08-30-2012
9 More Discussions You Might Find Interesting
1. Linux
Hey, i was wondering if anybody knew of a good VPN that is compatible with nat? If a VPN will not work with NAT could it work with PAT? Right now i'm using RH9. I wanted to use IPsec but i don't think that is compatiable with nat or pat. Please correct me if i'm wrong.
Thanks,
Byblyk. (0 Replies)
Discussion started by: byblyk
0 Replies
2. Linux Benchmarks
Dear Frnds
We are having WHM Cpanel in which many website are their , one of our customer want to install Clientexec software which requires GD2.0.28(compatible) library which is installed.
The problem is libpng version which is incompatible with the GD library .
Please kindly... (0 Replies)
Discussion started by: naik_mit
0 Replies
3. IP Networking
Arright, here's what I'm trying to do. I want to dig up currently active IP addresses on my subnet, and my present strategy is to ping every address until I find active ones, then ping them more often to verify their status. Next, I want to find the names of the computers associated with those... (1 Reply)
Discussion started by: sladuuch
1 Replies
4. UNIX for Dummies Questions & Answers
Dear friends,
I m new to Unix, can anybody please guide me on how to zip and password protect a normal text (or any file) in unix prompt? (1 Reply)
Discussion started by: topgear1000cc
1 Replies
5. IP Networking
Hi all,
One of my computers (an iMac) was recently stolen, but I have been able to connect to it over the internet through Apple's 'back to my mac' feature. In order for the police to find these people they need to know the IP address of the stolen computer.
I suspect that I will have find the... (6 Replies)
Discussion started by: RJFoulston
6 Replies
6. Red Hat
Hi, there, How to know location of a computer where its IP Address and Computer name is known? tx (5 Replies)
Discussion started by: budiantho_indra
5 Replies
7. Shell Programming and Scripting
This is for PHP preg_match code - which is PCRE therefore looking for a perl compatible suggestion
I have this line returned I want to match and return..
I want to match the two instances of string ending 'ABCXYZ' into an array.
And on second element (ie. RootABCXYZ) only return the word... (4 Replies)
Discussion started by: deadyetagain
4 Replies
8. UNIX for Dummies Questions & Answers
I have ubuntu 32 bit installed on VMware with win 7 as host operating system. I am a newbie to Linux shell mode and vi editor. When ever I open the vi editor and select insert mode I don't see the insert mode being highlighted at the bottom of the screen as it is supposed to be. Only when I enable... (4 Replies)
Discussion started by: sabsac
4 Replies
9. Shell Programming and Scripting
the following command works beautifully. it basically grabs the content of a file from First to End, then excludes any lines containing specific patterns.
awk '/^First/,/^End$/ {if (!/#\/bin\/sh|not.*commonly|#/) print}' datafile.
i never had any issues with the command until I ran it on a... (5 Replies)
Discussion started by: SkySmart
5 Replies
xbill(6) Games Manual xbill(6)
NAME
xbill - save your computers from Wingdows [TM] virus
SYNOPSIS
xbill [-l level] [--gui gui] [--sizesize] [-v] [-h]
DESCRIPTION
Ever get the feeling that nothing is going right? You're a sysadmin, and someone's trying to destroy your computers. The little people
running around the screen are trying to infect your computers with Wingdows [TM], a virus cleverly designed to resemble a popular operating
system. Your objective is to click the mouse on them, ending their potential threat. If one of the people reaches a computer, it will
attempt to replace your operating system with the virus it carries. It will then attempt to run off the screen with your vital software.
The game ends when only 1 (or 0) of your computers are being productive. Additionally, some computers are connected with network cables.
When one computer on a network becomes infected, a spark will be sent down the cable, and will infect the computer on the other end when it
reaches there.
Clicking the button on one of the little people will cause it to cry out in pain and melt (id software eat your heart out!), dropping the
stolen os if it is carrying one. If a computer is running Wingdows or is temporarily off, the os can be dragged back to the computer (or
another computer compatible with that os). To extinguish a spark, drag the bucket of water from the upper left corner onto it.
The status bar at the bottom tells the following:
Number of Bills on/off the screen
Number of Computers running their OS/off/Wingdows
Level
Score
OPTIONS
-l n Start at level n.
--gui gui
Use a specific front end. The possible values are gtk, motif, and athena. Note that some of these may not be compiled into the
binary.
--size size
Play on a field of size x size, instead of the normal 400x400. size must be larger than 400.
-v Print version number and exit.
-h Print help and exit.
When using the GTK gui, all standard GTK options are supported. When using the Athena or Motif GUI, all standard X Intrinsics options are
supported.
AUTHORS
Main Programmer:
Brian Wellington <bwelling@xbill.org>
Programming & graphics (v2.0 and earlier):
Matias Duarte <matias@hyperimage.com>
COPYING
Copyright (c) 1994-2001 Psychosoft
It's FREE! If you want to express your undying gratitude to us for bringing a small bit of meaning into your otherwise pointless existence,
you could always send us e-mail. XBill is distributed under the GNU General Public License.
Go play the game now!
Version 2.1 October 2001 xbill(6)