11-20-2012
You can download it and build it in your home directory -- no need to 'install' it. Of course, company policy might prohibit that too which is too bad.
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I am having this problem......when I run this script:
print -n "Enter file name to be deleted: "
read answer
if
then
rm $name
else
echo "No such file with the name: $name exists"
fi
I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies
2. Filesystems, Disks and Memory
Consider a system that supports 5,000 users. Suppose you want 4,990 of these users to be able to access one file
How would you specify this protection scheme in UNIX (4 Replies)
Discussion started by: mattyboy
4 Replies
3. Cybersecurity
Hello,
Long time ago we used to suffer from relay and users using your own mailservers to spam but thanks god for auth-before-pop.
But now i'm facing small problem with someone which us he is spaning using whatever mailserver with your@email.address.com and when these emails go to unknown... (10 Replies)
Discussion started by: Bashar
10 Replies
4. Shell Programming and Scripting
Hi pls help me out to short out this problem
rm PAB113_011.out
rm: PAB113_011.out: override protection 644 (yes/no)? n
If i give y it remove the file.
But i added the rm command as a part of ksh file and i tried to remove the file. Its not removing and the the file prompting as... (9 Replies)
Discussion started by: sri_aue
9 Replies
5. Linux
Hi All
I am working on a site to help newbie to learn linux for free.
demo.freelinuxconsole.info
there is only one file index.php its been able to rename or deleted.
Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies
6. Shell Programming and Scripting
How to create a file in UNIX which is password protected ?
Thanks and Regards,
Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies
7. IP Networking
Hi, I'm trying to find a way to protect my network against arp spoofing.
What it is:
An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker.
How to protect myself:
In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies
8. Homework & Coursework Questions
I am learning from the class how to protect the special characters and the script that I wrote here does not work when I am trying to pick up a single quote. It would complaint about parentheses problem. Please, someone could enlighten me.
Thanks in advance,
Scopiop
Input file
Hi, * ?... (2 Replies)
Discussion started by: scopiop
2 Replies
GO(1) General Commands Manual GO(1)
NAME
go - tool for managing Go source code
SYNOPSIS
go command [arguments]
DESCRIPTION
The Go distribution includes a command, named go, that automates the downloading, building, installation, and testing of Go packages and
commands.
COMMANDS
Each command is documented in its own manpage. For example, the build command is documented in go-build(1). The commands are:
build compile packages and dependencies
clean remove object files
doc run godoc on package sources
env print Go environment information
fix run go tool fix on packages
fmt run gofmt on package sources
get download and install packages and dependencies
install
compile and install packages and dependencies
list list packages
run compile and run Go program
test test packages
tool run specified go tool
version
print Go version
vet run go tool vet on packages
EXAMPLES
TODO
SEE ALSO
go-build(1), go-clean(1).
AUTHOR
This manual page was written by Michael Stapelberg <stapelberg@debian.org>, for the Debian project (and may be used by others).
2012-05-13 GO(1)