9 More Discussions You Might Find Interesting
1. Homework & Coursework Questions
I am learning from the class how to protect the special characters and the script that I wrote here does not work when I am trying to pick up a single quote. It would complaint about parentheses problem. Please, someone could enlighten me.
Thanks in advance,
Scopiop
Input file
Hi, * ?... (2 Replies)
Discussion started by: scopiop
2 Replies
2. Shell Programming and Scripting
Hi everyone,
I´m trying to protect the scripts I have made from changes.
At my office I´m the one who research improvements on daily tasks, and I´ve done many scripts, that I share with my partners.I´m tired because they take my scripts and make their owns with new features that don´t share... (4 Replies)
Discussion started by: dover07
4 Replies
3. UNIX for Dummies Questions & Answers
hi power went out. next day unix sco wont boot up error code 303. any help appreciated as we are clueless. (11 Replies)
Discussion started by: fredthayer
11 Replies
4. IP Networking
Hi, I'm trying to find a way to protect my network against arp spoofing.
What it is:
An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker.
How to protect myself:
In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies
5. Shell Programming and Scripting
How to create a file in UNIX which is password protected ?
Thanks and Regards,
Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies
6. Linux
Hi All
I am working on a site to help newbie to learn linux for free.
demo.freelinuxconsole.info
there is only one file index.php its been able to rename or deleted.
Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies
7. Cybersecurity
Hello,
Long time ago we used to suffer from relay and users using your own mailservers to spam but thanks god for auth-before-pop.
But now i'm facing small problem with someone which us he is spaning using whatever mailserver with your@email.address.com and when these emails go to unknown... (10 Replies)
Discussion started by: Bashar
10 Replies
8. Filesystems, Disks and Memory
Consider a system that supports 5,000 users. Suppose you want 4,990 of these users to be able to access one file
How would you specify this protection scheme in UNIX (4 Replies)
Discussion started by: mattyboy
4 Replies
9. UNIX for Dummies Questions & Answers
I am having this problem......when I run this script:
print -n "Enter file name to be deleted: "
read answer
if
then
rm $name
else
echo "No such file with the name: $name exists"
fi
I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies
PRDB.DB0(5) AFS File Reference PRDB.DB0(5)
NAME
prdb.DB0, prdb.DBSYS1 - Contain the Protection Database and associated log
DESCRIPTION
The prdb.DB0 file contains the Protection Database, which maps AFS user, machine, and group names to their respective IDs (AFS UIDs and
GIDs) and tracks group memberships. The Protection Server (ptserver process) uses the information in the database to help the File Server
grant data access to authorized users.
The prdb.DBSYS1 file is a log file in which the Protection Server logs each database operation before performing it. When an operation is
interrupted, the Protection Server replays the log to complete the operation.
Both files are in binary format and reside in the /var/lib/openafs/db directory on each of the cell's database server machines. When the
Protection Server starts or restarts on a given machine, it establishes a connection with its peers and verifies that its copy of the
database matches the copy on the other database server machines. If not, the Protection Servers call on AFS's distributed database
technology, Ubik, to distribute to all of the machines the copy of the database with the highest version number.
Always use the commands in the pts suite to administer the Protection Database. It is advisable to create an archive copy of the database
on a regular basis, using a tool such as the UNIX tar command.
SEE ALSO
prdb_check(8), pts(1), ptserver(8)
COPYRIGHT
IBM Corporation 2000. <http://www.ibm.com/> All Rights Reserved.
This documentation is covered by the IBM Public License Version 1.0. It was converted from HTML to POD by software written by Chas
Williams and Russ Allbery, based on work by Alf Wachsmann and Elizabeth Cassell.
OpenAFS 2012-03-26 PRDB.DB0(5)