01-15-2015
Must have, yes. It's usually a one-way translation, the way souce code to exe is a one way translation. Trying to go backwards involves a lot of detective work into what the intent of the rule was.
It's certainly possible to edit the resulting rules by hand, but then, you can't really use the generator any more -- it would override your changes.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I installed tcp wrappers version 7.6
and
modify my inetd.conf file from
ftp stream tcp6 nowait root /usr/sbin/in.ftpd in.ftpd
to
ftp stream tcp6 nowait root /usr/local/bin/tcpd /usr/sbin/in.ftpd -l
created /etc/hosts.allow file
and
modify it... (19 Replies)
Discussion started by: hassan2
19 Replies
2. UNIX for Dummies Questions & Answers
hi guys,
I have a requirement to run a script 4 times with different parameter values.
the 4 jobs have to run parallely which actually access different data of same table and deletes.
how can i achieve this.................?
Thanks in advance (1 Reply)
Discussion started by: chiru
1 Replies
3. UNIX for Dummies Questions & Answers
I tried searching the forum ,,but couldn't locate ..Can anyone give me a link or some information about wrapper script. (1 Reply)
Discussion started by: thana
1 Replies
4. UNIX for Dummies Questions & Answers
Hi everyone,
I have this custom sudo package over which I want to write a wrapper using PERL. The wrapper will do some pre-work and then call the regular sudo package from within itself. But I am facing a peculiar problem here.
Once invoked, I am able to do the pre-work from within the... (1 Reply)
Discussion started by: garric
1 Replies
5. Shell Programming and Scripting
Hello,
I have the below wrapper script:
#!/usr/bin/perl -w
if ($^O eq 'MSWin32' ) {
$subnet = 'c:\path\to\subnet.txt';
}
else {
$subnet = '/opt/qip/wrapper-del-sub';
}
open FH1, 'jj-deleted-subnets.txt' or die "Can't open 'jj-deleted-subnets.txt'
... (0 Replies)
Discussion started by: richsark
0 Replies
6. UNIX for Dummies Questions & Answers
My IRC client does not support SSL, so I was wondering if there was any other way to encrypt the information between SSL clients on an IRC network, maybe by using SSH to enter the IRC program or something (it's a command-line program) and passing all the plain-text through SSH first. I tried... (0 Replies)
Discussion started by: guitarscn
0 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I am a dummy and hear to the computation guys telling me,
"Oh! that is easy, you just write a wrapper to do all that bunch of stuff!" :cool:
Could someone tell me what is a wrapper? :rolleyes: The only one I know is Cling-Wrap for sandwiches.
A small elegant example would be very... (1 Reply)
Discussion started by: genehunter
1 Replies
8. Shell Programming and Scripting
Hi friends,
i am working in ksh88. i am running the follwing wapper script in background to run two jobs parallely((eg nohup wrapper.ksh &)::
wrapper.ksh
########################
#!/bin/ksh
nohup ./pii_insert.ksh /nsing83/p2/test &
nohup ./pii_update.ksh... (1 Reply)
Discussion started by: neelmani
1 Replies
9. Shell Programming and Scripting
I have 7 functions those need to be executed as command line inputs, I tried with below code it’s not executing function. If I run the ./script 2 then fun2 should execute , how to initiate that function I tried case and if else also, how to initiate function from command line
if
then... (8 Replies)
Discussion started by: saku
8 Replies
10. Shell Programming and Scripting
This is a wrapper I use to play media files. If I quit I can restart, a big plus.
#!/bin/bash
# Title......: sm
# Description: show media
# Author.....: Mitchell Johnston - uid 0
# Contact....: mxj_97@yahoo.com
#----------------------------------
# variables... (0 Replies)
Discussion started by: dragon-uid0
0 Replies
LEARN ABOUT DEBIAN
theft-server
THEFT-SERVER(1p) User Contributed Perl Documentation THEFT-SERVER(1p)
NAME
theft-server - CLC-INTERCAL networking
SYNOPSIS
theft-server --port=port [options]
DESCRIPTION
The theft-server mediates the communication between two CLC-INTERCAL programs with the internet extension. It keeps a list of process IDs
running on the current computer so it can provide lists of processes which can be engaged in INTERcal NETworking; it also responds to
broadcasts allowing other CLC-INTERCAL programs on the LAN to know there is something happening on this computer.
Under normal conditions, the theft-server is started automatically by a CLC-INTERCAL programs with the internet extension (unless one is
already running, of course!) because the extension cannot operate without a server on the local computer. However, it is possible to start
one manually, for example from a /etc/init.d or /etc/rc.d.
If the program is started automatically, it uses defaults for all its configuration; when started manually, it accepts the following
options:
-pport / --port=port
Uses the given port (number or service name) for communications, instead of using the default one from a configuration file.
-lseconds / --linger=seconds
Waits the specified time for a connection, then exit. The default is 600 (10 minutes). The timeout applies when the program starts and
also when all existing connections are closed. This allows the program to be started on demand by CLC-INTERCAL programs, and to auto-
matically exit when no longer required (unless more programs start up during the timeout).
This function is disabled by setting the timeout to 0 (i.e. -l0); for example, if starting the server from /etc/init.d or equivalent
one would disable the timeout.
-d / --debug
Tells everything it's doing (on Standard Error). Also, prevents the program from detaching from the current terminal and going into the
background.
BUGS
IPv6 is not yet implemented.
perl v5.8.8 2008-03-29 THEFT-SERVER(1p)