Hi all,
i've got problem in running a script in background... i have written a script, and i want to run it everytime i log in, but when i log off i want the script to stay (i watch not to run two scripts at one time in the script).
so as a normal user i want to do:
$ screen my_script &
... (6 Replies)
Hi,
When I try to run a script with ". "(dot space) in my home, it gives me error ".: Permission denied".
Any explanation for this behaviour?
Thanks in advance,
-Ashish (3 Replies)
HI All,
I am using solaris
i created a user adam and updated his permissions
in vi sudoers file as follows
adam ALL=(ALL) NOPASSWORD: ALL
...........
when i create user by logging as sudo user .
$ sudo useradd -d /home/kalyan -m -s /bin/sh kalyan
sudo: not found
... (6 Replies)
Hi,
I have two machines 1. MacOSx (Users --> userMac , IP - a.b.c.d)
2. FreeBSD (Users --> userBSD, IP- p.q.r.s)
I want to modify some files of FreeBSD on my MacOS. So, I mounted the FreeBSD folder on my Mac as follows.
$ sudo mount -o -P p.q.r.s:/usr/home/user... (5 Replies)
Let me preface with I am semi-new to Solaris. I work with it in the labs at work and that's about my extent (although I run Linux at home).
Well, a week ago security comes around with updated requirements, some of which are the need to audit all failures. For the life of me I cannot get a... (0 Replies)
I have a user who has "+ +" at the top of his .rhosts file. He cannot "rsh NODE date" to a different box ( both are RHEL 5.4 ). If I remove the "+ +" then the "RSH" works. I have correct settings of node names/user in the .rhosts file.
I even tried adding to the second box's... (3 Replies)
Hello friends,
I have scratched my system and after that when I am trying to access the console via root login it's failing with an error message of "permission denied". I am able to access the other login, I am having only problem with root and some other user login. I am using an telnet... (2 Replies)
Hello friends,
I have scratched my system and after that when I am trying to access the console via root login it's failing with an error message of "permission denied". I am able to access the other login, I am having only problem with root and some other user login. I am using an telnet... (7 Replies)
Hi,
I hope this is the correct section in the forum to post as I'm trying to SSH from my MacBook.
I was looking to see whether ssh on my jailbroken iPhone 6s (10.3.1) still works fine and was following this old reddit guide. I installed OpenSSH&OpenSSL from Cydia and changed the password using... (7 Replies)
Discussion started by: hss1
7 Replies
LEARN ABOUT HPUX
securenets
securenets(4) Kernel Interfaces Manual securenets(4)NAME
securenets - NIS map security file
DESCRIPTION
The file defines networks and hosts that can access the NIS maps on a server. Each line in the file gives a network mask and a net
address. For example:
The format of the file is as follows:
o Lines beginning with the character are treated as comments.
o Lines that are not comment lines contain two fields separated by white space. The first field is a netmask, and the second field is a
network.
o The netmask field can be one of the following:
o 255.255.255.255 (IPv4)
o ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff (IPv6)
o the string indicating that the second field is a specific host to be allowed access.
The file can have any number of netmask/net pairs.
When is started on the server, it checks for the existence of and reads its contents into memory if it exists. must be stopped and
restarted for any changes in to take effect.
Upon startup, the netmask and the net address are converted to binary format and logical ANDed. The result must equal the net address (the
second address) to be legal.
If the netmask is 255.255.255.255 (all 1's in binary), any address in the net address argument will match it. If any field in the netmask
is 0, the corresponding field in the net address must be 0. When used in this way, the portion of the addresses given as 0 acts as a wild
card.
When a client attempts to bind to the server, checks the client's IP against those given in the file. Again, the address is converted to
binary and logical ANDed with the netmask. The result must equal the net address given in the file. If the client address does not match
any pairs in the file, the binding is refused with the message, "no such map in server's NIS domain".
The file can be used to limit access to specific hosts or to subnets using the wildcard capability.
If there are syntax errors in the file, messages are logged to the logging file (default and is not started.
If a host has multiple interfaces, each interface address must be allowed in the securenets file for that host to have reliable NIS access.
EXAMPLES
The following examples show entries for the file.
Either of the following entries provides access only to the host with address 192.33.33.33:
or
The following entry allows access by any host on the 192.33.33 subnet:
For broader access, such as an entire enterprise, the following entry allows any host whose address begins with "15" to be served:
Either of the following entries allows access for an individual IPv6 address:
or
The following entry allows access for all IPv6 addresses starting with "fec0":
SEE ALSO ypserv(1M).
securenets(4)