01-14-2014
You could use a free DDNS service and register the ip you get served during DHCP...then you should not care about the actual IP.
10 More Discussions You Might Find Interesting
1. AIX
Hi!
I need to know what is the risk involved if a user with UID >100 is attached to a group with gid =1 .i.e., a user is attached to a priviliged group in AIX .
Kindly let me know what security implication can arise in this case?
Early reply in this regard will be highly appreciated. (1 Reply)
Discussion started by: faraz82
1 Replies
2. UNIX for Dummies Questions & Answers
If i write this statement in a Korn Shell script
RCODE=$?
what possibly does it eman? (3 Replies)
Discussion started by: ranjita.c
3 Replies
3. Solaris
Hi all,
I have this problem that puzzles me, i have setup all the right DHCP configuration in Windows Server. The reservation IP address in windows for this specific unix terminal. However, when i rebooted the unix terminal the IP which was already assigned for this box somehow change to a total... (0 Replies)
Discussion started by: tlee
0 Replies
4. Shell Programming and Scripting
Hi
I have the following assignment in my ksh script:
PX_LIST="4119 2390 2294 2776 2897 4099"
Is there any sed/awk command which would allow the to remove certain number from this string. Let's say I need to remove PX=2390 from PX_LIST, so the output after deletion will be"
PX_LIST="4119 2294... (5 Replies)
Discussion started by: aoussenko
5 Replies
5. Shell Programming and Scripting
Hi,
I want to check if a variable has a value assigned to it or not.
I can do following -
cat $Var > File1
if
then
echo "$Var has value"
else
echo "$Var is null"
fi
But I have to check for 3 Variables and I want to wrap it up in couple of unix statements.
Any... (3 Replies)
Discussion started by: sumeet
3 Replies
6. Red Hat
Hi All
dhcpd.conf has a range of IPs sa for example( 192.168.1.201 192.168.1.220)
So this is the range of IP addresses the server will issue to DHCP enabled PC clients booting up on the network
How do i know which IPs are being used or which IPs from the range are assigned to dhcp enabled... (11 Replies)
Discussion started by: tannu
11 Replies
7. Shell Programming and Scripting
Hi,
Im pretty new to Unix. I came across a script which was using PLSQL inside a script and there was an unusual thing mentioned.
there was a variable assigned as
P_CUR=${1}
and one more as
V_TAGFILE="$1"
Couldnt find the difference. Also the variables were used in PLSQL... (1 Reply)
Discussion started by: njks68
1 Replies
8. Shell Programming and Scripting
I am making of a script that will go through a couple of for loops and create file names based on the values in that loop, however the variable that combines everything is not getting assigned properly:
#! /bin/bash
for imod in K33_j1b_WS9_6
do
for emod in mb2A mb2C mb3A mb3C mb4A... (1 Reply)
Discussion started by: badinsults
1 Replies
9. UNIX for Dummies Questions & Answers
I am trying to check whether a variable has been assigned on the command line or not.
Here is what I did:
#!/usr/bin/bash
if( $variable == '\0')
{
print "variable was not assigned"
exit
}
else
NF = 2 {print $1, ""}
exit
fi
awk -f question1.awk variable = 58 letters.txt.
So... (3 Replies)
Discussion started by: Fred63528
3 Replies
10. IP Networking
Hi All ,
please view the set up below:
-------------------------------------------------------------------
| DHCP Server |-----------| ROUTER & |-----------| Clients |
| 192.168.99.1 | - -<eth1>| DHCP-RELAY|<eth2>-- | 192.168.88.X |
... (2 Replies)
Discussion started by: gdangoor
2 Replies
LEARN ABOUT DEBIAN
theft-server
THEFT-SERVER(1p) User Contributed Perl Documentation THEFT-SERVER(1p)
NAME
theft-server - CLC-INTERCAL networking
SYNOPSIS
theft-server --port=port [options]
DESCRIPTION
The theft-server mediates the communication between two CLC-INTERCAL programs with the internet extension. It keeps a list of process IDs
running on the current computer so it can provide lists of processes which can be engaged in INTERcal NETworking; it also responds to
broadcasts allowing other CLC-INTERCAL programs on the LAN to know there is something happening on this computer.
Under normal conditions, the theft-server is started automatically by a CLC-INTERCAL programs with the internet extension (unless one is
already running, of course!) because the extension cannot operate without a server on the local computer. However, it is possible to start
one manually, for example from a /etc/init.d or /etc/rc.d.
If the program is started automatically, it uses defaults for all its configuration; when started manually, it accepts the following
options:
-pport / --port=port
Uses the given port (number or service name) for communications, instead of using the default one from a configuration file.
-lseconds / --linger=seconds
Waits the specified time for a connection, then exit. The default is 600 (10 minutes). The timeout applies when the program starts and
also when all existing connections are closed. This allows the program to be started on demand by CLC-INTERCAL programs, and to auto-
matically exit when no longer required (unless more programs start up during the timeout).
This function is disabled by setting the timeout to 0 (i.e. -l0); for example, if starting the server from /etc/init.d or equivalent
one would disable the timeout.
-d / --debug
Tells everything it's doing (on Standard Error). Also, prevents the program from detaching from the current terminal and going into the
background.
BUGS
IPv6 is not yet implemented.
perl v5.8.8 2008-03-29 THEFT-SERVER(1p)