03-09-2012
What OS? (please show output of uname -a)
9 More Discussions You Might Find Interesting
1. Email Antispam Techniques and Email Filtering
Now this is a bit tricky, but works great if you can decide which Top Level Domains or TLDs you want to receive mail We are getting so much spam from countries we never receive useful mail, I've been experimenting with blocking entire TLDs using sendmail access_db as an antispam technique.
... (0 Replies)
Discussion started by: Neo
0 Replies
2. Web Development
Hi everybody,
Is it possible to have a URL link i.e. <a href=""></a>, which sends out two requests to a site?
As an example, I want want to combine these two links. The first link loads files. The second link searches these files. But I want just one link, where went a user clicks on it,... (3 Replies)
Discussion started by: z1dane
3 Replies
3. IP Networking
say i have an apache server configured for ssl/non ssl virtual hosts and a proxy configured as follows (see squid.conf)
the ssl on each name based virtual host is configured on its own port (only 7 of the domains need this the rest are just media and other insignificant bits of data but domains... (1 Reply)
Discussion started by: hopper195
1 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I need to install a program on my Centos 5.3 server that will block unauthorized ssh/ftp access attempts. The two features I require is that I should be able to configure the program to block the IP of the intruder after a a certain amount of access attempts and that it should display a... (3 Replies)
Discussion started by: mojoman
3 Replies
5. HP-UX
Hi All
I have a blade BL860c running on a C7000 chassis, in which is connected to a NetApp, so lately I am having I/O issues, and dmesg as well as syslog.log is reporting the following:
/dev/vg01/lvol2 file system file data error in dev/block 0/55892768
Page I/O error occurred while paging... (2 Replies)
Discussion started by: fretagi
2 Replies
6. Post Here to Contact Site Administrators and Moderators
For some reason Google Chrome sees unix.com as dangerous and has start to block it. I need to select advanced and continue on own risk.
Can you make an effort to remove unix.com form the list of dangerous site from Google.
IE has not this problem. (5 Replies)
Discussion started by: Jotne
5 Replies
7. Programming
among the below socket programming api's, please let me know which are blocking and non-blocking.
socket
accept
bind
listen
write
read
close (2 Replies)
Discussion started by: VSSajjan
2 Replies
8. SCO
I would like to log requests to rshd on OSR 5.0.7, hopefully it is possible.
Requests are coming from client Windows PCs, it all works most of the time, but few PCs are not able to do it.
I am not sure where to start - do I tweak syslog.conf? Any pointers would be appreciated. (4 Replies)
Discussion started by: migurus
4 Replies
9. Shell Programming and Scripting
Hi,
I'm trying to write a script to determine the time gap between HTTP PUT and HTTP DELETE requests in the HTTP Servers access log.
Normally client will do HTTP PUT to push content e.g. file_1.txt and 21 seconds later it will do HTTP DELETE, but sometimes the time varies causing some issues... (3 Replies)
Discussion started by: Juha
3 Replies
LEARN ABOUT NETBSD
iscsi-target
ISCSI-TARGET(8) BSD System Manager's Manual ISCSI-TARGET(8)
NAME
iscsi-target -- service remote iSCSI requests
SYNOPSIS
iscsi-target [-46DV] [-b block length] [-f configuration file] [-p port number] [-s maximum number of sessions] [-t target name]
[-v verbose arg]
DESCRIPTION
iscsi-target is the server for iSCSI requests from iSCSI initiators. iscsi-target listens for discovery and login requests on the required
port, and responds to those requests appropriately.
Options and operands available for iscsi-target:
-4 iscsi-target will listen for IPv4 connections, and respond back using IPv4. This is the default address family.
-6 iscsi-target will listen for IPv6 connections, and respond back using IPv6.
-b blocksize
Specify the underlying block size for iSCSI storage which will be served. The possible sizes are: 512, 1024, 2048, and 4096 bytes,
with the default being 512 bytes.
-D When this option is specified, iscsi-target will not detach itself from the controlling tty, and will not become a daemon. This can
be useful for debugging purposes.
-f configfile
Use the named file as the configuration file. The default file can be found in /etc/iscsi/targets. See targets(5) for more informa-
tion.
-p port number
Use the port number provided as the argument as the port on which to listen for iSCSI service requests from initiators.
-s maximum number of sessions
Allow the maximum number of sessions to be initiated when connecting to the target.
-t filename
The target name (as it appears to the iSCSI initiator) can be specified using this flag.
-V iscsi-target will print the utility name and version number, and the address for bug reports, and then exit.
-v argument
The amount of information shown can be varied by using this command. Possible values of argument are net to show network-related
information, iscsi to show iSCSI protocol-related information, scsi to show SCSI protocol information, and all to show information
from all of the above arguments.
FILES
/etc/iscsi/targets the list of exported storage
/var/run/iscsi-target.pid the PID of the currently running iscsi-target
SEE ALSO
targets(5)
HISTORY
The iscsi-target utility first appeared in NetBSD 4.0.
BSD
May 27, 2006 BSD