02-03-2005
Thanks, everyone !
I appreciate your help !
Regards
Dennis
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have created symbolic links to several frequently used commands, for example:
"lt" is a link to "ls -ltrgo|tail". What can I do to make these links available system-wide, or at least in the directories my coworkers are in most of the time? I have copied the link to several directories, and... (6 Replies)
Discussion started by: jpprial
6 Replies
2. UNIX for Advanced & Expert Users
Does anyone know how to make system wide changes to the CDE's front panel icons? I dont know if it matters but im running Solaris 9.
THanks (1 Reply)
Discussion started by: meyersp
1 Replies
3. Shell Programming and Scripting
Hello,
I am new to shell scripting and I was trying to write a script that would force a system wide password change except for admins. I am having some trouble and any help that someone could give me would be greatly appreciated. I am trying to do it by using the UID as the marker for anyone... (6 Replies)
Discussion started by: kilemark
6 Replies
4. Shell Programming and Scripting
hello All,
I need to invoke by perl script some program/command and monitor it for 5
minutes . In case it still running for more then 5 min I need to send a signal which will stop it.
I implemeted this as shown below by using eval & alarm
and I'd like to know if there is a better way to... (1 Reply)
Discussion started by: Alalush
1 Replies
5. Linux
Hi,
I need to look for a config file (ldap.conf) and pick the latest modified file.
`locate` tells me there are many ldap.conf's, some in /etc, /usr, /home, etc.
Is there some way I can sort them by last modified time via bash?
I was thinking maybe I could pipe the output of `locate` to `ls... (4 Replies)
Discussion started by: Housni
4 Replies
6. UNIX for Advanced & Expert Users
Dear Fellows;
As being new to linux, i have tried to synamically load a custom library which overrides some system calls like conncet(), socket() etc.... for custom purposes.
It works well, if declaring the environment path LD_PRELOAD and execution of the application to be override... (0 Replies)
Discussion started by: mzeeshan
0 Replies
7. UNIX for Dummies Questions & Answers
We need to have many of our users all send encrypted files to a single FTP server. The problem, if I understand how encryption/decryption works (which I don't), is that each user would normally have their own private and public key. The other end needs to be able to decrypt the file(s) using a... (6 Replies)
Discussion started by: Totengraber
6 Replies
8. IP Networking
As we are facing issue with this server connection. The error is:
The system function gethostbyname() failed to find the client's host name.
how can i check if the server "server1" is able to resolve the client hostname (hosts / dns)?
i can ping the client from server.
any... (1 Reply)
Discussion started by: jinslick25
1 Replies
9. Red Hat
Hi everybody,
How can I change the default UMASK for non root users, e.g. I want the umask for every new created user will be 0044.
Thanks (6 Replies)
Discussion started by: leo_ultra_leo
6 Replies
10. Shell Programming and Scripting
When looking for wherever a program or a filename appears in the system, a short scrip is "findinner" which another script calls with a long parameter list consisting of path names ending with ".sh" or ".menu". "findinner" looks like this:
# If not .savenn file, show name and result of grep.
#... (4 Replies)
Discussion started by: wbport
4 Replies
LEARN ABOUT ULTRIX
hsearch
hsearch(3) Library Functions Manual hsearch(3)
Name
hsearch, hcreate, hdestroy - manage hash search tables
Syntax
#include <search.h>
ENTRY *hsearch (item, action)
ENTRY item;
ACTION action;
int hcreate (nel)
unsigned nel;
void hdestroy ( )
Description
The subroutine is a hash-table search routine generalized from Knuth (6.4) Algorithm D. It returns a pointer into a hash table indicating
the location at which an entry can be found. The item is a structure of type ENTRY (defined in the <search.h> header file) containing two
pointers: item.key points to the comparison key, and item.data points to any other data to be associated with that key. (Pointers to types
other than character should be cast to pointer-to-character.) The action is a member of an enumeration type ACTION indicating the disposi-
tion of the entry if it cannot be found in the table. ENTER indicates that the item should be inserted in the table at an appropriate
point. FIND indicates that no entry should be made. Unsuccessful resolution is indicated by the return of a NULL pointer.
The subroutine allocates sufficient space for the table, and must be called before is used. The nel is an estimate of the maximum number
of entries that the table will contain. This number may be adjusted upward by the algorithm in order to obtain certain mathematically
favorable circumstances.
The subroutine destroys the search table, and may be followed by another call to
Restrictions
Only one hash search table may be active at any given time.
Diagnostics
The subroutine returns a NULL pointer if either the action is FIND and the item could not be found or the action is ENTER and the table is
full.
The subroutine returns zero if it cannot allocate sufficient space for the table.
See Also
bsearch(3), lsearch(3), string(3), tsearch(3)
hsearch(3)