04-22-2014
You will have to connect the app to detect the actions of the server, this will help in detecting the activity done.
Wordpress website builder
Last edited by markjoseph; 04-24-2014 at 09:20 AM..
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello when I examined the partition information of one of our servers I saw the following:
10.20.5.2:/ha0/critical
Fstab has a similar entry. Seems that the server is accessing a partition on a remote machine.
What else is required to setup a partition that accesses a remote machine... (2 Replies)
Discussion started by: mojoman
2 Replies
2. Shell Programming and Scripting
Hi,
I need to copy few files from remote server to local server.
I write a shell script to connect to the remote server using ftp and go to that path. Now i need to copy those files in the remote directory to my local server with the timestamp of all those files shouldnt be changed.
... (5 Replies)
Discussion started by: arunkumarmc
5 Replies
3. Red Hat
Hi Gurus,
I have been working on encrypting a partition in a Fedora box and have successfully encrypted a partition(By name /test) using "cryptsetup & luks".
The below command was put up in a runcontrol file which is called during bootup to automount them during bootup.
cat... (0 Replies)
Discussion started by: Hari_Ganesh
0 Replies
4. Programming
Hi,
I have 1. lappy
2. server A
3. server B
Now, what i need is to run a command from lappy that will sftp a file from server A to server B.
Please guide me to achieve this.
-akash (1 Reply)
Discussion started by: akash.mahakode
1 Replies
5. Solaris
Hi,
I am trying to automate the process of fetching files from remote server to local server through sftp. I have the username and password for the remote solaris server. But I need to give password manually everytime i run the script.
Can anyone help me in automating the script such that it... (3 Replies)
Discussion started by: ssk250
3 Replies
6. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
7. Shell Programming and Scripting
Hi guys,
So i am in server1 and i have to login to server 2, 3,4 and run some script there(logging script) and output its result. What i am doing is running the script in server2 and outputting it to a file in server 2 and then Scp'ing the file to server1. Similarly i am doing this for other... (5 Replies)
Discussion started by: srkmish
5 Replies
8. Shell Programming and Scripting
Hello Every one!!
I am trying to write a shell script which will connect to a remote server and execute scripts which are at a certain path in the remote server.
Before this I am using a sudo command to change the user.
The place where I am stuck is, I am able to connect to the... (6 Replies)
Discussion started by: masubram
6 Replies
9. Shell Programming and Scripting
I have a script, which connecting to remote server and first checks, if the files are there by timestamp. If not I want the script exit without error. Below is a code
TARFILE=${NAME}.tar
TARGZFILE=${NAME}.tar.gz
ssh ${DESTSERVNAME} 'cd /export/home/iciprod/download/let/monthly;... (3 Replies)
Discussion started by: digioleg54
3 Replies
LEARN ABOUT CENTOS
ctl_mboxlist
CTL_MBOXLIST(8) System Manager's Manual CTL_MBOXLIST(8)
*
NAME
ctl_mboxlist - perform operations on the mailbox list database
SYNOPSIS
ctl_mboxlist [ -C config-file ] -d [ -x ] [ -p partition ]
[ -f filename ]
ctl_mboxlist [ -C config-file ] -u [ -f filename ]
ctl_mboxlist [ -C config-file ] -m [ -a ] [ -w ] [ -i ]
[ -f filename ]
ctl_mboxlist [ -C config-file ] -v [ -f filename ]
DESCRIPTION
Ctl_mboxlist is used to perform various administrative operations on the mailbox list database.
Ctl_mboxlist reads its configuration options out of the imapd.conf(5) file unless specified otherwise by -C. The configdirectory option is
used to determine the default location of the mailbox list database.
OPTIONS
-C config-file
Read configuration options from config-file.
-d Dump the contents of the database to standard output in a portable flat-text format. NOTE: In Cyrus versions 2.2.13 and earlier,
the dump format did not include the mailbox type flags, breaking remote mailboxes (frontends, mupdate master, unified backends) when
undumped.
-x When performing a dump, remove the mailboxes dumped from the mailbox list (mostly useful when specified with -p)
-p partition
When performing a dump, dump only thise mailboxes that live on partition
-u Load the contents of the database from standard input. The input MUST be in the format output using the -d option. NOTE: Both the
old and new formats can be loaded, but the old format will break remote mailboxes.
-m For backend servers in the Cyrus Murder, synchronize the local mailbox list file with the MUPDATE server.
-a When used with -m, assume the local mailboxes file is authoritiative, that is, only change the mupdate server, do not delete any
local mailboxes. USE THIS OPTION WITH CARE, as it allows namespace collisions into the murder.
-w When used with -m, print out what would be done but do not perform the operations.
-i When used with -m, asks for verification before deleting local mailboxes.
-v Verify the consistency of the mailbox list database and the spool partition(s). Mailboxes present in the database and not located on
a spool partition, and those located on a spool partition (directory containing a valid cyrus.header file) and not present in the
database will be reported. Note that this function is very I/O intensive.
-f filename
Use the database specified by filename instead of the default (configdirectory/mailboxes.db).
FILES
/etc/imapd.conf
SEE ALSO
imapd.conf(5), cyrus-master(8)
CMU
Project Cyrus CTL_MBOXLIST(8)