I keep noticing that the SQRT code I wrote recently for a POSIX shell keeps appearing, (the green colour sticks out like a sore thumb).
So I decided to take a look on Google.
Guess what?
UNIX.COM comes first in Google's listing just from two words, see image...
These 4 Users Gave Thanks to wisecracker For This Post:
Hi I just stumbled on to these forums today, and I relatively new to unix. I am trying to figure out how to find the square root of a number using a shell script. I am using bash and I have searched and searched but cannot figure out square roots. Hopefully someone can point me in the right... (3 Replies)
I have a site, www.mySite.com
I have a folder where pages are served from, htdocs/
I have a folder containing one site at htdocs/drupal/. I'd like to be able to go to www.mySite.com and see the index.php page within the drupal folder, but instead I see a directory listing:
drupal
phpBB3
... (9 Replies)
Hi All,
I have a text file which looks like this:
computer programming
systems engineering
I want to get rid of these square brackets and also the text that is inside these brackets. So that my final text file looks like this:
computer programming
systems engineering
I am using... (3 Replies)
I have a file with say 50 columns, each containing a whole lot of data.
Each column contains data from a separate simulation, but each simulation is related to the data in the last (REFERENCE) column $50
I need to calculate the RMS deviation for each data line, i.e. column 1 relative to... (12 Replies)
Hi Guys,
Is there any way that we can know whether a website is fullly loaded with Linux command line ?? is there any command in Linux that can achieve that ??
Also,naturally I would also like to get the response code of the particular website/URL that i am testing for ??
Any help would be... (3 Replies)
Q: "Does Cisco 1921 router support,, act as an endpoint for, site to site VPNs using IPSec? If so, how many? "
A: If you get the Cisco 1921/k9 with the security services bundle then it will have built in security features. Cisco, typically includes IP Sec tunnels I believe as part of that... (0 Replies)
Dear friend,
I know for a single case, this could be finished quickly with Excel. But if we have hundreds of files, we definitely want to do it with a script or a FORTRAN code. Since I have no knowledge of FORTRAN, I tried to work out a script to do it. The math is very simple. we chose one atom... (4 Replies)
Discussion started by: liuzhencc
4 Replies
LEARN ABOUT PLAN9
attach
ATTACH(5) File Formats Manual ATTACH(5)NAME
attach, session, nop - messages to initiate activity
SYNOPSIS
Tnop tag[2]
Rnop tag[2]
Tsession tag[2] chal[8]
Rsession tag[2] chal[8] authid[28] authdom[48]
Tattach tag[2] fid[2] uid[28] aname[28] ticket[72] auth[13]
Rattach tag[2] fid[2] qid[8] rauth[13]
DESCRIPTION
The nop request does nothing overt but may be used to synchronize the channel between two service hosts initially.
The session request is used to initialize a connection between a client and a server. All outstanding I/O on the connection is aborted.
The set of messages between session requests is called a session. The host's user name (authid) and its authentication domain (authdom)
identify the key to be used when authenticating to this host. The exchanged challenges (chal) are used in the authentication algorithm.
If authid is a null string no authentication is performed in this session.
The tag should be NOTAG (value 0xFFFF) for a nop or session message.
The attach message serves as a fresh introduction from a user on the client machine to a server. The message identifies the user (uid) and
may select the file tree to access (aname). The ticket and auth arguments contains authorization data derived from the exchanged chal-
lenges of the session message; see auth(6).
As a result of the attach transaction, the client will have a connection to the root directory of the desired file tree, represented by
fid. An error is returned if fid is already in use. The server's idea of the root of the file tree is represented by the returned qid.
ENTRY POINTS
An attach transaction will be generated for kernel devices (see intro(3)) when a system call evaluates a file name beginning with Pipe(2)
generates an attach on the kernel device pipe(3). The mount system call (see bind(2)) generates an attach messages to the remote file
server. When the kernel boots, an attach is made to the root device, root(3), and then an attach is made to the requested file server
machine.
SEE ALSO auth(6)ATTACH(5)