12-14-2016
Well, I'm still not much further on. Do you want the processing to run on the POS or the server?
Running on the POSPerhaps NFS or Samba sharing the files to the POS. You have to consider security so no-one else can pick it up.
Running on the serverThe POS can send a connection to the server to do the work then return. You still have to consider security though on how you authenticate the incoming connection.
Are you worried about the POS being physically removed or just hacked? Either way, it might still be possible to access the code & data by mimicking what the POS does routinely.
This could be a major design project in the making, but you know your business far better than us, so you need to clarify what you want to do and then we can see how we can help. What does your POS do so far?
Robin
8 More Discussions You Might Find Interesting
1. HP-UX
Hello All,
I have 2 qries about X connections on HP-UX :
1.How/where to determine whether "X connections" to the server are controlled.
2. How/where to determine whether "X11 connection" are tunnelled via ssh.
3. How/where to determine the "Time in minutes before unattended X terminals... (0 Replies)
Discussion started by: abhayh
0 Replies
2. Linux
how can i see active network connections (1 Reply)
Discussion started by: youmna
1 Replies
3. IP Networking
hello i have a ubuntu ssh server that i can acess from any of my comnputers but only if they are on the same wireless network as the server. i tested trhis my tehtehring my samsung blackjack to my windows partition and installing openssh to windows it works when windows is on the wireless but no... (1 Reply)
Discussion started by: old noob
1 Replies
4. IP Networking
Hello,
I have a centralized syslog server, and am wondering if there is a way to log all network connections to it (Primarily incoming, such as FTP, httpd, SSH, etc). Essentially what I would like is to get the information seen in netstat or lsof logged line by line, realtime. Is there a... (3 Replies)
Discussion started by: abstrcrndm
3 Replies
5. IP Networking
I rotate between a static lan, dhcp lan, and various wireless networks daily. Is there a way to set preferred network connections? I use some static ip's daily, some static ip's like once a month, and almost never use the dhcp lan. The same I do with my various wireless networks. Some I use daily... (0 Replies)
Discussion started by: cokedude
0 Replies
6. IP Networking
I want to know potential problems with the following scenario OR if it is an ok way to have my network setup:
I have 2 WAN connections to the internet. I have each WAN connection plugged into its own router. Router DD-WRT is gateway for servers (192.0.10.50). Router Tomato is gateway for pc's... (1 Reply)
Discussion started by: herot
1 Replies
7. Red Hat
Hi,
I have 2 machines in production environment:
1. redhat machine for application
2. DB machine (oracle)
The application doing a lot of small read&writes from and to the DB machine.
The problem is that after some few hours the network from the application to the DB becomes very slow and... (4 Replies)
Discussion started by: moshesa
4 Replies
8. Shell Programming and Scripting
Could you help me writing a script showing which network connections are currently active?
Means output should be something like:
"eth0, wlan1, wlan3"
Problem:
The output is supposed to happen on a 16x2 LCD Display.
Currently I am doing a "Ifconfig" as output, but its too fast for the... (2 Replies)
Discussion started by: lordofazeroth
2 Replies
LEARN ABOUT DEBIAN
grepcidr
GREPCIDR(1) General Commands Manual GREPCIDR(1)
NAME
grepcidr -- Filter IP addresses matching IPv4 CIDR/network specification
SYNOPSIS
grepcidr [-V] [-c] [-v] [-e pattern | -f file]
DESCRIPTION
This manual page documents briefly the grepcidr command.
This manual page was written for the Debian distribution because the original program does not have a manual page.
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbi-
trary networks specified by an address range. As with grep, there are options to invert matching and load patterns from a file. grepcidr
is capable of comparing thousands or even millions of IPs to networks with little memory usage and in reasonable computation time.
OPTIONS
-V Show software version
-c Display count of the matching lines, instead of showing the lines
-v Invert the sense of matching, to select non-matching IP addresses
-e Specify pattern(s) on command-line
-f Obtain CIDR and range pattern(s) from file
EXAMPLES
grepcidr -f ournetworks blocklist > abuse.log
Find our customers that show up in blocklists
grepcidr 127.0.0.0/8 iplog
Searches for any localnet IP addresses inside the iplog file
grepcidr "192.168.0.1-192.168.10.13" iplog
Searches for IPs matching indicated range in the iplog file
script | grepcidr -vf whitelist > blacklist
Create a blacklist, with whitelisted networks removed (inverse)
grepcidr -f list1 list2
Cross-reference two lists, outputs IPs common to both lists
AUTHOR
This manual page was written by Ryan Finnie ryan@finnie.org for the Debian system (but may be used by others). Permission is granted to
copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 any later version published by
the Free Software Foundation.
On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL.
GREPCIDR(1)