Sponsored Content
Operating Systems Linux Red Hat How do I install security patches with no internet access? Post 302801071 by Jardoo on Wednesday 1st of May 2013 09:30:42 AM
Old 05-01-2013
Thanks for the responses.
I just have one other question. If I run these updates will it alter the Kernel?
Will the version change from 5.4 to 5.5 or even version 6?
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

No 5 fail. When install Patches. How to settle?

Install 2.6Recommanded on 2 workstations, one works, but the other one has many No 5 fail. the log says: Installing 106361-14... WARNING: /usr/sbin/patchadd is being used to install this patch. Checking installed packages and patches... Executing prepatch script... Verifying... (1 Reply)
Discussion started by: cloudsmell
1 Replies

2. HP-UX

Trying to install codependent patches

I am trying to install patches PHKL_33463 & PHKL_33049. Each patch requires the other one. I have downloaded both of them as separate (tape) depot files. I'm assuming I can load them successfully if I can put them into the same depot file, BUT how do I do that? Any help would be greatly... (2 Replies)
Discussion started by: Ken Englander
2 Replies

3. UNIX for Dummies Questions & Answers

Security or Necessary patches

Hi All, I would like to ask some questions, I have an Solaris 10 and RHEL which is install in separate machine.. The question is: 1. how can I check the latest patches or latest update in my machine? (I need a step or command) 2. where can I get the latest security patch or necessary patch... (5 Replies)
Discussion started by: flekzout
5 Replies

4. UNIX for Advanced & Expert Users

Linux security patches

Hi all, :) I'm quite new with installation of security patches in Linux Redhat Enterprise, here's my question. I have 2 machine of this RHEL(never patch before) since it never connects directly to the internet(block by firewall) and I want to update the patches now because my boss asked me to... (1 Reply)
Discussion started by: flekzout
1 Replies

5. Red Hat

RHEL Security Patches

Hi all, :) I'm quite new with installation of security patches in Linux Redhat Enterprise, here's my question. I have 2 machine of this RHEL(never patch before) since it never connects directly to the internet(block by firewall) and I want to update the patches now because my boss asked me to... (2 Replies)
Discussion started by: flekzout
2 Replies

6. IP Networking

Does my provider limit my internet access or somesites access?

Hi Good Day, i would like to ask for further info about my problems experiencing this evening. Im a PPP0 connection in the internet using 3G located in asia pacific region.i had this problem this evening in my INTERNET connections that there are some sites i can't open example ( Gizmodo.com,... (2 Replies)
Discussion started by: jao_madn
2 Replies

7. Solaris

10_Recommended patches install - hangs!

Got a Solaris 10 05/09 machine recently built. Trying to run installcluster --s10cluster like Ive done loads of times before. On this particular machine, it just sits there, no output on command line. Any ideas what to try to see whats going wrong? (3 Replies)
Discussion started by: paulfoel
3 Replies

8. Red Hat

Regarding application of security patches RHEL 5.5

Hi Is there a direct way to apply a particular security advisory on the system. Presently we have certain security advisories to be applied which require installation of multiple rpms and their dependencies. These rpms as listed in the security advisory also mention that they have been... (0 Replies)
Discussion started by: Sapanvas
0 Replies
RENICE(1)                                                          User Commands                                                         RENICE(1)

NAME
renice - alter priority of running processes SYNOPSIS
renice [-n] priority [-g|-p|-u] identifier... DESCRIPTION
renice alters the scheduling priority of one or more running processes. The first argument is the priority value to be used. The other arguments are interpreted as process IDs (by default), process group IDs, user IDs, or user names. renice'ing a process group causes all processes in the process group to have their scheduling priority altered. renice'ing a user causes all processes owned by the user to have their scheduling priority altered. OPTIONS
-n, --priority priority Specify the scheduling priority to be used for the process, process group, or user. Use of the option -n or --priority is optional, but when used it must be the first argument. -g, --pgrp Interpret the succeeding arguments as process group IDs. -p, --pid Interpret the succeeding arguments as process IDs (the default). -u, --user Interpret the succeeding arguments as usernames or UIDs. -V, --version Display version information and exit. -h, --help Display help text and exit. EXAMPLES
The following command would change the priority of the processes with PIDs 987 and 32, plus all processes owned by the users daemon and root: renice +1 987 -u daemon root -p 32 NOTES
Users other than the superuser may only alter the priority of processes they own. Furthermore, an unprivileged user can only increase the ``nice value'' (i.e., choose a lower priority) and such changes are irreversible unless (since Linux 2.6.12) the user has a suitable ``nice'' resource limit (see ulimit(1) and getrlimit(2)). The superuser may alter the priority of any process and set the priority to any value in the range -20 to 19. Useful priorities are: 19 (the affected processes will run only when nothing else in the system wants to), 0 (the ``base'' scheduling priority), anything negative (to make things go very fast). FILES
/etc/passwd to map user names to user IDs SEE ALSO
nice(1), getpriority(2), setpriority(2), credentials(7), sched(7) HISTORY
The renice command appeared in 4.0BSD. AVAILABILITY
The renice command is part of the util-linux package and is available from Linux Kernel Archive <https://www.kernel.org/pub/linux/utils /util-linux/>. util-linux July 2014 RENICE(1)
All times are GMT -4. The time now is 06:37 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy