03-22-2017
5 More Discussions You Might Find Interesting
1. New to Unix. Which books should I read?
Yesterday I saw a closed post by xramm which gave a link to O'Reilly online books. Vino closed it because of copyright issues.
However, O'Reilly has a section on their website where you can read online copies of their own books - obviously not a copyright problem. Most are fairly old editions,... (0 Replies)
Discussion started by: rhfrommn
0 Replies
2. Shell Programming and Scripting
File_A contains Strings:
a
b
c
d
File_B contains Strings:
a
c
z
Need to have script written in either sh or ksh. Derive resultant files (File_New_A and File_New_B) from lists File_A and File_B where string elements in File_New_A and File_New_B are listed below.
Resultant... (7 Replies)
Discussion started by: mlv_99
7 Replies
3. UNIX for Advanced & Expert Users
Hi
original video clip
> ls -alh reallynotpr0n.flv
-rw-r--r-- 1 jonny staff 165M Nov 18 19:57 reallynotpr0n.flvtrying to cut only last 3 minutes of the clip out.
> ffmpeg -i reallynotpr0n.flv -vcodec copy -acodec copy -ss 00:52:00 -t 00:03:48 trimmed_video.avi
ffmpeg version 0.7.7,... (3 Replies)
Discussion started by: slashdotweenie
3 Replies
4. IP Networking
Hi,
I am trying to establish vpn between my linux server and cisco asa at client side.
I installed openswan on my cent os.
Linux Server
eth0 - 182.2.29.10
Gateway - 182.2.29.1
eth1 - 192.9.200.75
I have simple IPtables Like
WAN="eth0"
LAN="eth1" (0 Replies)
Discussion started by: ashokvpp
0 Replies
5. IP Networking
Q: "Does Cisco 1921 router support,, act as an endpoint for, site to site VPNs using IPSec? If so, how many? "
A: If you get the Cisco 1921/k9 with the security services bundle then it will have built in security features. Cisco, typically includes IP Sec tunnels I believe as part of that... (0 Replies)
Discussion started by: Ayaerlee
0 Replies
faked(1) Debian GNU/Linux manual faked(1)
NAME
faked - daemon that remembers fake ownership/permissions of files manipulated by fakeroot processes.
SYNOPSIS
faked [--debug] [--foreground] [--cleanup] [--key msg-key] [--load] [--save-file save-file] [--port TCP-port]
DESCRIPTION
If a fakeroot process wants to change the ownership of a file, then faked is the process that remembers that new owner. If later the same
fakeroot process does a stat() for that filename, then the libfakeroot wrapped stat() call will first ask faked for the fake ownership etc
of that file, and then report it.
OPTIONS
--debug
Print debugging information on stderr.
--foreground
Don't fork into the background.
--cleanup number
Cleanup the semaphores.
--key key-number
Don't allocate a new communication channel, but use channel specified by key. (If the specified channel doesn't exist, it's cre-
ated).
--save-file save-file
Save the environment to save-file on exit.
--load Load a previously saved environment from the standard input.
--unknown-is-real
Use real ownership of previously-unknown files instead of setting them to root:root.
--port tcp-port
Use TCP port tcp-port.
BUGS
None so far. Be warned, though: although I've written quite a few much larger (and smaller) programs, I've never written anything that was
as tiny as fakeroot, had as many bugs as fakeroot, and still was as usable as, say, fakeroot version 0.0_3, the first version that could be
used to build itself.
COPYING
fakeroot is distributed under the GNU General Public License. (GPL 2.0 or greater).
AUTHORS
joost witteveen
<joostje@debian.org>
Clint Adams
<clint@debian.org>
Timo Savola
MANUAL PAGE
mostly by J.H.M. Dassen <jdassen@debian.org> mods/additions by joost and Clint.
SEE ALSO
fakeroot(1), dpkg-buildpackage(1), debuild(1) /usr/share/doc/fakeroot/DEBUG
Debian Project 17 June 2004 faked(1)