12-12-2016
Since you can open the file in notepad, can you
post the first 100 lines of the file?
Are there any diskettes or cd's floating around his office that might be bootable and contain the restore program(s)?
/dev/tty2a and /dev/lp0 are both valid file names for SCO products Xenix and SCO Unix.
10 More Discussions You Might Find Interesting
1. AIX
Dear All,
I have 200GB mount point, but i have only 94GB files. i am taking this files as a tar with gzip backup. but my problems is if this files will be Reach 150GB or more what can i do?
Please advice me
can i use tar backup or any other tool for the backup.
thanks in... (5 Replies)
Discussion started by: rkgali
5 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I performed backup on tape and I want to append more files to my previous backup on the same backup tape. But before I do that I need to know the backup file size of the first backup I performed so that I know the available size on the backup tape. Can someone help me what command I will use... (0 Replies)
Discussion started by: ayhanne
0 Replies
3. Shell Programming and Scripting
Hiii,
Here is the part o fmy script-
for file in $FileList
do
if ];
then
echo "Skips $file file. It is todays file"
if ];then
cp $file $BackupLocation 2>/dev/null
... (3 Replies)
Discussion started by: namishtiwari
3 Replies
4. Shell Programming and Scripting
hi all,
Please help me with rsync.
I configured rsync to preserve timestamps using the -a option.
When i renamed fileA to fileB on source machine I have to copies at the backup server.
The aim is to keep the most recent file.
fileA & fileB has same contents.
When i renamed fileB to... (2 Replies)
Discussion started by: coolatt
2 Replies
5. Shell Programming and Scripting
Hi,
Another rookie here.
I have a script I am developing to backup files from various directories onto a windows machine.
Script description:
- mv files from various directories
- tar all files in that directory
- export to windows server for safe keeping, external backups.
The... (5 Replies)
Discussion started by: mcclunyboy
5 Replies
6. Solaris
I know how to check if any file has a unix process using a file by looking at 'lsof <fullpath/filename>' command.
I think using lsof is very expensive. Also to make it accurate we need to inlcude fullpath of the file.
Is there another command that can tell if a file has a truely active... (12 Replies)
Discussion started by: kchinnam
12 Replies
7. UNIX for Advanced & Expert Users
I am trying to backup my .bash_history and I want to keep every version of the backup. I am thinking to put one of these in my crontab.
0 0 * * 0,3 cat .bash_history > boo
0 0 * * 0,3 cp .bash_history boo
I would like the backups to be called boo1, boo2, boo3, etc. I would like to keep... (7 Replies)
Discussion started by: cokedude
7 Replies
8. Shell Programming and Scripting
Im a fairly new linux user and im trying to learn how to do a backup shell script. i have this so far,
#! /bin/bash
backup_files="/home/clint/music"
dest="home/clint/backups'
day=$(date +%A)
hostname=$(hostname -s)
archive_file="$hostname-$day.tgz"
tar czf $dest/$archive_file... (2 Replies)
Discussion started by: thatdudeman
2 Replies
9. UNIX for Dummies Questions & Answers
I want to create a tar file that backup all my recent work. I have no idea how Tar file works and I am new to Unix Please help (1 Reply)
Discussion started by: GGBEASTBOI
1 Replies
10. Shell Programming and Scripting
Hello,
I have been working on script in which search and replace the multiple pattern.
1. update_params.sh read the multiple pattern from input file ParamMapping.txt(old_entry|New_entry) and passing this values one by one to change_text.sh
2. change_text.sh read... (0 Replies)
Discussion started by: ketanraut
0 Replies
LEARN ABOUT X11R4
autrace
AUTRACE:(8) System Administration Utilities AUTRACE:(8)
NAME
autrace - a program similar to strace
SYNOPSIS
autrace program [-r] [program-args]...
DESCRIPTION
autrace is a program that will add the audit rules to trace a process similar to strace. It will then execute the program passing arguments
to it. The resulting audit information will be in the audit logs if the audit daemon is running or syslog. This command deletes all audit
rules prior to executing the target program and after executing it. As a safety precaution, it will not run unless all rules are deleted
with auditctl prior to use.
OPTIONS
-r Limit syscalls collected to ones needed for analyzing resource usage. This could help people doing threat modeling. This saves space
in logs.
EXAMPLES
The following illustrates a typical session:
autrace /bin/ls /tmp
ausearch --start recent -p 2442 -i
and for resource usage mode:
autrace -r /bin/ls
ausearch --start recent -p 2450 --raw | aureport --file --summary
ausearch --start recent -p 2450 --raw | aureport --host --summary
SEE ALSO
ausearch(8), auditctl(8).
AUTHOR
Steve Grubb
Red Hat Jan 2007 AUTRACE:(8)