11-28-2018
This User Gave Thanks to hicksd8 For This Post:
10 More Discussions You Might Find Interesting
1. Linux
we hv a big enviroment networked.
we use squid proxy.
access allowed by src address previously.
we have win2000 network with ads.
my requirement is the proxy should allow domain users only for access.
how can i map my windows userdatabase with squid
is there any thing specific which has 2 b... (1 Reply)
Discussion started by: sriram.s
1 Replies
2. UNIX for Dummies Questions & Answers
Hi, I'm a newbie.
I need help on my first assignment in UNIX.
1. How do I determine the number of non-empty directories?
I was told to create a variable ARCHIVE, which points to the directory that contains the archive of the messages. But I'm so dumb and I don't even know how to do this.
2. In... (1 Reply)
Discussion started by: hygsg
1 Replies
3. UNIX for Dummies Questions & Answers
Hi every one
I have got very very bad Email, My question is:
How can I get all information about that f*** Email, I do mean
IP,reall name, Adress, user name, password etc... I wonder if there is any program or website that I can see that email, help me please
When I used windows Xp(old... (2 Replies)
Discussion started by: Cano
2 Replies
4. UNIX for Dummies Questions & Answers
Hi...
Why should I press F1 to start windows?! I have Xp in my computer... thx 4 help
Cano (1 Reply)
Discussion started by: Cano
1 Replies
5. Shell Programming and Scripting
I have a list of variables: ss1, ss5, ss6, ss8, st2 etc. (these values are not fixed, configurable). Now, I have assigned ss5=”test”. And I want to search in the list for the string “test” to know which variable is having the value “test”. Can u pls tell me how to do this? (10 Replies)
Discussion started by: kanchan_cp
10 Replies
6. Shell Programming and Scripting
Hi,
I need your help guys. I have two data files, namely 101.amberized.pdb & 101.pdb .
Now I want to replace the whole 3rd column of 101.amberized.pdb with the 3rd column of 101.pdb file. How do I do it in shell?
Thanks in advance
Parimal (11 Replies)
Discussion started by: chuchu
11 Replies
7. Shell Programming and Scripting
When i run this command, everything is ok. The file can be email and attached but soon after i download the file, the file cant be read. It's seem corrupted. Totally cant be read although i'm using context or wordfile. Original file generated at ek_bkup/alert/tbspace_datafile.log is OK.....
... (7 Replies)
Discussion started by: adzuanamir
7 Replies
8. UNIX for Dummies Questions & Answers
I have this code:
#!/bin/sh
awk 'BEGIN
NR == 2
repl = "PHI"
$4 = repl
print $0 'dryloop.txt
and this code:
#!/bin/sh
sed -e '1s/\|$/\|COMID\|/g' -e 's/^087.*$/&PHI\|g' hl.dsldryloop > textdry.txt
My code won't work. I want to change the COMID of lines starting with 087 .
this is my... (15 Replies)
Discussion started by: arkhei
15 Replies
9. Homework & Coursework Questions
How to find the ten most common words in a file (1 Reply)
Discussion started by: jass
1 Replies
10. Solaris
Greetings,
I hope my post finds you all OK,
I have a Netra240 server in an HLR inside a wireless CDMA Exchange, it works as a Hard Disk Unit (HDU) as shown in Local Management Terminal (LMT) as show in the picture 1 attached.
The power went down because of a power failure in main UPS, when... (2 Replies)
Discussion started by: Sharista
2 Replies
LEARN ABOUT CENTOS
efikeygen
EFIKEYGEN(1) General Commands Manual EFIKEYGEN(1)
NAME
efikeygen - command line tool for generating keys to use for PE image signing
SYNOPSIS
efikeygen <[--ca | -C] [--self-sign | -S] | [--signer=nickname]>
[--token=token | -t token]
[--nickname=nickname | -n nickname]
[--common-name=common name | -c common name]
[--url=url | -u url]
[--serial=serial | -s serial]
DESCRIPTION
efikeygen is a command line tool for generating keys and certificates to be used with pesign. These are standard X.509 certificates, and
can potentially be generated with any certificate creation tool. efikeygen simply sets generates keys with sensible options set for a key
to be used for PE image signing.
OPTIONS
--ca The certificate being generated is for a CA.
--self-sign
The generated certificate is to be self signed.
--signer=nickname
Nickname of certificate to be used to sign the generated certificate.
--token=token
Use the specified NSS token's certificate database.
--nickname=nickname
The nickname to use for the generated certificate.
--common-name=common-name
The X.509 Common Name for the generated certificate. This should be in rfc2253 syntax, i.e. "CN=John Doe,OU=editing,O=New York
Times,L=New York,ST=NY,C=US"
--url=url
Informational url regarding objects signed with this key.
--serial=serial number
Serial number for use with this key. A certificate is identified by its signer and its serial number, so it's best not to ever re-
use this value with the same signer.
SEE ALSO
pesign(1)
AUTHORS
Peter Jones
Mon Jan 07 2013 EFIKEYGEN(1)