03-01-2004
Not sure what you're trying to do... if you want to copy files from one directory to another and maintain their permissions, just use the cp command. But I'm hoping the question you're asking wasn't that simple....
9 More Discussions You Might Find Interesting
1. AIX
Can someone suggest me any means of having a controlled way to user access ...
basically we have a varied environment of people(users) logging in to AIX boxes ... either via
1) telnet ...
2) application
3) databse (SQL's)
what we need to do is formalise this .. can someone help me with this
... (2 Replies)
Discussion started by: rajesh_149
2 Replies
2. Programming
Hi
I need to understand abt Event Management Library for example..A module will be responsible for Handling the event posted by the other modules...and creating a new process for handling the event posted by the other modules..also after completing the event clearing of the event...
Need to... (3 Replies)
Discussion started by: nathgopi214
3 Replies
3. Shell Programming and Scripting
I want to prompt for a full name, then select the surname from the full name.
Then address the person as the surname entered in the fullname (1 Reply)
Discussion started by: orjnet
1 Replies
4. HP-UX
Hello, all!
I'm newbie in HP/UX and at my job I'm dealing with HP/UX 9.00. Due this OS is an old one, I couldn't find some info, concretely, about software management on it. Can you please help me? (5 Replies)
Discussion started by: Che_G
5 Replies
5. UNIX and Linux Applications
Hello all,
I need help for build server call as Password management / centralized password management server.
My situation and example:
I have 600 server in my server room running on Linux then I need 1 server only can create login/password and then user can login to all 600 server no... (2 Replies)
Discussion started by: sheikh76
2 Replies
6. HP-UX
HI all,
As per the audit policy, patch has to be apply periodically, but in my scenerio, it has been applied lastly in the year 2010.
Using HP UX 11.11, 11.21 and 11.31
I would like to know, how to identify the patches which are need to update, what will be the procedure to update, how to... (5 Replies)
Discussion started by: selvaforum
5 Replies
7. IP Networking
Hello all,
I was wondering which way do you use to manage you IPs?
For example in our case we have excel sheets and we export them in html first and import it to a server running apache, so to be visible from all.
But i was wondering if there are any way (prefer a way running in web server)... (2 Replies)
Discussion started by: @dagio
2 Replies
8. UNIX for Advanced & Expert Users
You know those lists of "the most common passwords"?
I was looking at one of those because I actually want to use a really common password or two on occasion. The thing is I'm skeptical that these are legitimate lists. Most things these days require at least 8 chars with a numeral. But these lists... (1 Reply)
Discussion started by: jutnobs
1 Replies
9. What is on Your Mind?
Original post from this thread on browser caching.
To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
cd(1) General Commands Manual cd(1)
NAME
cd - change working directory
SYNOPSIS
[directory]
DESCRIPTION
If directory is not specified, the value of shell parameter is used as the new working directory. If directory specifies a complete path
starting with or directory becomes the new working directory. If neither case applies, tries to find the designated directory relative to
one of the paths specified by the shell variable. has the same syntax as, and similar semantics to, the shell variable. must have execute
(search) permission in directory.
exists only as a shell built-in command because a new process is created whenever a command is executed, making useless if written and pro-
cessed as a normal system command. Moreover, different shells provide different implementations of as a built-in utility. Features of as
described here may not be supported by all the shells. Refer to individual shell manual entries for differences.
If is called in a subshell or a separate utility execution environment such as:
(which invokes on accessible directories) does not affect the current directory of the caller's environment. Another usage of as a stand-
alone command is to obtain the exit status of the command.
EXTERNAL INFLUENCES
International Code Set Support
Single- and multi-byte character code sets are supported.
Environment Variables
The following environment variables affect the execution of
The name of the home directory,
used when no directory operand is specified.
A colon-separated list of pathnames that refer to directories.
If the directory operand does not begin with a slash character, and the first component is not dot or dot-dot, searches
for directory relative to each directory named in the variable, in the order listed. The new working directory is set
to the first matching directory found. An empty string in place of a directory pathname represents the current direc-
tory. If is not set, it is treated as if it was an empty string.
EXAMPLES
Change the current working directory to the directory from any location in the file system:
Change to new current working directory residing in the current directory:
or
Change to directory residing in the current directory's parent directory:
Change to the directory whose absolute pathname is
Change to the directory relative to home directory:
RETURN VALUE
Upon completion, exits with one of the following values:
The directory was successfully changed.
An error occurred. The working directory remains unchanged.
SEE ALSO
csh(1), pwd(1), ksh(1), sh-posix(1), sh(1), chdir(2).
STANDARDS CONFORMANCE
cd(1)