Sponsored Content
Top Forums Shell Programming and Scripting Script protection against changes Post 302732363 by agama on Saturday 17th of November 2012 11:04:47 AM
Old 11-17-2012
If you write your scripts in Kshell, you can use shcomp which will convert the script into a binary representation that Kshell can execute. You then put the executable file out in a public directory, and keep the source file as read only in your private development area.

If shcomp isn't installed on your system you can get it as a part of AST from AT&T Labs Research: AT&T Labs Research - Software Tools

Maybe something like this will work for your situation
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Override protection.....

I am having this problem......when I run this script: print -n "Enter file name to be deleted: " read answer if then rm $name else echo "No such file with the name: $name exists" fi I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies

2. Filesystems, Disks and Memory

protection schemes

Consider a system that supports 5,000 users. Suppose you want 4,990 of these users to be able to access one file How would you specify this protection scheme in UNIX (4 Replies)
Discussion started by: mattyboy
4 Replies

3. Cybersecurity

spam and protection?

Hello, Long time ago we used to suffer from relay and users using your own mailservers to spam but thanks god for auth-before-pop. But now i'm facing small problem with someone which us he is spaning using whatever mailserver with your@email.address.com and when these emails go to unknown... (10 Replies)
Discussion started by: Bashar
10 Replies

4. Shell Programming and Scripting

override protection 644 (yes/no)?

Hi pls help me out to short out this problem rm PAB113_011.out rm: PAB113_011.out: override protection 644 (yes/no)? n If i give y it remove the file. But i added the rm command as a part of ksh file and i tried to remove the file. Its not removing and the the file prompting as... (9 Replies)
Discussion started by: sri_aue
9 Replies

5. Linux

file security/protection

Hi All I am working on a site to help newbie to learn linux for free. demo.freelinuxconsole.info there is only one file index.php its been able to rename or deleted. Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies

6. Shell Programming and Scripting

Password protection in unix

How to create a file in UNIX which is password protected ? Thanks and Regards, Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies

7. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

8. Homework & Coursework Questions

Protection and special characters

I am learning from the class how to protect the special characters and the script that I wrote here does not work when I am trying to pick up a single quote. It would complaint about parentheses problem. Please, someone could enlighten me. Thanks in advance, Scopiop Input file Hi, * ?... (2 Replies)
Discussion started by: scopiop
2 Replies
gnutls_pkcs11_privkey_generate(3)				      gnutls					 gnutls_pkcs11_privkey_generate(3)

NAME
gnutls_pkcs11_privkey_generate - API function SYNOPSIS
#include <gnutls/pkcs11.h> int gnutls_pkcs11_privkey_generate(const char* url, gnutls_pk_algorithm_t pk, unsigned int bits, const char* label, unsigned int flags); ARGUMENTS
const char* url a token URL gnutls_pk_algorithm_t pk the public key algorithm unsigned int bits the security bits const char* label a label unsigned int flags should be zero DESCRIPTION
This function will generate a private key in the specified by the url token. The private key will be generate within the token and will not be exportable. RETURNS
On success, GNUTLS_E_SUCCESS (0) is returned, otherwise a negative error value. SINCE
3.0 REPORTING BUGS
Report bugs to <bug-gnutls@gnu.org>. General guidelines for reporting bugs: http://www.gnu.org/gethelp/ GnuTLS home page: http://www.gnu.org/software/gnutls/ COPYRIGHT
Copyright (C) 2012 Free Software Foundation, Inc.. Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. SEE ALSO
The full documentation for gnutls is maintained as a Texinfo manual. If the info and gnutls programs are properly installed at your site, the command info gnutls should give you access to the complete manual. As an alternative you may obtain the manual from: http://www.gnu.org/software/gnutls/manual/ gnutls 3.1.15 gnutls_pkcs11_privkey_generate(3)
All times are GMT -4. The time now is 07:42 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy