9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I'm trying to write a script to determine the time gap between HTTP PUT and HTTP DELETE requests in the HTTP Servers access log.
Normally client will do HTTP PUT to push content e.g. file_1.txt and 21 seconds later it will do HTTP DELETE, but sometimes the time varies causing some issues... (3 Replies)
Discussion started by: Juha
3 Replies
2. SCO
I would like to log requests to rshd on OSR 5.0.7, hopefully it is possible.
Requests are coming from client Windows PCs, it all works most of the time, but few PCs are not able to do it.
I am not sure where to start - do I tweak syslog.conf? Any pointers would be appreciated. (4 Replies)
Discussion started by: migurus
4 Replies
3. Programming
among the below socket programming api's, please let me know which are blocking and non-blocking.
socket
accept
bind
listen
write
read
close (2 Replies)
Discussion started by: VSSajjan
2 Replies
4. Post Here to Contact Site Administrators and Moderators
For some reason Google Chrome sees unix.com as dangerous and has start to block it. I need to select advanced and continue on own risk.
Can you make an effort to remove unix.com form the list of dangerous site from Google.
IE has not this problem. (5 Replies)
Discussion started by: Jotne
5 Replies
5. HP-UX
Hi All
I have a blade BL860c running on a C7000 chassis, in which is connected to a NetApp, so lately I am having I/O issues, and dmesg as well as syslog.log is reporting the following:
/dev/vg01/lvol2 file system file data error in dev/block 0/55892768
Page I/O error occurred while paging... (2 Replies)
Discussion started by: fretagi
2 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I need to install a program on my Centos 5.3 server that will block unauthorized ssh/ftp access attempts. The two features I require is that I should be able to configure the program to block the IP of the intruder after a a certain amount of access attempts and that it should display a... (3 Replies)
Discussion started by: mojoman
3 Replies
7. IP Networking
say i have an apache server configured for ssl/non ssl virtual hosts and a proxy configured as follows (see squid.conf)
the ssl on each name based virtual host is configured on its own port (only 7 of the domains need this the rest are just media and other insignificant bits of data but domains... (1 Reply)
Discussion started by: hopper195
1 Replies
8. Web Development
Hi everybody,
Is it possible to have a URL link i.e. <a href=""></a>, which sends out two requests to a site?
As an example, I want want to combine these two links. The first link loads files. The second link searches these files. But I want just one link, where went a user clicks on it,... (3 Replies)
Discussion started by: z1dane
3 Replies
9. Email Antispam Techniques and Email Filtering
Now this is a bit tricky, but works great if you can decide which Top Level Domains or TLDs you want to receive mail We are getting so much spam from countries we never receive useful mail, I've been experimenting with blocking entire TLDs using sendmail access_db as an antispam technique.
... (0 Replies)
Discussion started by: Neo
0 Replies