Some progress. Managed to create a basic indexed array and have it print all contents to shell per following:
What I'm stuck with now is finding away to interactively read from shell and either output or execute a specific index. As mentioed earlier, I guess the array should contain only references to the wpa passphrase, which can then be joined to a standard wpa_supplicant + arguments...one step at a time though I s'pose .
Good day!
I am trying to learn how to use the "sed" editor, to perform multiple edits on multiple files in multiple directories.
I have one script that tries to call up each file and process it according to the edits listed in a second script. I am using a small input text to test these, at... (12 Replies)
hi , i added ls -F to .profile. and i need to do ./.profile for the effect to take effect BUT i didnt and YET the next day when i came to work and log in, the changes took effect. i am on aix.
please explain..
thanks (4 Replies)
Dear Experts
Why we always hear that unix operating system is Multi User and Multi task. What does these two means. I have looked at some books and documents but couldn't find aclear explenation. Can we say Windows operating system is also multi user and multi task??
Thanks for your help in... (6 Replies)
hi..
I want to customize a user in unix which could have only ftp access and NO TELNET ACCESS! .....
As being a newbie to unix to my understanding the user .profile has to be edited but if someone can explain how to edit it so that i can block telnet access for that user.....Is /etc/profile has... (5 Replies)
Hello
I really wonder what's trap in etc/profile and in each user .profile.
I try to google for it but I think I have no luck. Mostly hit is SNMP traps which I think it is not the same thing.
I want to know ...
1. What's a "trap 2 3" means and are there any other value I can set... (4 Replies)
Hi,
I have a problem where I need to make this input:
nameRow1a,text1a,text2a,floatValue1a,FloatValue2a,...,floatValue140a
nameRow1b,text1b,text2b,floatValue1b,FloatValue2b,...,floatValue140b
look like this output:
nameRow1a,text1b,text2a,(floatValue1a - floatValue1b),(floatValue2a -... (4 Replies)
I am trying to write a large X app. I have successfully modified my xorg.conf to setup 4 monitors on an NVIDIA Quatro5200. I am trying to modify a simple hello world application to open a window on three of the four monitors. depending on the changes to loop the window creation section and event... (2 Replies)
I just got FreeBSD up and running with an XFCE desktop on an old Gateway laptop. It works great, except the wireless setup is scaring me. I can connect to my home WiFi fine most of the time, but I'm concerned about other WiFi that I will need to connect to away from home.
I understand that I can... (1 Reply)
I'm confused with what to use (awk or grep) in this case as i need to select 2 corresponding patterns. "SName" & "ESys" in a appln config file which looks like this;
SName=abc123
ESys=xyz456
Host=xxx
Port=yyy
I used awk and didn't get any output for multi-pattern search.
$ awk -F"="... (7 Replies)
LOGPROF.CONF(5) AppArmor LOGPROF.CONF(5)NAME
logprof.conf - configuration file for expert options that modify the behavior of the AppArmor aa-logprof(1) program.
DESCRIPTION
The aa-logprof(1) program can be configured to have certain default behavior by the contents of logprof.conf.
The [qualifiers] section lists specific programs that should have a subset of the full ix/px/ux list when asking what mode to execute it
using.
Since creating a separate profile for /bin/bash is dangerous, we can specify that for /bin/bash, only (I)nherit, (U)nconstrained, and
(D)eny should be allowed options and only those will show up in the prompt when we're asking about adding that to a profile.
Likewise, if someone currently exec's /bin/mount in ix or px mode, things won't work, so we can provide only (U)nconstrained and (D)eny as
options.
And certain apps like grep, awk, sed, cp, and mkdir should always inherit the parent profile rather than having their own profile or
running unconfined, so for them we can specify that only (I)nherit and (D)eny are the allowed options.
Any programs that are not listed in the qualifiers section get the full (I)nherit / (P)rofile / (U)nconstrained / (D)eny option set.
If the user is doing something tricky and wants different behavior, they can tweak or remove the corresponding line in the conf file.
The [defaulthat] section lists changehat-aware programs and what hat aa-logprof(1) will collapse the entries to for that program if the
user specifies that the access should be allowed, but should not have it's own hat.
The [globs] section allows modification of the logprof rule engine with respect to globbing suggestions that the user will be prompted
with.
The format of each line is-- "<perl glob> = <apparmor glob>".
When aa-logprof(1) asks about a specific path, if the perl glob matches the path, it replaces the part of the path that matched with the
corresponding apparmor glob and adds it to the list of globbing suggestions.
Lines starting with # are comments and are ignored.
EXAMPLE
[qualifiers]
# things will very likely be painfully broken if bash has it's own profile
/bin/bash = iu
# mount doesn't work if it's confined
/bin/mount = u
# these helper utilities should inherit the parent profile and
# shouldn't have their own profiles
/bin/awk = i
/bin/grep = i
/bin/sed = i
[defaulthat]
/usr/sbin/sshd = EXEC
/usr/sbin/httpd2 = DEFAULT_URI
/usr/sbin/httpd2-prefork = DEFAULT_URI
[globs]
# /foo/bar/lib/libbaz.so -> /foo/bar/lib/lib*
/lib/lib[^/]+so[^/]*$ = /lib/lib*so*
# strip kernel version numbers from kernel module accesses
^/lib/modules/[^/]+/ = /lib/modules/*/
# strip pid numbers from /proc accesses
^/proc/d+/ = /proc/*/
BUGS
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO apparmor(7), apparmor.d(5), aa-enforce(1), aa-complain(1), aa-disable(1), aa_change_hat(2), aa-logprof(1), aa-genprof(1), and
<http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 LOGPROF.CONF(5)