10 More Discussions You Might Find Interesting
1. Hardware
I have hp dv6 and dv7 notebook pcs on which I want to upgrade the wifi cards but when I install the new cards and boot them, the they won't even boot to the bios and they both give me the same error: "104-Unsupported wireless network device detected. System Halted. Remove device and restart." When... (1 Reply)
Discussion started by: milhan
1 Replies
2. Shell Programming and Scripting
Dear all,
what I need to do is extract an entries list from a file and remove some entries based on a white list present on other file, then output into result.txt file.
Example:
source.txt:
12345 text1 text2 text3 text4
123 text1 text2 text3 text4
678 text1 text2 text3 text4
987 text1... (8 Replies)
Discussion started by: Lord Spectre
8 Replies
3. Shell Programming and Scripting
Hi,
I have array of hashes and each key has array like below.
@array1 = (
{
'url' => ,
'bill' =>
},
{
'url' => ,
'bill' =>
},
{
'url' => ,
... (0 Replies)
Discussion started by: ragilla
0 Replies
4. Shell Programming and Scripting
Hi folks,
I have a structure as mentioned below in a configuration file.
<Component>
Comp1:
{
item1:data,someUniqueAttribute;
item2:data,someUniqueAttribute,
}
Comp2:
{
item3:data,someUniqueAttribute;
... (1 Reply)
Discussion started by: ckv84
1 Replies
5. Shell Programming and Scripting
Hello everyone,
I was wondering if someone can help me with this problem:
@LoHashes = ({"a"=>1,"b"=>2,"c"=>3,"d"=>4},
{"a"=>5,"b"=>6,"c"=>7});
@LoHashes = create_list(\&LoHashes);
sub create_list
{
foreach $hash(@LoHashes)
{
foreach (sort keys... (2 Replies)
Discussion started by: new bie
2 Replies
6. Shell Programming and Scripting
hi there, I have some database output that looks like this
SELECT nic_name,nic_duplex,nic_speed,nic_ip FROM network_table WHERE hostname = "server1"
result is this (ive delimited with a pipe for ease of reading)
bge0|full|1000|10.32.100.1
bge1|full|1000|11.12.101.7 ... (1 Reply)
Discussion started by: hcclnoodles
1 Replies
7. Shell Programming and Scripting
Hi,
I am stuck at this problem where part of my code would store all the websites that has been accessed by a user. I pull these values from a log file. I want to create a HASH of HASHES ? (Please correct me if this is not the right approach) where I would store all the hits to website with... (4 Replies)
Discussion started by: Dabheeruz
4 Replies
8. UNIX for Dummies Questions & Answers
Hey frens someone pls temme what i need to do so that after I logged into my unix terminal i should get my name written in hashes(i.e ###)
Hope someone ll help me out.... (2 Replies)
Discussion started by: smarty86
2 Replies
9. Shell Programming and Scripting
I am creating a whitelist for User Input Validation. Here is a code snippet that allows alphanumeric and forward slash (/).
if ( $variable =~ /^*$/ ) #allow alphanumeric and fwd slash
{
$returnValue = 'good data';
} ... (3 Replies)
Discussion started by: mh53j_fe
3 Replies
10. Shell Programming and Scripting
Some one plz help me how to sort an array of hashes .....
for e.g i have an array as
@AoH = (
{
ques => 10,
marks => 32,
},
{
ques => 32,
marks => 22,
},
{
ques => 2,
marks => 41,
},
);
now i want to sort this array with increasing value of "ques" ..... plz... (3 Replies)
Discussion started by: coolguyshail
3 Replies
userdbck(1M) userdbck(1M)
NAME
userdbck - verify or fix information in the user database, /var/adm/userdb
SYNOPSIS
[file]
DESCRIPTION
verifies the information in the user database reports inconsistencies, and fixes problems.
If no options and no arguments are specified, reports all data corruption problems in all files in
If the option is also specified, each reported problem is repaired.
If a file argument (hex 00-ff) is specified, only that file in the directory is verified.
Options
The following options are recognized:
Verify attributes. Information in
is used to report any attribute that is not valid, not allowed in the user database, has an invalid value, or is allowed only
for a local user and the user is not in
Normally when the user database is disabled (see
userdb(4)), immediately exits without verifying or repairing the database. The option overrides this and forces to verify or
repair the database.
Verify user names.
User names found in the database are reported if they do not exist in any of the repositories defined in This option could take
a long time on a system with many users.
Repair all data corruption problems that are found.
If this option is not specified, problems are reported but not repaired.
Notes
Only users who have read and write access to can run
RETURN VALUE
exits with one of the following values:
success: no inconsistencies were found
inconsistencies were found and fixed
invalid usage
database is disabled; see
userdb(4)
inconsistencies were found but not fixed,
because the option was not specified
a problem was found that could not be fixed
EXAMPLES
In the following example, all problems in the user database are reported but not repaired.
In the following example, all problems in file are reported and repaired.
FILES
user database
security defaults configuration file
security attributes description file
SEE ALSO
userdbget(1M), userdbset(1M), userdb_read(3), security(4), userdb(4).
userdbck(1M)