01-12-2012
The .cshrc example is checking whether you are in background (and therefore with no terminal context) and avoiding executing subsequent commands which need a terminal.
The lines from ".login" are easy to look up.
This User Gave Thanks to methyl For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello again !
Thanks for response of my first question. there is my second quesiton why i have local.profile instead of .profile file ?
my all files in pwd shoes local. before any file.
is anybody can tell me about that ?
Thanks
Abid Malik (5 Replies)
Discussion started by: abidmalik
5 Replies
2. Shell Programming and Scripting
where are my .cshrc files ? (4 Replies)
Discussion started by: cubicle^dweller
4 Replies
3. UNIX for Advanced & Expert Users
Hi, My account is : abcd
I belong to a group: pqrs
Some thing straneg happened yesterday.
My .cshrc and .login got overwritten into pqrs's .cshrc and .login
I obviously did not explicitly overwrite pqrs's .cshrc.
Are there any reasons how this could have happened indirectly due to... (5 Replies)
Discussion started by: gjthomas
5 Replies
4. UNIX for Dummies Questions & Answers
All,
I had a request to delete filed under a directory that was 35 days old . And they asked me to scedule it in CRON . I have done that .
I have use find and delete with mtime to perfrom this task .
But my script is not deleting this .cshrc,.exrc,.login,.profile,.sh_history file... (1 Reply)
Discussion started by: arunkumar_mca
1 Replies
5. UNIX and Linux Applications
Dear experts ...
Please any one can describe the diffrence between this three
1) . cshrc
2) .profile
3) .login
cheers
syed (1 Reply)
Discussion started by: smuqtaderali
1 Replies
6. Shell Programming and Scripting
Hi..
i was just looking to know the diffrence between this three terms
1) .cshrc 2) .login 3) .profle but iam failed to findout the exact diffrent
Please can any one share the diffrence between this
regards
Syed (1 Reply)
Discussion started by: smuqtaderali
1 Replies
7. UNIX for Dummies Questions & Answers
i am new to awk scripting. i couldn't figure out how this awk script works can anyone explain?
#!/bin/awk -f
{
for( x=1; x<=NF; ++x) {
if( x == 3 ) {
continue
}
print x, $x
}
}
thank you and regards (1 Reply)
Discussion started by: phone_book
1 Replies
8. UNIX for Dummies Questions & Answers
I have gotten a gig to teach someone how to use a VPN client for a UNIX server on a MAC os. The problem is I have never used UNIX, dont mess with VPN's (my dad has a VPN that I have used a couple of times). I'm currently taking a crash course on UNIX but I was wondering if anyone could help me with... (0 Replies)
Discussion started by: psycopuppy
0 Replies
9. Shell Programming and Scripting
Hi,
I'm running a rdt (run dot tcl) command, and come accross this line:
alias abc 'set ARGS =(\!*); source home123/abc/$ARGS/setup'
What does the command exactly do?
Please help. (6 Replies)
Discussion started by: mar85
6 Replies
10. OS X (Apple)
OSX 10.12.3, default bash terminal.
Consider this code and note it is calling 'sh' inside the code...
#!/bin/sh
echo '1\n2\n2\n3\n5' > /tmp/text
hexdump -C /tmp/text
/bin/echo '1\n2\n3\n4\n5' > /tmp/text
hexdump -C /tmp/text
Now view the interactive mode below, note the underlying shell is... (6 Replies)
Discussion started by: wisecracker
6 Replies
LEARN ABOUT HPUX
d_passwd
dialups(4) Kernel Interfaces Manual dialups(4)
NAME
dialups, d_passwd - dialup security control
DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the
name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a
line found in dialup security is invoked. Anything after a space or tab is ignored.
When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro-
gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons.
The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users
logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null
password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from
FILES
dial-in tty lines
passwords
SEE ALSO
login(1), passwd(4).
dialups(4)