7 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi Expert,
Anybody can figure it out on how to generate new port base on my last port let say my last port var1=124 and increment for new port 125,126 but this new two ports need to look at first if this port is not in used by any service, if the port is in used add 1 to new port and if in used... (6 Replies)
Discussion started by: lxdorney
6 Replies
2. HP-UX
is there a way for my C++ application to find out which mode the hpux OS is running in?
standard mode or trusted mode. (3 Replies)
Discussion started by: einsteinBrain
3 Replies
3. Shell Programming and Scripting
HI Guys,
I have below input.
Output Base on Below Condition.
1> if forth column is empty and next coming line have same name with \es then add that column name on all rows
2>rest of all are es:vsDataEUtranCellFDD
Input:-
CCL01736 CCL01736_7A_1 es:vsDataEUtranCellFDD ... (3 Replies)
Discussion started by: pareshkp
3 Replies
4. Linux
Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies
5. AIX
I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before".
Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
3 Replies
6. Virtualization and Cloud Computing
Tim Bass
Thu, 15 Nov 2007 23:55:07 +0000
*I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies
7. Cybersecurity
About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work.
How many... (0 Replies)
Discussion started by: kduffin
0 Replies
GLOBUS-UPDATE-CERT(8) GSI-C OpenSSL Commands GLOBUS-UPDATE-CERT(8)
NAME
globus-update-certificate-dir - Update symlinks in the trusted CA directory
SYNOPSIS
globus-update-certificate-dir [-help] [-d DIRECTORY]
DESCRIPTION
The globus-update-certificate-dir program creates symlinks between files (CA certificates, certificate revocation lists, signing policy,
and certificate request configuration files) using the certificate hash the installed version of OpenSSL uses. OpenSSL 1.0.0 uses a
different name hashing algorithm than previous versions, so CA distributions created with older versions of OpenSSL might not be able to
locate trusted CAs and related files. Running globus-update-certificate-dir against a trusted CA directory will add symlinks to the files
to the hash if needed.
The full set of command-line options to globus-update-certificate-dir consists of:
-help
Display a help message to standard output and exit
-d DIRECTORY
Create links in the trusted CA directory DIRECTORY instead of using the default search path.
ENVIRONMENT
If the following variables affect the execution of globus-update-certificate-dir
X509_CERT_DIR
Default trusted certificate directory.
HOME
Path to the current user's home directory.
GLOBUS_LOCATION
Path to the Globus installation.
University of Chicago 02/18/2010 GLOBUS-UPDATE-CERT(8)