03-01-2016
Thanks very much for guide
problem solved
The problem was DVD!...
Is there a way to password to be entered in the proxy encryption ?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I'm ok to linux but not too much. I want to know that I ve running the Linux(RedHat 9.0) Based server install for Proxy(Interconnection Sharing) I had implement Squid for HTTP Proxy on which some services like IE, NetScape, Yahoo Messenger, MSN messenger and Get Right are running but I want to run... (2 Replies)
Discussion started by: rkashifj
2 Replies
2. Solaris
Hi All,
Where do I find/download this font package 'FONT_FAMILY_SANS_SERIF-FONT_STYLE_NORMAL-14' and how to install it ?
When I run an osi utility (ftamtool) it shows me this error:
##FTAM Tool : XView ERROR
XView warning: Impossible de charger le jeu de caractères 'FONT_FAMILY_SANS_SERI... (0 Replies)
Discussion started by: andryk
0 Replies
3. High Performance Computing
So I have been struggling for the past few days to install a simulation package lammps (http://lammps.sandia.gov/) on my Mac OS X. I am well aware that this is a Ubuntu forum, but you guys seem to know a lot of UNIX stuff, so I was hoping someone might have a solution to my problem...
To run... (1 Reply)
Discussion started by: oscar78
1 Replies
4. HP-UX
Hi,
I am doing some testing with creation of depots on HP-UX systems (11.11).
Want to display some echo statements based on the processing during checkinstall, pre & postinstall scripts on the terminal.
The echo statements are getting directed to /var/adm/sw/swagent.log
I want to display... (7 Replies)
Discussion started by: vibhor_agarwali
7 Replies
5. IP Networking
I have Squid set up, but when my friend wants to use it, he has to enter my IP and port in his browser settings every time. How can I make it so that he only has to go a webpage I create, and use the proxy from there instead of having to change his browser Network settings every single time? I also... (1 Reply)
Discussion started by: guitarscn
1 Replies
6. UNIX for Dummies Questions & Answers
Hi everyone,
Hope u doing good.
I am trying to installl WebSphere Application Server(WAS) ND package, i got problem at initial level
I hope, the problem is with Mozilla browzer. Can anyone trobleshoot the problem
An error occurred while starting the launchpad for a WebSphere Application ... (0 Replies)
Discussion started by: sarfraz
0 Replies
7. UNIX for Advanced & Expert Users
Friends,
Please let meknow, How we can find the dependancies of .dstream package & .rpm package before installation ?
For AIX, We can use the inutoc . command to create the .toc file for the bff package, What about Solaris & Linux ? (0 Replies)
Discussion started by: yb4779
0 Replies
8. Solaris
Hi,
I have a Solaris (SunOS 5.10) installed, by default with the en_AU.UTF-8 locale. I want to change it to en_US.UTF-8
With AU, I have no issues whatsoever, so I installed the language package and now locale -a shows "en_US.UTF-8".
Problem is even with LC_ALL set in etc/default/init, the... (2 Replies)
Discussion started by: asdfg
2 Replies
9. Emergency UNIX and Linux Support
Hello,
i have installed a package by using the command
sudo rpm -i filepackage.rpm
package filepackage is already installed
when i try to remove it, i get an error saying "is not installed":
sudo rpm -e filepackage.rpm
error: package filepackage is not installed
How can... (4 Replies)
Discussion started by: g_p
4 Replies
10. HP-UX
Hi,
I need to use the tool "meminfo" in the server, however am not able to as it says the package is not found.
I am also not able to find the package in the "HPUX Porting and Archive center".
Please guide on how to install this package?
Thanks,
Aigini (1 Reply)
Discussion started by: anaigini45
1 Replies
LEARN ABOUT HPUX
encrypt_r
crypt(3C) crypt(3C)
NAME
crypt - generate hashing encryption
SYNOPSIS
Obsolescent Interfaces
DESCRIPTION
crypt():
is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things)
to frustrate use of hardware implementations of a key search.
key is a user's typed password. salt is a two-character string chosen from the set this string is used to perturb the hashing algorithm in
one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a constant string. The returned value points
to the encrypted password. The first two characters are the salt itself.
Obsolescent Interfaces
generate hashing encryption.
WARNINGS
The return value for points to data whose content is overwritten by each call.
and are obsolescent interfaces supported only for compatibility with existing DCE applications. New multithreaded applications should use
SEE ALSO
crypt(1), login(1), passwd(1), getpass(3C), passwd(4), thread_safety(5).
STANDARDS CONFORMANCE
crypt(3C)