08-25-2019
mm have you read this article?
kthrotlds CVE-2019-10149 Exim/cPanel | Server 24/7
its new Bitcoin mining virus and im working hard to remove it and yes, im succeed, and try to write shell script as cleaner script but my problem is "chattr" command which is used by virus.
i need higher lock command or script to lock files to prevent virus from open and lock files with chattr command
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have a perl script that just does a `du -sk -x` and formats it to look groovy ( the argument can be a directory but usually is like /usr/local/* )
#!/usr/bin/perl
use strict;
use warnings;
my $sizes = `du -x -sk @ARGV | sort -n`;
my $total = 0;
print "MegaBytes Name\n";
for(split... (1 Reply)
Discussion started by: insania
1 Replies
2. IP Networking
We're in the process of testing a mail server that we hope will replace our current one that's being hosted by our ISP. We learned a few things along the way and would like to avoid them if possible. The biggest hurdle is getting around port 25 (SMTP). Our work force is approx 75% consultants who... (1 Reply)
Discussion started by: sdotsen
1 Replies
3. Shell Programming and Scripting
Hi... I want to know whether if there is any alternative for cron.:confused:
I had written a script which checks for all system/application processes every 15 min(placed in cron though). But looks funny - what if cron daemon isn't running!! and expecting that script to update the OUTPUT FILE... (5 Replies)
Discussion started by: reddybs
5 Replies
4. Shell Programming and Scripting
How to find a particular line in a file without using grep? (3 Replies)
Discussion started by: proactiveaditya
3 Replies
5. HP-UX
Hello to all board members!!
I have a problem on a HP-UX system. I should write a script. Therefore I need to search after IP addresses in the output of a command.
On Debian this works: ifconfig | egrep -o "{1,3}\.{1,3}\.{1,3}\.{1,3}"
The script where i need this is not ifconfig, but... (2 Replies)
Discussion started by: vostro
2 Replies
6. Shell Programming and Scripting
I usually just browse the forum/google for answers, however I've been stuck on a problem for a number of hours now and I've decided to join up and actually ask I've searched the forum ad naseum in an attempt to find answer to my query, however so far I have been unsuccessful.
I'm no expert... (3 Replies)
Discussion started by: gtc
3 Replies
7. Shell Programming and Scripting
Hi Folks...
Is there an alternative for ikecert(SunOS) - man info - "manipulates the machine's on-filesystem public-key certificate databases" in linux?
Can we use pkcs7, pkcs8 or something like that?...
I also came across ssh-keygen and ssh-keygen2...
My best guess is to use ssh-certtool... (0 Replies)
Discussion started by: ahamed101
0 Replies
8. Shell Programming and Scripting
Hi techies ..
This is my first posting hr ..
Am facing a serious performance problem in counting the number of lines in the file. The input files i get will be in some 10 to 15 Gb of size or even sometimes more ..and I will load it to db
I have used wc -l to confirm whether the loader... (14 Replies)
Discussion started by: rajesh_2383
14 Replies
9. Solaris
Is there any other editor, installed by 'default' in Sparc Solaris10, besides vi?
I'd like to avoid installing anything new.
If not, how to make vi more user-friendly?
thanks. (8 Replies)
Discussion started by: orange47
8 Replies
10. UNIX for Beginners Questions & Answers
Attempting to recursive chattr directories while excluding a directory, however the command which works with chown does not seem to with chattr
find /mysite/public_html ! -wholename '/mysite/public_html/images' -type d -exec chattr -R +i {} \;
find /mysite/public_html -not -path "*/images*"... (2 Replies)
Discussion started by: carnagel
2 Replies
ND(1) General Commands Manual ND(1)
NAME
nd - Tiny little command line WebDAV interface
SYNOPSIS
nd [options] url
DESCRIPTION
nd provides a simple command line interface to the RFC 2518 (WebDAV) server. If no option is specified, HTTP GET command is issued and
writes response data to the standard output.
The options are as follows:
-c dest_url
COPY url to the dest_url. Use lock token if -t is specified.
-f Force override the content even when the MOVE or COPY target already exits.
-v View property information of url by PROPFIND. With -g option, only the specified property is displayed.
-p file PUT file content to the url. Use lock token if -t is specified.
-g name Specify the property name for -v option.
-e name=value
Edit the property with name to value using PROPPATCH .
-N namespace-url
Specify the property namespace URL for -e or -g option.
-P file POST file content to the url. -T is used for the Content-Type.
-T content_type
Use content_type as a Content-Type field value of the POST request. Default is `application/x-www-form-urlencoded'.
-d DELETE url. Use lock token if -t is specified.
-l LOCK url. Use -o as owner, -s as scope, -i as timeout.
-o owner
Specify lock owner. Default is USER environment variable.
-s scope
Specify lock scope (`exclusive' or `shared'). Default is `exclusive'.
-i timeout
Specify lock timeout interval. Default is `Infinite'.
-u UNLOCK url. -t option is required.
-t token
Specify the lock token.
-r Set command execution `Depth' as `Infinity'.
-a realm
Specify authentication realm.
-A realm
Specify proxy authentication realm.
-k MKCOL url
-m dest_url
MOVE url to the dest_url. Use lock token if -t is specified.
-S Print output using s-expression.
ENVIRONMENT VARIABLES
http_proxy, HTTP_PROXY
Specify HTTP proxy.
USER When manipulating a lock without an explicit owner option, the value of USER is used to set the owner of the file lock.
BUGS
A maintainer of the Debian package has implemented Digest authentication on top of the original software. However, the upstream source uses
the nanoHTTP code from libxml2 to implement the HTTP transport. Due to properties inherent in that code for detecting and following redi-
rected target sites, there is no way to pull out the new address in order to insert it into the hashes necessary for the Digest method. Nd
will therefore incorrectly answer with 'Bad request' to any method call aimed at such sites. Using the correct logical name for the target
will, however, produce a correct response from Nd.
AUTHORS
Yuuichi Teranishi (teranisi@gohome.org).
SEE ALSO
libxml(4).
February 25, 2002 ND(1)