autocomplete Path on UNIX (TRU64)


 
Thread Tools Search this Thread
Operating Systems Solaris autocomplete Path on UNIX (TRU64)
# 1  
Old 02-04-2011
autocomplete Path on UNIX (TRU64)

Hi, i need autocmplete file_name/dir_name by TAB key. I work on UNIX (TRU64) and I just tried to type on .profile this setting:

set autolist

but it doesn't work. I think it is because this command doesn't belong to this UNIX version (sure it works for example on HP-UX).
I need to set it inside .profile (I know that typing <ESC><ESC> I can do it).

Thanks to all.

D4vid.
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Shell Path Autocomplete w/ Variables

Suppose there exists a file, "/home/andrew/product/test". And suppose I set $FOO to "/home/andrew/product/"? I can't seem to type "$FOO/t" and then Escape (csh) in order to autocomplete. Is this possible in other shells? If not, then why? If so, then why can't csh do it, and how can I make... (1 Reply)
Discussion started by: acheong87
1 Replies

2. UNIX for Advanced & Expert Users

dd using Digital Unix Tru64

Hi I am posting this in this area because I couldn't find a better place. I am trying to make exact copies of my disk that I use in an old DEC3000. I loaded the one disk then used dd dd if=/dev/rrz0c of=/dev/rrz1c I started this a 6pm last night here in Wales. It is now 2pm the next day,... (4 Replies)
Discussion started by: mndavies
4 Replies

3. UNIX for Dummies Questions & Answers

Tru64-unix

Hello everybody I am new in TRU64 UNIX and i would really appreciate if somebody can help me with some info regarding the classification of the user rights of this OS. The types of user i know from previous experience in HP-UX 11 i is the root user or the superuser, the user admn that is the... (0 Replies)
Discussion started by: adak2010
0 Replies

4. Shell Programming and Scripting

Sent mail from unix tru64

hi all, I need send mail from unix tru64 to mymail@domain.com use shell script. i saw result of "man mail", "man mailx" commands on my unix tru64 server, but i don't understand how to sent mail.... Please advice any suggestion or help? (1 Reply)
Discussion started by: Tlg13team
1 Replies

5. UNIX for Dummies Questions & Answers

Help In Compaq Tru64 UNix

Hi, I am new to UNIX. I need help in working with Compaq-UX TRU64 OS. How It work FTP Server? ANd MAil Server? and I have apach pprogram project and it work as HTTP Server. Also I need how can setup a new version of progrm on UNix like mozilla and adobe reader etc........... Thank... (3 Replies)
Discussion started by: svuad
3 Replies

6. HP-UX

Unix HP Tru64

Hi experts, I hope someone can help me with these simple tasks as I am new in Unix environment. I need to create a file system for backup purpose, therefore I need to know the commands in Unix. 1) What is the command to check my disk drives to see how much available space is not allocated... (2 Replies)
Discussion started by: kingsto88
2 Replies

7. UNIX for Dummies Questions & Answers

MINFLT on a Tru64 Unix OS

Hello: I have a question here, ¿What is the ps parameter MINFLT on a Tru64 Unix OS?, As far as I can know, it just refers to all the page swaps that have failed when accessing to the memory (RAM). If that is true, i would like to explain my case: I have a process that runs continuosly... (0 Replies)
Discussion started by: Fco
0 Replies

8. UNIX Desktop Questions & Answers

tru64 unix

Whick book would I get for dummies learning tru64, ie basics. thankyou (1 Reply)
Discussion started by: jacl
1 Replies

9. UNIX Desktop Questions & Answers

tru64 unix

Can anyone help me with tru64 unix. We have just got a new server with this already loaded on, we don't have the CDrom. We are trying to establish the common features ie smit,printers,users and day to day commands. Any help would be greatly appreciated. thanks (8 Replies)
Discussion started by: jacl
8 Replies
Login or Register to Ask a Question
exec_attr(4)                                                                                                                          exec_attr(4)

NAME
exec_attr - execution profiles database SYNOPSIS
/etc/security/exec_attr /etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for execution profiles, including the exec_attr NIS map and NIS+ table. Programs use the getexecattr(3SECDB) rou- tines to access this information. The search order for multiple execution profile sources is specified in the /etc/nsswitch.conf file, as described in the nsswitch.conf(4) man page. The search order follows the entry for prof_attr(4). A profile is a logical grouping of authorizations and commands that is interpreted by a profile shell to form a secure execution environ- ment. The shells that interpret profiles are pfcsh, pfksh, and pfsh. See the pfsh(1) man page. Each user's account is assigned zero or more profiles in the user_attr(4) database file. Each entry in the exec_attr database consists of one line of text containing seven fields separated by colons (:). Line continuations using the backslash (fR) character are permitted. The basic format of each entry is: name:policy:type:res1:res2:id:attr name The name of the profile. Profile names are case-sensitive. policy The security policy that is associated with the profile entry. The valid policies are suser (standard Solaris superuser) and solaris. The solaris policy recognizes privileges (see privileges(5)); the suser policy does not. The solaris and suser policies can coexist in the same exec_attr database, so that Solaris releases prior to the current release can use the suser policy and the current Solaris release can use a solaris policy. solaris is a superset of suser; it allows you to specify privileges in addition to UIDs. Policies that are specific to the current release of Solaris or that contain privileges should use solaris. Policies that use UIDs only or that are not specific to the current Solaris release should use suser. type The type of object defined in the profile. The only valid type is cmd. res1 Reserved for future use. res2 Reserved for future use. id A string that uniquely identifies the object described by the profile. For a profile of type cmd, the id is either the full path to the command or the asterisk (*) symbol, which is used to allow all commands. An asterisk that replaces the filename component in a pathname indicates all files in a particular directory. To specify arguments, the pathname should point to a shell script that is written to execute the command with the desired argument. In a Bourne shell, the effective UID is reset to the real UID of the process when the effective UID is less than 100 and not equal to the real UID. Depending on the euid and egid values, Bourne shell limitations might make other shells preferable. To prevent the effective UIDs from being reset to real UIDs, you can start the script with the -p option. #!/bin/sh -p attr An optional list of semicolon-separated (;) key-value pairs that describe the security attributes to apply to the object upon execu- tion. Zero or more keys may be specified. The list of valid key words depends on the policy enforced. The following key words are valid: euid, uid, egid, gid, privs, and limitprivs. euid and uid contain a single user name or a numeric user ID. Commands designated with euid run with the effective UID indicated, which is similar to setting the setuid bit on an executable file. Commands designated with uid run with both the real and effective UIDs. Setting uid may be more appropriate than setting the euid on privileged shell scripts. egid and gid contain a single group name or a numeric group ID. Commands designated with egid run with the effective GID indicated, which is similar to setting the setgid bit on a file. Commands designated with gid run with both the real and effective GIDs. Setting gid may be more appropriate than setting guid on privileged shell scripts. privs contains a privilege set which will be added to the inheritable set prior to running the command. limitprivs contains a privilege set which will be assigned to the limit set prior to running the command. privs and limitprivs are only valid for the solaris policy. Example 1: Using Effective User ID The following example shows the audit command specified in the Audit Control profile to execute with an effective user ID of root(0): Audit Control:suser:cmd:::/usr/sbin/audit:euid=0 /etc/nsswitch.conf /etc/user_attr /etc/security/exec_attr CAVEATS
When deciding which authorization source to use (see ), keep in mind that NIS+ provides stronger authentication than NIS. Because the list of legal keys is likely to expand, any code that parses this database must be written to ignore unknown key-value pairs without error. When any new keywords are created, the names should be prefixed with a unique string, such as the company's stock symbol, to avoid potential naming conflicts. The following characters are used in describing the database format and must be escaped with a backslash if used as data: colon (:), semi- colon (;), equals (=), and backslash (fR). auths(1), profiles(1), roles(1), sh(1), makedbm(1M), getauthattr(3SECDB), getauusernam(3BSM), getexecattr(3SECDB), getprofattr(3SECDB), getuserattr(3SECDB), kva_match(3SECDB), auth_attr(4), prof_attr(4), user_attr(4), privileges(5) 25 Feb 2005 exec_attr(4)