02-25-2020
This User Gave Thanks to bdittmar For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Solaris Unix vs HP Unix, Could someone point out the major differences.
I have been performing Support to Solaris Unix for about 6 years, now I am interviewing for a HP Unix position. Could someone point out the major differences? Should it be an easy transition?
Thanks (1 Reply)
Discussion started by: Hack
1 Replies
2. UNIX for Dummies Questions & Answers
Hi, I need help again. When I run this shell script, it only runs the unld_date.sql piece and exits. How can I structure this to run all the way to the end? When I don't have the unld_date.sql piece in here, everything runs fine from the date compare piece all the way to the end. Thanks in... (5 Replies)
Discussion started by: siog
5 Replies
3. UNIX for Dummies Questions & Answers
Sorry if this is a stupid question!
I have been developing a Java application that I am deploying on both Unix and Linux servers, which uses lots of socket handling. When the server side connection is dropped by the server un-gracefully I have been seeing close_waits and null connections.
... (0 Replies)
Discussion started by: Vinnie
0 Replies
4. UNIX for Dummies Questions & Answers
I sent a private message to one of the administrators/moderators, but I thought I'd ask here publicly after some thought.
I'm getting into Unix on my Mac (BSD). I was just wondering what the differences are between versions of Unix -- I want to learn more about it, but would it be better to... (1 Reply)
Discussion started by: Straitsfan
1 Replies
5. Shell Programming and Scripting
What is the difference between the following commands. Please with example?
rsh
ssh
scp
rcp
rlogin
ftp
telnet
Cheers.. (3 Replies)
Discussion started by: gwgreen1
3 Replies
6. Shell Programming and Scripting
I have a korn shell script that executes a function which is stored in a common library. In the function there is obviously some code. Here is the line of code in the function in question:
temp=`echo $status_cnt|tr -d `
When the shell script executes with set -x, I'm seeing that on most... (2 Replies)
Discussion started by: mjf
2 Replies
7. UNIX for Dummies Questions & Answers
I recently started an introductory course in UNIX / Linux Red Hat 7.3. The textbook came with the Red Hat 7.3 OS included but no UNIX. Are the commands and syntax so closely related that if I learn one I automatically know how to use the other. What are the similarities and differences. When... (2 Replies)
Discussion started by: barbedwire615
2 Replies
8. Shell Programming and Scripting
hello
does someone want to help me for this one ?
i want to rename files & a folder according to the similarities in filenames
for example :
the file with the good name
cglogo tougl1953 dgmel bogd 01 -- ttgductoog ggdté gollogtd.ext1the others files needed to be renamed
cglogo... (5 Replies)
Discussion started by: mc2z674gj
5 Replies
9. UNIX for Dummies Questions & Answers
Hello!
Please, I am sorry, I am the absolute beginner,
If I have unix as os instead of lets say windows, then can I go to INTERNET and how?
Are there some other BIG differences?
Many thanks!!! (1 Reply)
Discussion started by: pinklemon
1 Replies
ND(1) General Commands Manual ND(1)
NAME
nd - Tiny little command line WebDAV interface
SYNOPSIS
nd [options] url
DESCRIPTION
nd provides a simple command line interface to the RFC 2518 (WebDAV) server. If no option is specified, HTTP GET command is issued and
writes response data to the standard output.
The options are as follows:
-c dest_url
COPY url to the dest_url. Use lock token if -t is specified.
-f Force override the content even when the MOVE or COPY target already exits.
-v View property information of url by PROPFIND. With -g option, only the specified property is displayed.
-p file PUT file content to the url. Use lock token if -t is specified.
-g name Specify the property name for -v option.
-e name=value
Edit the property with name to value using PROPPATCH .
-N namespace-url
Specify the property namespace URL for -e or -g option.
-P file POST file content to the url. -T is used for the Content-Type.
-T content_type
Use content_type as a Content-Type field value of the POST request. Default is `application/x-www-form-urlencoded'.
-d DELETE url. Use lock token if -t is specified.
-l LOCK url. Use -o as owner, -s as scope, -i as timeout.
-o owner
Specify lock owner. Default is USER environment variable.
-s scope
Specify lock scope (`exclusive' or `shared'). Default is `exclusive'.
-i timeout
Specify lock timeout interval. Default is `Infinite'.
-u UNLOCK url. -t option is required.
-t token
Specify the lock token.
-r Set command execution `Depth' as `Infinity'.
-a realm
Specify authentication realm.
-A realm
Specify proxy authentication realm.
-k MKCOL url
-m dest_url
MOVE url to the dest_url. Use lock token if -t is specified.
-S Print output using s-expression.
ENVIRONMENT VARIABLES
http_proxy, HTTP_PROXY
Specify HTTP proxy.
USER When manipulating a lock without an explicit owner option, the value of USER is used to set the owner of the file lock.
BUGS
A maintainer of the Debian package has implemented Digest authentication on top of the original software. However, the upstream source uses
the nanoHTTP code from libxml2 to implement the HTTP transport. Due to properties inherent in that code for detecting and following redi-
rected target sites, there is no way to pull out the new address in order to insert it into the hashes necessary for the Digest method. Nd
will therefore incorrectly answer with 'Bad request' to any method call aimed at such sites. Using the correct logical name for the target
will, however, produce a correct response from Nd.
AUTHORS
Yuuichi Teranishi (teranisi@gohome.org).
SEE ALSO
libxml(4).
February 25, 2002 ND(1)