06-16-2004
so you are saying it is mainly for compiling? i figured it wouldn't speed up my games but could i use the 2 systems as a server for a game and then i can use my window too play the game and not be the server and player and eat up the CPU.
8 More Discussions You Might Find Interesting
1. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Write a C program that accepts 3 parameters. Each parameter indicates the quantity of product to be
produced.... (0 Replies)
Discussion started by: paradise
0 Replies
2. Linux
Is it true that a well setup Linux system is very hard to break into, not impossible, just hard to do? (4 Replies)
Discussion started by: billcrosby
4 Replies
3. AIX
I have a following requirement in production
system 1 : LINUX
User: abcd
system 2: AIX (it is hosting a production DB)
Requirement
user abcd from system 1 should have read access on archive log files created by DB on system 2. The log files are created with permissions 540 by user ora ,... (2 Replies)
Discussion started by: amitnm1106
2 Replies
4. Shell Programming and Scripting
We would be migrating UNIX file system to Linux file system.
We do have many directory and sub directories with files.
after migrating unix to linux file system , i want to make sure all the files has been copied ? What would be the best approach to validate directory ,sub-directory and file... (1 Reply)
Discussion started by: balajikalai
1 Replies
5. Programming
Hi all
What is the qualification required by Linux/Solaris System Administrator to become a Linux/Solaris System Programmer as to gain complete knowledge on computers.
Thanks (1 Reply)
Discussion started by: Tlogine
1 Replies
6. Linux
Hi all,
I'm looking for the best tool to monitor the Linux system. I've found a lot of interesting tools searching the web but I didn't find one which can do all the requirments (like a one in all tool). I would prefer it to include a command line interface also.
Thank you,
Andreea (0 Replies)
Discussion started by: andreea9322
0 Replies
7. Infrastructure Monitoring
Hi all,
I'm looking for the best tool to monitor the Linux system. I've found a lot of interesting tools searching the web but I didn't find one which can do all the requirments (like a one in all tool). I would prefer it to include a command line interface also.
Thank you,
Andreea (1 Reply)
Discussion started by: andreea9322
1 Replies
8. UNIX for Advanced & Expert Users
System is down, I can't seem to get in. It's VM so I took screen shot and upload the file here. Its a RTF file format.
when system comes up, I did press e then in the middle as you can see, I typed init=/bin/bash, I pressed CTRL -X. Then I should get prompt but not getting that. I get... (4 Replies)
Discussion started by: samnyc
4 Replies
DM(8) BSD System Manager's Manual DM(8)
NAME
dm -- dungeon master
SYNOPSIS
ln -s dm game
DESCRIPTION
dm is a program used to regulate game playing. dm expects to be invoked with the name of a game that a user wishes to play. This is done by
creating symbolic links to dm, in the directory /usr/games for all of the regulated games. The actual binaries for these games should be
placed in a ``hidden'' directory, /usr/games/hide, that may only be accessed by the dm program. dm determines if the requested game is
available and, if so, runs it. The file /etc/dm.conf controls the conditions under which games may be run.
The file /etc/nogames may be used to ``turn off'' game playing. If the file exists, no game playing is allowed; the contents of the file
will be displayed to any user requesting a game.
FILES
/etc/dm.conf configuration file
/etc/nogames turns off game playing
/usr/games/hide directory of ``real'' binaries
/var/log/games.log game logging file
SEE ALSO
dm.conf(5)
HISTORY
The dm command appeared in 4.3BSD-Tahoe.
SECURITY CONSIDERATIONS
Two issues result from dm running the games setgid ``games''. First, all games that allow users to run UNIX commands should carefully set
both the real and effective group ids immediately before executing those commands. Probably more important is that dm never be setgid any-
thing but ``games'' so that compromising a game will result only in the user's ability to play games at will. Secondly, games which previ-
ously had no reason to run setgid and which accessed user files may have to be modified.
BSD
May 31, 1993 BSD