10-11-2012
At my place anyone [meaning everyone, from service desk, to apps team] can do whatever they want on any servers, and its not even important to let me know whats going on until someone screws up then I go FIXIT. I earnestly tried to fix this but I was shot down too many times so i dont care nomore
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Howdie everyone...
I have a shell script RemoveFiles.sh
Inside this file, it only has two commands as below:
rm -f ../../reportToday/temp/*
rm -f ../../report/*
My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies
2. Shell Programming and Scripting
Hi,
I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern.
Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies
3. UNIX and Linux Applications
Hello all,
I need help for build server call as Password management / centralized password management server.
My situation and example:
I have 600 server in my server room running on Linux then I need 1 server only can create login/password and then user can login to all 600 server no... (2 Replies)
Discussion started by: sheikh76
2 Replies
4. IP Networking
I have a client machine that was built and loaded with SCO UNIX 2.1.3, (yes it is old). The machine worked fine on the closed network that I tested on in my shop. I then had to change it to the network that it would be connected to. Below is the host file, router and subnet mask file that I usually... (0 Replies)
Discussion started by: NC user
0 Replies
5. IP Networking
Hello all,
I was wondering which way do you use to manage you IPs?
For example in our case we have excel sheets and we export them in html first and import it to a server running apache, so to be visible from all.
But i was wondering if there are any way (prefer a way running in web server)... (2 Replies)
Discussion started by: @dagio
2 Replies
6. Shell Programming and Scripting
My script work on Linux but not work in sun os.
my script.
logFiles="sentLog1.log sentLog2.log"
intial_time="0 0"
logLocation="/usr/local/tomcat/logs/"
sleepTime=600
failMessage=":: $(tput bold)Log not update$(tput rmso) = "
successMessage="OK"
arr=($logFiles)... (7 Replies)
Discussion started by: ooilinlove
7 Replies
7. IP Networking
hi all. and sorry for the random question, but this sparkled a raging flame-war at work and i want more points of view
situation
a router, with linux of some sort,
dhcp client requesting for ip in wan1 (as usual with wan ports)
dhcp server listening in lan1, and assigning ip (as usual... (9 Replies)
Discussion started by: broli
9 Replies
8. What is on Your Mind?
Original post from this thread on browser caching.
To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
LEARN ABOUT DEBIAN
gnome2::gconf::changeset
Gnome2::GConf::ChangeSet(3pm) User Contributed Perl Documentation Gnome2::GConf::ChangeSet(3pm)
NAME
Gnome2::GConf::ChangeSet - A set of configuration changes to be made
SYNOPSIS
$cs = {
'/apps/someapp/some_int_key' => { type => 'int', value => 42 },
'/apps/someapp/some_string_key' => { type => 'string', value => 'hi' },
};
$reverse_cs = $client->reverse_change_set($cs);
$client->commit_change_set($cs, FALSE);
DESCRIPTION
A "GConfChangeSet" allows you to collect a set of changes to configuration keys (set/unset operations). You can then commit all the changes
at once.
In C, "GConfChangeSet" is an hash containing keys and "GConfValue"s to be committed in a single pass (though not yet with an atomic
operation). Since perl has hashes as a built-in type, "GConfChangeSet" is threated as an hash with the GConf keys as keys, and their
relative Gnome2::GConf::Value as payload.
SEE ALSO
Gnome2::GConf(3pm), Gnome2::GConf::Value(3pm).
SEE ALSO
Gnome2::GConf
COPYRIGHT
Copyright (C) 2003-2006 by the gtk2-perl team.
This software is licensed under the LGPL. See Gnome2::GConf for a full notice.
perl v5.14.2 2011-11-17 Gnome2::GConf::ChangeSet(3pm)