Hi amit14august...
You must be using a bash version 4.x.x as it cannot be used on anything previous.
On OSX 10.12.4, DEFAULT bash terminal below occurs...
So it is not backwards compatible.
To find your bash version:-
It is not easy to include users who do not have versions of languages that you write for and possibly unable to upgrade to. So be aware when you write your code to state which version of language you are using as that helps the user to decide whether or not to run your code.
We all learn the hard way.
Good luck and keep up with the programming learning curve.
We look forwards to seeing more from you...
Bazza.
This User Gave Thanks to wisecracker For This Post:
Hello everyone. I am new to these forums and also new to Unix. And by saying "new to Unix" I mean I have never used it and 10 minutes ago was asked to start learning. So here I am.
I was wondering if anyone could help me find out how long it would take to write code in Unix that will do the... (1 Reply)
Hi there..
I know this is a kind low question, but do anyone know where I can find some hints and or clues for the "adventure" game on UNIX ?
( /usr/games/adventure ).
I already searched on this forum but didnt find the answer to my question.
Thanks a lot.... (3 Replies)
Hi, there are some servers here at work which issue a Safeword challenge after I login. Can anyone tell me exactly how the challenge/response system works? In particular, how are the valid keys decided? (2 Replies)
I have the following text
Microsoft iSCSI Initiator version 2.0 Build 3497
Targets List:
iqn.2001-05.com.equallogic:0-8a0906-daef43402-138000002a4477ba-grsrv12-extra
iqn.2001-05.com.equallogic:0-8a0906-986f43402-520000002b447951-exchange
... (9 Replies)
Here's a regex substitution operation that has stumped me with sed:
How do you convert lines like this:
first.key ?{x.y.z}
second.key ?{xa.ys.zz.s}
third.key ?{xa.k}
to:
first.key ?{x_y_z}
second.key ?{xa_ys_zz_s}
third.key ?{xa_k}
So i'm basically converting all the... (11 Replies)
Ok then i Have a challenge for you :
Give me PS1 so that it always display the least 2 levels of directory
(except if i am above of course)
I want it this way :
so if i go to
/
/home/
/home/user
/home/user/whatever
/home/user/whatever1/whatever2
my PS1 should respectively... (12 Replies)
I've been given a directory full of subdirectories full of logfiles of the same name:
/logfiles/day1/file1/blockednodes.csv
day1-14
file1-48
The above is the actual directory structure for 14 days worth of a logfile that is generated every 30 minutes. It's been done this way to preserve the... (15 Replies)
Hi,
I am designing snake and ladder game in unix. I am writing my script in bash shell in Solaris version.
This game is designed by me for which I would like to give access to two players.
When these players execute the game, there should be communication between the three participants(game... (7 Replies)
I have searched through google, and this forum to try and find the answer, but alas, nothing quite hits the whole answer.
I am trying to read the last line (or lines) of some log files. I do this often.
The files are named sequentially, using the date as part of the file name, and appending... (18 Replies)
Discussion started by: BatterBits
18 Replies
LEARN ABOUT NETBSD
dm.conf
DM.CONF(5) BSD File Formats Manual DM.CONF(5)NAME
dm.conf -- dungeon master configuration file
DESCRIPTION
The dm.conf file is the configuration file for the dm(8) program. It consists of lines beginning with one of three keywords, badtty, game,
and time. All other lines are ignored.
Any tty listed after the keyword badtty may not have games played on it. Entries consist of two white-space separated fields: the string
badtty and the ttyname as returned by ttyname(3). For example, to keep the uucp dialout, ``tty19'', from being used for games, the entry
would be:
badtty /dev/tty19
Any day/hour combination listed after the keyword time will disallow games during those hours. Entries consist of four white-space separated
fields: the string time, the unabbreviated day of the week and the beginning and ending time of a period of the day when games may not be
played. The time fields are in a 0 based, 24-hour clock. For example, the following entry allows games playing before 8AM and after 5PM on
Mondays:
time Monday 8 17
Any game listed after the keyword game will set parameters for a specific game. Entries consist of five white-space separated fields: the
keyword game, the name of a game, the highest system load average at which the game may be played, the maximum users allowed if the game is
to be played, and the priority at which the game is to be run. Any of these fields may start with a non-numeric character, resulting in no
game limitation or priority based on that field.
The game default controls the settings for any game not otherwise listed, and must be the last game entry in the file. Priorities may not be
negative. For example, the following entries limits the game ``hack'' to running only when the system has 10 or less users and a load aver-
age of 5 or less; all other games may be run any time the system has 15 or less users.
game hack 5 10 *
game default * 15 *
FILES
/etc/dm.conf The dm(8) configuration file.
SEE ALSO setpriority(2), ttyname(3), dm(8)BSD May 31, 1993 BSD