07-29-2005
7 More Discussions You Might Find Interesting
1. Cybersecurity
I am fed up of getting viruses on my computer.
They come from other computers on the network and I'm fed up with them.
Can anyone reccomend some virus scanning software or something that I can use to prevent my machine from getting viruses?
Thanks (3 Replies)
Discussion started by: jacx2
3 Replies
2. Cybersecurity
How secure are downloads from unix.com, linux.com, etc? Not talking about off the wall individual user sites, but sites like unix.com, download.com, tucows.com? We've been inundated at work lately from viruses, and I want to make sure that for things like work related downloads, that those kind... (5 Replies)
Discussion started by: kymberm
5 Replies
3. UNIX for Dummies Questions & Answers
Can anyone explain why generally there are no viruses in Unix.
Do any of the big Anti Virus supplier produce anything for Unix platforms ? (1 Reply)
Discussion started by: jimthompson
1 Replies
4. Linux
Hello ;
I have a problem running some script on dos .
when i run :
C: ls /temp
ls: cannot access /temp: No such file or directory
but when i run
C: ls \temp
windriver backup remotebackup
also when i run
C: ls temp
windriver backup remotebackup
The... (4 Replies)
Discussion started by: mulder20
4 Replies
5. Solaris
I know that UNIX is almost untouchable but my server is slower than previous days .
I found out that some users have watched porn on net , could they compromised system security .
So I have 2 questions
1. Has on market any viruses for Solaris
2. How to block some internet sites under... (1 Reply)
Discussion started by: solaris_user
1 Replies
6. Linux
hi guys,
I am new to linux. I want to install it on my home computer. I have a few questions.
1) if an exploit is found on linux, how long is it before it gets patched up? My worry is that because there are not many linux users, if a big is found, then it will be a long time before others... (4 Replies)
Discussion started by: JamesByars
4 Replies
7. Shell Programming and Scripting
Hello
I ask you how to make a
Anti-malicious files and viruses
Or if one of you a small example of the work on the same place and I hope my request
I want a small patch or the process of examination Virus
http://www.google.jo/images/cleardot.gif
---------- Post updated... (1 Reply)
Discussion started by: x-zer0
1 Replies
FDISK(8) System Manager's Manual FDISK(8)
NAME
fdisk - partition a hard disk [IBM]
SYNOPSIS
fdisk [-hm] [-sn] [file]
OPTIONS
-h Number of disk heads is m
-s Number of sectors per track is n
EXAMPLES
fdisk /dev/hd0 # Examine disk partitions
fdisk -h9 /dev/hd0 # Examine disk with 9 heads
DESCRIPTION
When fdisk starts up, it reads in the partition table and displays it. It then presents a menu to allow the user to modify partitions,
store the partition table on a file, or load it from a file. Partitions can be marked as MINIX, DOS or other, as well as active or not.
Using fdisk is self-explanatory. However, be aware that repartitioning a disk will cause information on it to be lost. Rebooting the sys-
tem immediately is mandatory after changing partition sizes and parameters. MINIX, XENIX, PC-IX, and MS-DOS all have different partition
numbering schemes. Thus when using multiple systems on the same disk, be careful.
Note that MINIX, unlike MS-DOS , cannot access the last sector in a partition with an odd number of sectors. The reason that odd partition
sizes do not cause a problem with MS-DOS is that MS-DOS allocates disk space in units of 512-byte sectors, whereas MINIX uses 1K blocks.
Fdisk has a variety of other features that can be seen by typing h.
Fdisk normally knows the geometry of the device by asking the driver. You can use the -h and -s options to override the numbers found.
SEE ALSO
part(8).
FDISK(8)