Visit Our UNIX and Linux User Community

Search Results

Search: Posts Made By: wizard
6,875
Posted By wizard
For Solaris 7 or earlier, look at Sun Trunking...
For Solaris 7 or earlier, look at Sun Trunking software. Make sure your switch is compatible with Sun Trunking software. If you are running Solaris 8 10/00 or later, you can use IP multi-pathing...
1,764
Posted By wizard
Try finger `cat uname` (the ` are backquotes).
Try finger `cat uname` (the ` are backquotes).
2
3,948
Posted By wizard
A mutex is a mutual exclusion lock used to...
A mutex is a mutual exclusion lock used to serialize access to kernel data structures. You can also use them to serialize access in your own code.
1,747
Posted By wizard
Use /usr/sbin/prtconf. Pipe the output to more...
Use /usr/sbin/prtconf. Pipe the output to more or grep Memory.
Forum: Programming 02-01-2002
16,138
Posted By wizard
Ok. Apparently I understood you correctly in the...
Ok. Apparently I understood you correctly in the first post. First of all, when you create an object containing a virtual function, you do not create a virtual function table. At compile time, a...
11
6,310
Posted By wizard
You could always write a script to echo to the...
You could always write a script to echo to the tty devices. The device names depend on the OS you're running, but they should be something like /dev/ttya, /dev/ttyb, etc.

i.e.

echo "Please...
60,886
Posted By wizard
Are you exporting the variable? If not, use ...
Are you exporting the variable? If not, use

export PATH
2,557
Posted By wizard
I use Korn shell or perl. Korn shell is the most...
I use Korn shell or perl. Korn shell is the most robust in terms of shell scripting. Perl is very powerful, but has a longer learning curve.
Forum: Programming 01-30-2002
16,138
Posted By wizard
Sorry about the original post. I thought you had...
Sorry about the original post. I thought you had somehow gotten the pointer to the virtual function table and wanted to pass it to another process so the other process could dereference it. I've...
17,774
Posted By wizard
This may or may not be helpful, but I downloaded...
This may or may not be helpful, but I downloaded openssh from http://www.sunfreeware.com and when I run ssh-keygen it asks me for the location to store the rsa1 keyfile. I specify the path where I...
Forum: Programming 01-24-2002
6,374
Posted By wizard
If the virtual function table is in process A,...
If the virtual function table is in process A, then the pointer to the table is in the process address space of process A and has no meaning in process B, so if you pass the pointer to process B, it...
4,336
Posted By wizard
Look at the mksysb command. You can create a...
Look at the mksysb command. You can create a bootable image from one AIX box and install it on another one if they are the same architecture.
Forum: Programming 01-24-2002
2,099
Posted By wizard
See the sigaction() system call man page. The...
See the sigaction() system call man page. The easiest way to do this is create signal handling routines in your code that are called when signals are received. Most, but not all, signals can be...
3,513
Posted By wizard
From the output of your mount command, it looks...
From the output of your mount command, it looks like you are using Solaris. On Solaris, /home is an automount mount point. If you aren't using automount, then mv /etc/auto_master to...
21,143
Posted By wizard
You can use ps -el and look at the SZ column to...
You can use ps -el and look at the SZ column to get a rough idea. You can also use /usr/proc/bin/pmap to check on a per process basis to get size/segment and add them.
1,481
Posted By wizard
Sendmail and pop use standard UNIX IDs. For each...
Sendmail and pop use standard UNIX IDs. For each user you just need a valid UNIX ID with password.
10,241
Posted By wizard
In general you can use tput clear ...
In general you can use

tput clear

to clear the screen. Once the screen is clear, display you sub-menu.
10,477
Posted By wizard
A "hidden" file in UNIX is any file whose name...
A "hidden" file in UNIX is any file whose name begins with a . (that's a dot or a period). To see the file, use the -a option to the ls command (i.e. ls -a).

What problems are you having with...
8,614
Posted By wizard
The TY column is the record type column and the...
The TY column is the record type column and the codes mean

dg - disk group
dm - disk media
v - volume
pl - plex
sd - subdisk


Disks (dm) must be added to a disk group (dg) under Veritas. ...
5,605
Posted By wizard
You can't redirect output from a file to itself. ...
You can't redirect output from a file to itself. When the command line is parsed by the shell, the destination file will be zeroed out before output is sent to it. It is allowable to append to the...
2,249
Posted By wizard
Short answer: The plumb argument to the...
Short answer:

The plumb argument to the ifconfig command is for dynamically activating a network interface without rebooting the system.

Long answer:

If you are configuring a network...
1,947
Posted By wizard
All devices in UNIX are accessed as files. ...
All devices in UNIX are accessed as files. Providing this abstraction requires some pretty complicated programming in the kernel. The programs are called device drivers. Once you write a device...
8,306
Posted By wizard
The chown command will change the owner ...
The chown command will change the owner

chown newowner filename

The chmod command will change the permissions. Permissions are specified as an octal number that can go from 000 to 777.
The...
5,605
Posted By wizard
No, you can remove the file and bounce cron. The...
No, you can remove the file and bounce cron. The log file will be recreated.
Forum: Cybersecurity 12-21-2001
6,958
Posted By wizard
See the man page for ufsdump.
See the man page for ufsdump.
Showing results 1 to 25 of 60

 

Featured Tech Videos

All times are GMT -4. The time now is 11:19 PM.
Unix & Linux Forums Content Copyright 1993-2021. All Rights Reserved.
Privacy Policy