10 More Discussions You Might Find Interesting
1. Hardware
I have hp dv6 and dv7 notebook pcs on which I want to upgrade the wifi cards but when I install the new cards and boot them, the they won't even boot to the bios and they both give me the same error: "104-Unsupported wireless network device detected. System Halted. Remove device and restart." When... (1 Reply)
Discussion started by: milhan
1 Replies
2. Shell Programming and Scripting
Dear all,
what I need to do is extract an entries list from a file and remove some entries based on a white list present on other file, then output into result.txt file.
Example:
source.txt:
12345 text1 text2 text3 text4
123 text1 text2 text3 text4
678 text1 text2 text3 text4
987 text1... (8 Replies)
Discussion started by: Lord Spectre
8 Replies
3. Shell Programming and Scripting
Hi,
I have array of hashes and each key has array like below.
@array1 = (
{
'url' => ,
'bill' =>
},
{
'url' => ,
'bill' =>
},
{
'url' => ,
... (0 Replies)
Discussion started by: ragilla
0 Replies
4. Shell Programming and Scripting
Hi folks,
I have a structure as mentioned below in a configuration file.
<Component>
Comp1:
{
item1:data,someUniqueAttribute;
item2:data,someUniqueAttribute,
}
Comp2:
{
item3:data,someUniqueAttribute;
... (1 Reply)
Discussion started by: ckv84
1 Replies
5. Shell Programming and Scripting
Hello everyone,
I was wondering if someone can help me with this problem:
@LoHashes = ({"a"=>1,"b"=>2,"c"=>3,"d"=>4},
{"a"=>5,"b"=>6,"c"=>7});
@LoHashes = create_list(\&LoHashes);
sub create_list
{
foreach $hash(@LoHashes)
{
foreach (sort keys... (2 Replies)
Discussion started by: new bie
2 Replies
6. Shell Programming and Scripting
hi there, I have some database output that looks like this
SELECT nic_name,nic_duplex,nic_speed,nic_ip FROM network_table WHERE hostname = "server1"
result is this (ive delimited with a pipe for ease of reading)
bge0|full|1000|10.32.100.1
bge1|full|1000|11.12.101.7 ... (1 Reply)
Discussion started by: hcclnoodles
1 Replies
7. Shell Programming and Scripting
Hi,
I am stuck at this problem where part of my code would store all the websites that has been accessed by a user. I pull these values from a log file. I want to create a HASH of HASHES ? (Please correct me if this is not the right approach) where I would store all the hits to website with... (4 Replies)
Discussion started by: Dabheeruz
4 Replies
8. UNIX for Dummies Questions & Answers
Hey frens someone pls temme what i need to do so that after I logged into my unix terminal i should get my name written in hashes(i.e ###)
Hope someone ll help me out.... (2 Replies)
Discussion started by: smarty86
2 Replies
9. Shell Programming and Scripting
I am creating a whitelist for User Input Validation. Here is a code snippet that allows alphanumeric and forward slash (/).
if ( $variable =~ /^*$/ ) #allow alphanumeric and fwd slash
{
$returnValue = 'good data';
} ... (3 Replies)
Discussion started by: mh53j_fe
3 Replies
10. Shell Programming and Scripting
Some one plz help me how to sort an array of hashes .....
for e.g i have an array as
@AoH = (
{
ques => 10,
marks => 32,
},
{
ques => 32,
marks => 22,
},
{
ques => 2,
marks => 41,
},
);
now i want to sort this array with increasing value of "ques" ..... plz... (3 Replies)
Discussion started by: coolguyshail
3 Replies
db_archive(8) System Manager's Manual db_archive(8)
NAME
db_archive - displays security database log files no longer involved in active transactions (Enhanced Security)
SYNOPSIS
/usr/tcb/bin/db_archive [-alsv] [-h home]
FLAGS
Write all pathnames as absolute pathnames, instead of relative to the database home directories. Specify a home directory for the data-
base. The correct directory for enhanced security is /var/tcb/files. Write out the pathnames of all of the database log files, whether or
not they are involved in active transactions. Write the pathnames of all of the database files that need to be archived in order to
recover the database from catastrophic failure. If any of the database files have not been accessed during the lifetime of the current log
files, db_archive does not include them in this output.
It is possible that some of the files referenced in the log have since been deleted from the system. In this case, db_archive ignores
them. When db_recover is run, any files referenced in the log that are not present during recovery are assumed to have been deleted and
are not be recovered. Run in verbose mode, listing the checkpoints in the log files as they are reviewed.
DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup-
port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check-
pointing to record changes.
The db_archive utility is provided for maintenance of the log files associated with the security database. It writes the pathnames of log
files that are no longer in use (that is, no longer involved in active transactions), to the standard output, one pathname per line. These
log files should be written to backup media to provide for recovery in the case of catastrophic failure (which also requires a snapshot of
the database files), but they may then be deleted from the system to reclaim disk space. You should perform a db_checkpoint -1 before
using db_archive.
The secconfig utility can create a cron job that periodically checks the security log files and deletes those no longer in use, as deter-
mined by db_archive. Be sure to coordinate this with the site backup schedule.
The db_archive utility attaches to one or more of the Berkeley DB shared memory regions. In order to avoid region corruption, it should
always be given the chance to detach and exit gracefully. To cause db_archive to clean up after itself and exit, send it an interrupt sig-
nal (SIGINT).
RETURN VALUES
The db_archive utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT VARIABLES
If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home
directory for security is /var/tcb/files.
FILES
/var/tcb/files/auth.db
/var/tcb/files/dblogs/*
RELATED INFORMATION
Commands: db_checkpoint(8), db_dump(8), db_load(8), db_printlog(8), db_recover(8), db_stat(8), secconfig(8) delim off
db_archive(8)