01-15-2017
Quote:
Originally Posted by
Padow1
Do you have a specific question about their use?
No, he doesn't. He has a homework assignment, which he is not competent to fulfill and even too lazy to look it up in the way you suggested.
Our traditional answer to such behavior is stony silence. Case closed (and thread too).
bakunin
10 More Discussions You Might Find Interesting
1. Filesystems, Disks and Memory
In Windows XP, there are 3 default access control groups namely: Administrators, Users and Power Users. Is there default access control groups in Unix system? If there is, what are they?
newbie. (1 Reply)
Discussion started by: zertoir
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I was wondering if someone could help me with ACL's. I have a file, say output, created by the root user, member of group other. Its permissions are rwxr--r--. I want only people in group other to have rwx access, but I also want one other user, stephen, member of some_other_group to have rwx... (1 Reply)
Discussion started by: sroberts82
1 Replies
3. Shell Programming and Scripting
Hey all, I have a directory (own by user: b; group: grpB) which I want a user (user: a; group: grpA) to be able to read and execute from, I wonder if I should add user a to this particular directory's ACL or that I would add group grpB to user a's subgroup?
I would like to know the difference... (3 Replies)
Discussion started by: mpang_
3 Replies
4. Solaris
Hi,
I want to set access control list on folders but it should be recursively,
any Idea? command (1 Reply)
Discussion started by: manoj.solaris
1 Replies
5. UNIX for Dummies Questions & Answers
Folks;
I need some help with these:
1. understanding how to control access rights and manage visibility using FTP in Solaris, in other words, I need to use FTP in Solaris to be able to give some users access to add/modify data to/from the UNIX server.
2. How can i control the space allowed for... (2 Replies)
Discussion started by: Katkota
2 Replies
6. UNIX for Dummies Questions & Answers
In OS like windows, I can define an Access Control List (ACL) and specify which accounts and groups have what access to a specific file.
I assume U*X, Linux and cygwin on windows have this ACL feature too. I'm using cygwin on windows. What do I type at a bash prompt to allow a specific user... (1 Reply)
Discussion started by: siegfried
1 Replies
7. UNIX for Dummies Questions & Answers
I need to control intenet access @ work. xample. I need PC 1 to only be able to access these five sites and add to the list as needed. Can anyone pint me a direction. (1 Reply)
Discussion started by: fruiz
1 Replies
8. AIX
Hello,
I've configurated a LDAP user authentication on AIX V6 against Active Directory (Windows Server 2008).
The Tree is built as follows:
test (DC)
|--- testgroup (group with members: user1, user2)
|
|--- sys1 (OU)
| |--- sys1group (group with member: user1)
|
|--- sys2 (OU)... (0 Replies)
Discussion started by: xia777
0 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I am using eTrust Access Control at work. I have got no output after type checklogin. I wonder what is the reason. Does anyone know? Thanks
eTrustAC selang v8.00a-1555.13 - eTrustAC command line interpreter
Copyright (c) 2006 CA. All rights reserved.
eTrustAC> checklogin user1... (0 Replies)
Discussion started by: uuontario
0 Replies
10. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LEARN ABOUT DEBIAN
hash::case::lower
Hash::Case::Lower(3pm) User Contributed Perl Documentation Hash::Case::Lower(3pm)
NAME
Hash::Case::Lower - hash with enforced lower cased keys
INHERITANCE
Hash::Case::Lower
is a Hash::Case
is a Tie::StdHash
SYNOPSIS
use Hash::Case::Lower;
tie my(%lchash), 'Hash::Case::Lower';
$lchash{StraNGeKeY} = 3;
print keys %lchash; # strangekey
DESCRIPTION
Hash::Case::Lower extends Hash::Case, which lets you play various trics with hash keys. In this implementation, the fake hash is case
insensitive and the keys stored in lower-case.
METHODS
Constructors
$obj->addHashData(HASH)
See "Constructors" in Hash::Case
$obj->addPairs(PAIRS)
See "Constructors" in Hash::Case
$obj->setHash(HASH)
See "Constructors" in Hash::Case
tie(HASH, 'Hash::Case::Lower', [VALUES,] OPTIONS)
Define HASH to have only lower cased keys. The hash is initialized with the VALUES, specified as ref-array (with key value pairs) or
ref-hash. Currently, there are no OPTIONS defined.
SEE ALSO
This module is part of Hash-Case distribution version 1.02, built on March 09, 2012. Website: http://perl.overmeer.net/hash-case/
LICENSE
Copyrights 2002-2003,2007-2012 by Mark Overmeer. For other contributors see ChangeLog.
This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. See
http://www.perl.com/perl/misc/Artistic.html
perl v5.14.2 2012-03-09 Hash::Case::Lower(3pm)