). The resulting privileges are intersected with the union
of the privileges specified using the "privs" keyword in prof_attr(4) for all the user's profiles and added to the inheritable set before
executing the command.
USAGE
pfexec is used to execute commands with predefined process attributes, such as specific user or group IDs.
Refer to the sh(1), csh(1), and ksh(1) man pages for complete usage descriptions of the profile shells.
EXAMPLES
Example 1: Obtaining additional user privileges
example% pfexec -P all chown user file
This command runs chown user file with all privileges assigned to the current user, not necessarily all privileges.
EXIT STATUS
The following exit values are returned:
0 Successful completion.
1 An error occurred.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO csh(1), ksh(1), profiles(1), sh(1), exec_attr(4), prof_attr(4), user_attr(4), attributes(5)SunOS 5.10 3 Mar 2003 pfexec(1)