8 More Discussions You Might Find Interesting
1. Linux
When unlocking a Linux server's console there's no event indicating successful logging
Is there a way I can fix this ?
I have the following in my rsyslog.conf
auth.info /var/log/secure
authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
2. UNIX for Dummies Questions & Answers
Can I download Debian or SUSE for free? If so, from where on the internet can I get a free version of Unix? (3 Replies)
Discussion started by: jsb1022
3 Replies
3. Shell Programming and Scripting
Hi Everybody :)
Once again I seek the wisdom of the community:b:
I wish to accomplish a task on the command line that involves watermarking download photos with the URL that they originated from. So far I have a command that downloads images from Picasa and creates a file of the URL... (0 Replies)
Discussion started by: o0110o
0 Replies
4. Solaris
Hi all
I need to update the current jdk_1.5.0_11 to a higher version, as requested by other developing house.
However, looking on the net / sun's site, whats all the differences between jdk with javaFX, or Java EE or java SE ?
Im assuming that you can download a base developer kit, and... (3 Replies)
Discussion started by: sbk1972
3 Replies
5. Post Here to Contact Site Administrators and Moderators
I downloaded the terminal client on my sidekick one and I am trying to figure out what is the right host to log in to unix,in order to use its feature. (0 Replies)
Discussion started by: elwil
0 Replies
6. Linux
I would like to shape multi-threaded downloaders (like flashget, reget etc.) but I don't want to make a limit on connections less then two (i.e. you download something from an ftp and want to browse this ftp at the same time). I found a pack of utilities - iproute2 and found a patch to linux kernel... (0 Replies)
Discussion started by: bobbyk2002
0 Replies
7. Cybersecurity
How secure are downloads from unix.com, linux.com, etc? Not talking about off the wall individual user sites, but sites like unix.com, download.com, tucows.com? We've been inundated at work lately from viruses, and I want to make sure that for things like work related downloads, that those kind... (5 Replies)
Discussion started by: kymberm
5 Replies
8. Shell Programming and Scripting
Someone told me that I can download a thing that I can play Halo over the Internet for xbox (1 Reply)
Discussion started by: memattmyself
1 Replies
DM(8) BSD System Manager's Manual DM(8)
NAME
dm -- dungeon master
SYNOPSIS
ln -s dm game
DESCRIPTION
dm is a program used to regulate game playing. dm expects to be invoked with the name of a game that a user wishes to play. This is done by
creating symbolic links to dm, in the directory /usr/games for all of the regulated games. The actual binaries for these games should be
placed in a ``hidden'' directory, /usr/games/hide, that may only be accessed by the dm program. dm determines if the requested game is
available and, if so, runs it. The file /etc/dm.conf controls the conditions under which games may be run.
The file /etc/nogames may be used to ``turn off'' game playing. If the file exists, no game playing is allowed; the contents of the file
will be displayed to any user requesting a game.
FILES
/etc/dm.conf configuration file
/etc/nogames turns off game playing
/usr/games/hide directory of ``real'' binaries
/var/log/games.log game logging file
SEE ALSO
dm.conf(5)
HISTORY
The dm command appeared in 4.3BSD-Tahoe.
SECURITY CONSIDERATIONS
Two issues result from dm running the games setgid ``games''. First, all games that allow users to run UNIX commands should carefully set
both the real and effective group ids immediately before executing those commands. Probably more important is that dm never be setgid any-
thing but ``games'' so that compromising a game will result only in the user's ability to play games at will. Secondly, games which previ-
ously had no reason to run setgid and which accessed user files may have to be modified.
BSD
May 31, 1993 BSD