Sponsored Content
Top Forums UNIX for Beginners Questions & Answers UNIX Commands - Similarities & Differences Post 303044523 by bdittmar on Tuesday 25th of February 2020 08:10:54 AM
Old 02-25-2020
This User Gave Thanks to bdittmar For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Solaris Unix vs HP Unix, Could someone point out the major differences.

Solaris Unix vs HP Unix, Could someone point out the major differences. I have been performing Support to Solaris Unix for about 6 years, now I am interviewing for a HP Unix position. Could someone point out the major differences? Should it be an easy transition? Thanks (1 Reply)
Discussion started by: Hack
1 Replies

2. UNIX for Dummies Questions & Answers

Problem running plsql & unix commands in 1 script

Hi, I need help again. When I run this shell script, it only runs the unld_date.sql piece and exits. How can I structure this to run all the way to the end? When I don't have the unld_date.sql piece in here, everything runs fine from the date compare piece all the way to the end. Thanks in... (5 Replies)
Discussion started by: siog
5 Replies

3. UNIX for Dummies Questions & Answers

Socket Handling Differences Between Linux & Unix?

Sorry if this is a stupid question! I have been developing a Java application that I am deploying on both Unix and Linux servers, which uses lots of socket handling. When the server side connection is dropped by the server un-gracefully I have been seeing close_waits and null connections. ... (0 Replies)
Discussion started by: Vinnie
0 Replies

4. UNIX for Dummies Questions & Answers

Differences between different versions of Unix

I sent a private message to one of the administrators/moderators, but I thought I'd ask here publicly after some thought. I'm getting into Unix on my Mac (BSD). I was just wondering what the differences are between versions of Unix -- I want to learn more about it, but would it be better to... (1 Reply)
Discussion started by: Straitsfan
1 Replies

5. Shell Programming and Scripting

Need help... Differences in Communication commands

What is the difference between the following commands. Please with example? rsh ssh scp rcp rlogin ftp telnet Cheers.. (3 Replies)
Discussion started by: gwgreen1
3 Replies

6. Shell Programming and Scripting

Differences in printed commands after execution with same code

I have a korn shell script that executes a function which is stored in a common library. In the function there is obviously some code. Here is the line of code in the function in question: temp=`echo $status_cnt|tr -d ` When the shell script executes with set -x, I'm seeing that on most... (2 Replies)
Discussion started by: mjf
2 Replies

7. UNIX for Dummies Questions & Answers

Red Hat 7.3 and UNIX similarities and differences::

I recently started an introductory course in UNIX / Linux Red Hat 7.3. The textbook came with the Red Hat 7.3 OS included but no UNIX. Are the commands and syntax so closely related that if I learn one I automatically know how to use the other. What are the similarities and differences. When... (2 Replies)
Discussion started by: barbedwire615
2 Replies

8. Shell Programming and Scripting

Renaming files & folder according to the similarities in filenames

hello does someone want to help me for this one ? i want to rename files & a folder according to the similarities in filenames for example : the file with the good name cglogo tougl1953 dgmel bogd 01 -- ttgductoog ggdté gollogtd.ext1the others files needed to be renamed cglogo... (5 Replies)
Discussion started by: mc2z674gj
5 Replies

9. UNIX for Dummies Questions & Answers

UNIX vs windows, differences

Hello! Please, I am sorry, I am the absolute beginner, If I have unix as os instead of lets say windows, then can I go to INTERNET and how? Are there some other BIG differences? Many thanks!!! (1 Reply)
Discussion started by: pinklemon
1 Replies
ND(1)							      General Commands Manual							     ND(1)

NAME
nd - Tiny little command line WebDAV interface SYNOPSIS
nd [options] url DESCRIPTION
nd provides a simple command line interface to the RFC 2518 (WebDAV) server. If no option is specified, HTTP GET command is issued and writes response data to the standard output. The options are as follows: -c dest_url COPY url to the dest_url. Use lock token if -t is specified. -f Force override the content even when the MOVE or COPY target already exits. -v View property information of url by PROPFIND. With -g option, only the specified property is displayed. -p file PUT file content to the url. Use lock token if -t is specified. -g name Specify the property name for -v option. -e name=value Edit the property with name to value using PROPPATCH . -N namespace-url Specify the property namespace URL for -e or -g option. -P file POST file content to the url. -T is used for the Content-Type. -T content_type Use content_type as a Content-Type field value of the POST request. Default is `application/x-www-form-urlencoded'. -d DELETE url. Use lock token if -t is specified. -l LOCK url. Use -o as owner, -s as scope, -i as timeout. -o owner Specify lock owner. Default is USER environment variable. -s scope Specify lock scope (`exclusive' or `shared'). Default is `exclusive'. -i timeout Specify lock timeout interval. Default is `Infinite'. -u UNLOCK url. -t option is required. -t token Specify the lock token. -r Set command execution `Depth' as `Infinity'. -a realm Specify authentication realm. -A realm Specify proxy authentication realm. -k MKCOL url -m dest_url MOVE url to the dest_url. Use lock token if -t is specified. -S Print output using s-expression. ENVIRONMENT VARIABLES
http_proxy, HTTP_PROXY Specify HTTP proxy. USER When manipulating a lock without an explicit owner option, the value of USER is used to set the owner of the file lock. BUGS
A maintainer of the Debian package has implemented Digest authentication on top of the original software. However, the upstream source uses the nanoHTTP code from libxml2 to implement the HTTP transport. Due to properties inherent in that code for detecting and following redi- rected target sites, there is no way to pull out the new address in order to insert it into the hashes necessary for the Digest method. Nd will therefore incorrectly answer with 'Bad request' to any method call aimed at such sites. Using the correct logical name for the target will, however, produce a correct response from Nd. AUTHORS
Yuuichi Teranishi (teranisi@gohome.org). SEE ALSO
libxml(4). February 25, 2002 ND(1)
All times are GMT -4. The time now is 06:29 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy