9 More Discussions You Might Find Interesting
1. Cybersecurity
Hello there,
I would like to protect a Linux system from cloning, I don't mind if the cloned hard drive works in the same computer, but I need to avoid it to work in other one, even if it uses exactly same mainboard model and rest of computer parts. I want the cloned system to get frozen or... (4 Replies)
Discussion started by: Installimat
4 Replies
2. UNIX for Dummies Questions & Answers
Afternoon,
the stat command is used against a file to ascertain date created and last modification time. However a different individual if they so chose could use the touch command to alter the date created or modification time.
Is there anyway to protect against this ?
thanks
Steve (2 Replies)
Discussion started by: sevans29
2 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I have a process which takes 13-15 mins for execution and its getting killed in the meantime.So can you please helpme out how to protect the process from getting killed.
Thanks in advance.
Regards,
Harika (9 Replies)
Discussion started by: harikagrp
9 Replies
4. Cybersecurity
Hi!
Looking for some feed back on this tutorial...
Thank you for checking out this thread.
I'm working on some killer videos right now that will explain in detail how you can protect your website against hackers. The first part of the video series is live right now and it covers Cross-Site... (2 Replies)
Discussion started by: Arne1983
2 Replies
5. UNIX for Dummies Questions & Answers
Hello,
Can someone give me some recommendations on how to protect this account? I understand that this account is an "operator" account and has root access.
Thanks in advance (5 Replies)
Discussion started by: susie2345
5 Replies
6. UNIX for Advanced & Expert Users
We recently had an accidental delete from /. I hold the root password but others are allowed to sudo over to root to perform admin tasks. The only way I want to permit deletion from / is by physically being root (su -).
I'd like to add a line to the sudoers file which would permit all commands... (1 Reply)
Discussion started by: scottsl
1 Replies
7. Shell Programming and Scripting
Hello All,
i work with backup, The below script runs and tar the user specified dir and put it in a backup machine. can any one help me to modify this in such a was that the tar file generated can be given a users specific password so that it can have high security.
KINDLY LET ME... (2 Replies)
Discussion started by: pradeepmacha
2 Replies
8. UNIX for Dummies Questions & Answers
I have created a PHP page that I use to clean files on my machine. I would like to leave the file there but I want to password protect it so that I am the only one that can run it from the shell. Does anyone know how to do this? Thanks.
-Cam (2 Replies)
Discussion started by: perryl7
2 Replies
9. UNIX for Dummies Questions & Answers
we have an hp-ux and a user requested me if i can password protect the dtterm. i know that this is possible but can you give me some hints in making this happen?
thanks :cool: (2 Replies)
Discussion started by: inquirer
2 Replies
kill(2) System Calls Manual kill(2)
NAME
kill(), raise() - send a signal to a process or a group of processes
SYNOPSIS
DESCRIPTION
The system call sends a signal to a process or a group of processes, as specified by pid. The signal to be sent is specified by sig and is
either one from the list given in or
The system call sends a signal to the executing process or thread. The signal to be sent is specified by sig and is either one from the
list given in or In a single-threaded process the effect of the function is equivalent to calling
When used in a multithreaded program, the function sends the signal specified by sig to the executing thread. The effect of the function
is equivalent to calling
If sig is (the null signal), error checking is performed but no signal is actually sent. This can be used to check the validity of pid.
The real or effective user ID of the sending process must match the real or saved user ID of the receiving process unless the sending
process has appropriate privileges.
As a single special case, the continue signal can be sent to any process that is a member of the same session as the sending process.
The value is defined in the file and is guaranteed not to be the ID of any process in the system or the negation of the ID of any process
in the system.
If pid is greater than zero and not equal to sig is sent to the process whose process ID is equal to pid. pid can equal unless sig is or
If pid is sig is sent to all processes excluding special system processes whose process group ID is equal to the process group ID of the
sender.
If pid is and the sending process does not have the appropriate privileges, sig is sent to all processes excluding special system processes
whose real or saved user ID is equal to the real or effective user ID of the sender.
If pid is and the effective user ID of the sender is a user who has appropriate privileges, sig is sent to all processes excluding special
system processes.
If pid is behaves much as when pid is equal to except that sig is not sent to the calling process.
If pid is negative but not or sig is sent to all processes (excluding special system processes) whose process group ID is equal to the
absolute value of pid, and whose real and/or effective user ID meets the constraints described above for matching user IDs.
Security Restrictions
Some or all of the actions associated with this system call are subject to compartmental restrictions. See compartments(5) for more infor-
mation about compartmentalization on systems that support that feature. Compartmental restrictions can be overridden if the process pos-
sesses the privilege (COMMALLOWED). Processes owned by the superuser may not have this privilege. Processes owned by any user may have
this privilege, depending on system configuration.
Some or all of the actions associated with this system call require the (OWNER) and/or the (REBOOT) privileges. Processes owned by the
superuser will have these privileges. Processes owned by other users may have privilege(s), depending on system configuration. See privi-
leges(5) for more information about privileged access on systems that support fine-grained privileges.
RETURN VALUE
Upon successful completion, a value of is returned. Otherwise, a value of is returned and is set to indicate the error.
ERRORS
If fails, no signal is sent. is set to one of the following values.
sig is neither a valid signal number nor zero.
sig is or and pid is that of the initialization process (also known as
The user ID of the sending process is not a user who has
appropriate privileges and its real or effective user ID does not match the real or saved user ID of the receiving
process.
The sending and receiving processes are not in the same session and
the real or effective user ID does not match the real or saved user ID of the receiving process.
No process or process group can be found corresponding to that specified by
pid.
If fails, no signal is sent. is set to the following value.
sig is neither a valid signal number nor zero.
APPLICATION USAGE
Threads Considerations
can be used to post signals to another process but cannot be used to post signals to a specific thread in another process. For information
on posting signals to specific threads within the same process, see pthread_kill(3T).
LWP (Lightweight Processes) Considerations
Signals cannot be posted to specific LWPs in another process.
AUTHOR
was developed by HP, AT&T, and the University of California, Berkeley.
SEE ALSO
kill(1), getpid(2), setsid(2), signal(2), sigqueue(2), pthread_kill(3T).
STANDARDS CONFORMANCE
kill(2)