Tell The United States Patent and Trademark Office that software and business method patents should not be part of the EU-US patent treaty. The USPTO has put a call out for public comments. They can be contacted, either by sending a fax to Mr. Santamauro to (571) 273-0085 or by emailing plharmonization@uspto.gov. The deadline is June 22 (Sunday).
I am using HP-UX,KSH
$ jobs -l
+ 19377 Running nohup ksh cat_Duplicate_Records_Removal.ksh </dev/null >/dev/null 2>&1 &
$ ps -p 19377 -fl
F S UID PID PPID C PRI NI ADDR SZ WCHAN STIME TTY TIME COMD
401 S catmgr 19377 19491 ... (1 Reply)
turbostat reports C-states of all CPU cores, and includes entries for each hyper-threaded core as well. Often enough the two logical cores on a single physical core will list different C state percentages. Does that make any sense?
Is this reporting the c-states of the few duplicated parts... (8 Replies)
netstat | awk '/server/ {for(i=1;i<2;i++) {getline;print}'
Output:
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
TIME_WAIT
TIME_WAIT
From the above command I'm getting all the states. I want to count the states and write to a file, like
"Count of ESTABLISHED... (6 Replies)
Hi,
Any rugby fans out there. Sevens rugby is really exciting to watch. The final is only about 20mins give or take, but its fast paced and very exciting.
The IRB Sevens World Series, is a series of international rugby union sevens tournaments. The tournaments, run by the IRB, feature... (0 Replies)
Hi guys,
Can you help me please to find an appropriate course of UNIX in the United States.
Also, can you provide me some information about the schools or institutes that offer it in the U.S.
Thanks, (0 Replies)
I am trying to write my own Unix compliant (SUSv4) OS - Just a hobby OS, nothing serious. While going through the standard, I couldn't find any explicit information on process states. What I could find was (excluding the real-time considerations)-
From this it can be inferred that the... (2 Replies)
ipsecesp(7P) Protocols ipsecesp(7P)NAME
ipsecesp, ESP - IPsec Encapsulating Security Payload
SYNOPSIS
drv/ipsecesp
DESCRIPTION
The ipsecesp module provides confidentiality, integrity, authentication, and partial sequence integrity (replay protection) to IP data-
grams. The encapsulating security payload (ESP) encapsulates its data, enabling it to protect data that follows in the datagram. For TCP
packets, ESP encapsulates the TCP header and its data only. If the packet is an IP in IP datagram, ESP protects the inner IP datagram.
Per-socket policy allows "self-encapsulation" so ESP can encapsulate IP options when necessary. See ipsec(7P).
Unlike the authentication header (AH), ESP allows multiple varieties of datagram protection. (Using a single datagram protection form can
expose vulnerabilities.) For example, only ESP can be used to provide confidentiality. But protecting confidentiality alone exposes vulner-
abilities in both replay attacks and cut-and-paste attacks. Similarly, if ESP protects only integrity and does not fully protect against
eavesdropping, it may provide weaker protection than AH. See ipsecah(7P).
ESP Device
ESP is implemented as a module that is auto-pushed on top of IP. Use the /dev/ipsecesp entry to tune ESP with ndd(1M).
Algorithms
ESPuses encryption and authentication algorithms. Authentication algorithms include HMAC-MD5 and HMAC-SHA-1. Encryption algorithms include
DES, Triple-DES, Blowfish and AES. Each authentication and encryption algorithm contain key size and key format properties. You can obtain
a list of authentication and encryption algorithms and their properties by using the ipsecalgs(1M) command. You can also use the functions
described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms. Because of export laws in the United States,
not all encryption algorithms are available outside of the United States.
Security Considerations
ESP without authentication exposes vulnerabilities to cut-and-paste cryptographic attacks as well as eavesdropping attacks. Like AH, ESP is
vulnerable to eavesdropping when used without confidentiality.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsr (32-bit) |
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO ipsecalgs(1M), ipsecconf(1M), ndd(1M), attributes(5), getipsecalgbyname(3NSL), ip(7P), ipsec(7P), ipsecah(7P)
Kent, S. and Atkinson, R.RFC 2406, IP Encapsulating Security Payload (ESP), The Internet Society, 1998.
SunOS 5.11 18 May 2003 ipsecesp(7P)