11-03-2014
This problem is so common it's in our FAQ.
cron runs with a very minimal PATH. Try /absolute/path/to/php instead of just pgp.
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have 2 systems that cannot telnet directly into our UNIX system via IP. The only thing that separate these 2 systems from all the others in our office is that they run a PGP encryption within Outlook. I can telnet to a different server and then telnet from there to the one I want to get to, but... (7 Replies)
Discussion started by: jgordon
7 Replies
2. Solaris
Hi
Someone is going to send me a file that they have encrypted by PGP encryption on windows pc to my solaris 9 server.
They will give me the pgp key to decrypt the file.
How can I do this on solaris 9
Is there a tool installed by default to decrypt or do I need to install something to... (0 Replies)
Discussion started by: frustrated1
0 Replies
3. UNIX for Advanced & Expert Users
Hi
I have one script for doing the gpg encryption on linux.
The encrytion is doing fine when i am running the script from command prompt on linux
The same script when it is triggering from mainframe using sysopts option in NDM(connect direct) the encryption step in the shell script is... (0 Replies)
Discussion started by: Arvind Maurya
0 Replies
4. Cybersecurity
Hi All,
I am new to the concept of encryption and shell and i have been assigned to do pgp encryption of a file before ftping it.
I am developing the script using MKS Toolkit on Windows XP and the script will run later on actual unix box.
I am going through documents provided by pgp... (2 Replies)
Discussion started by: sandeepb
2 Replies
5. UNIX for Dummies Questions & Answers
Hello,
Does anyone know if it's normal to have a very different file size after a file has been encrypted using pgp?
Before encryption: 582.7618598938 MB
After encryption: 98.73 MB
Thanks in advance for any help, (2 Replies)
Discussion started by: tekster757
2 Replies
6. Solaris
Hi,
i am trying to encrypt a file using pgp with a recepient's public key. The file is encrypted but the output file has owner & group nobody. i am not able to change it either. Please let me know how to do pgp encryption so that i get the output with owner and group as the same user which runs... (4 Replies)
Discussion started by: renjyverghese
4 Replies
7. Linux
I have file in linux which I need to do the PGP encryption.
Through manually I am using this command to do the same
gpg -c scsrun.log
Enter passphrase :
Repeat Passphrase :
But how I can achive this using linux script.
Thanks
How to use code tags (3 Replies)
Discussion started by: mr_harish80
3 Replies
8. UNIX for Advanced & Expert Users
Hi,
Could anyone please help me in understanding how PGP can be installed and configured in HP-UX machines.Is there any separate licence required ? and what are the minimum system requirements to have PGP installed on a server (1 Reply)
Discussion started by: tinivt
1 Replies
9. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
cron(8) System Manager's Manual cron(8)
NAME
cron - The system clock daemon
SYNOPSIS
/usr/sbin/cron
DESCRIPTION
The cron daemon runs shell commands at specified dates and times. Commands that are to run according to a regular or periodic schedule are
found within the crontab files. Commands that are to run once only are found within the at files. You submit crontab and at file entries
by using the crontab and at commands. Because the cron process exits only when killed or when the system stops, only one cron daemon
should exist on the system at any given time. Normally, you start the cron daemon from within a run command file.
During process initialization and when cron detects a change, it examines the crontab and at files. This strategy reduces the overhead of
checking for new or changed files at regularly scheduled intervals. The cron command creates a log of its activities. The cron daemon
must be started from the system startup scripts because it must begin execution without a login user ID set. The cron daemon starts each
job with the following process attributes stored with the job by the invoking process: Login user ID Effective and real user IDs Effective
and real group IDs Supplementary groups
It also establishes the following attributes from the authentication profile of the account associated with the login user ID of the invok-
ing process: Audit control and disposition masks Kernel authorizations
DIAGNOSTICS
The at and batch programs will refuse to accept jobs submitted from processes whose login user ID is different from the real user ID.
FILES
Specifies the command path. Main cron directory Directory containing the crontab files. List of allowed users. List of denied users His-
tory information for cron Queue description file for at, batch, and cron
RELATED INFORMATION
Commands: at(1), crontab(1), rc0(8), rc2(8), rc3(8)
Files: queuedefs(4) delim off
cron(8)