08-07-2015
Thanks all, boot -s did the trick, no messages in that mode. And then changed syslogd file.
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi all! I'm a web developer with a question.
We have a contractor that is working on a project that requires the user to access a ton of files on the clients Unix server. He has plans to built a VB interface for on site windows users to access those files and wants us to develop a web based... (4 Replies)
Discussion started by: Imhotep1963
4 Replies
2. UNIX for Dummies Questions & Answers
This is very baffling. I have a web server directory, http://domainName/myDir. The directory's permissions are 744, so I have full permisions, and other people can read the directory. I created a subdirectory in that directory: domainName/myDir/subDir. I set the permisions of that to 744 also.... (3 Replies)
Discussion started by: Djaunl
3 Replies
3. UNIX for Dummies Questions & Answers
How is this error resolved please?
I'm just trying to run a shell script and am getting this error. All file permissions are fine.
Thanks (0 Replies)
Discussion started by: miwinter
0 Replies
4. UNIX for Dummies Questions & Answers
m kinda new to unix. i have been trying to write a script where i am trying to switch between users.
but the problem is that the syntax like USERNAME/PASSWORD (like oracle SCOT/TIGER) is not working.
if i write su USERNAME then the script goes to the command prompt and asks for user to enter... (0 Replies)
Discussion started by: ShellBoy
0 Replies
5. UNIX for Dummies Questions & Answers
I use a forms application where I develop the forms(Oracle 6i) in windows server and compile(Oracle 9i) the same in Unix server.
The whole forms application executables are placed in Unix.
My requirement is to upload data from excel sheet to oracle tables using Oracle forms. I have developed the... (0 Replies)
Discussion started by: malinideepa
0 Replies
6. Shell Programming and Scripting
Hi,
I am having the following codes which generates 24 files:
declare
begin
for i in 0..23 loop
EXECUTE IMMEDIATE 'create tablespace TSCGFCDR' ||to_char(sysdate,'DD')||'_'||to_char(i,'fm00')||
to_char(i+1,'fm00')||to_char(sysdate,'MONYY')||' DATAFILE '||
... (4 Replies)
Discussion started by: hitesh1907
4 Replies
7. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
8. Shell Programming and Scripting
Hi All
I need to transfer a file from a UNIX server to a windows server.
I saw that it is possible to do this using scp command by looking at the forum listed below:
... (2 Replies)
Discussion started by: vx04
2 Replies
LEARN ABOUT OSF1
syslog.auth
syslog.auth(4) Kernel Interfaces Manual syslog.auth(4)
NAME
syslog.auth - authorization file for accepting remote syslog messages
SYNOPSIS
# format: Each fully qualified host name on a separate line hostname.domain_name
DESCRIPTION
The /etc/syslog.auth file specifies which remote hosts are allowed to forward syslog messages to the local host. For the sake of security,
only messages coming from remote hosts listed in the local /etc/syslog.auth file will be logged by the syslogd daemon.
If the /etc/syslog.auth file does not exist, then messages coming from any host will be accepted.
Each remote host name should appear in a separate line in /etc/syslog.auth. A line started with the # character is considered as a comment
and is thus ignored.
A host name must be a complete domain name such as trout.zk3.dec.com. If a domain host name is given, it must either appear in the local
/etc/hosts file or be able to be resolved by the local name server (BIND).
Note that a host name can have at most as many characters as defined by the MAXHOSTNAMELEN constant in <sys/param.h>, although each line
in the /etc/syslog.auth file can have up to 512 characters.
The /etc/syslog.auth file must be owned by root and has a permission of 0600.
To invoke a new version of the /etc/syslog.auth file, run the following command (as the super user) to initialize the syslogd daemon: kill
-HUP `cat /var/run/syslog.pid`
EXAMPLES
The following example provides a typical authorization file: # format: Each fully qualified host name on a separate line
c3poid.rvo.dec.com r2d2id.ckt.dec.com
FILES
Location of the authorization file.
RELATED INFORMATION
Commands: syslogd(8), syslog(1)
System Administration delim off
syslog.auth(4)