7 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Anybody can figure it out on how to generate new port base on my last port let say my last port var1=124 and increment for new port 125,126 but this new two ports need to look at first if this port is not in used by any service, if the port is in used add 1 to new port and if in used... (6 Replies)
Discussion started by: lxdorney
is there a way for my C++ application to find out which mode the hpux OS is running in?
standard mode or trusted mode. (3 Replies)
Discussion started by: einsteinBrain
3. Shell Programming and Scripting
I have below input.
Output Base on Below Condition.
1> if forth column is empty and next coming line have same name with \es then add that column name on all rows
2>rest of all are es:vsDataEUtranCellFDD
CCL01736 CCL01736_7A_1 es:vsDataEUtranCellFDD ... (3 Replies)
Discussion started by: pareshkp
Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before".
Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
6. Virtualization and Cloud Computing
Thu, 15 Nov 2007 23:55:07 +0000
*I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work.
How many... (0 Replies)
Discussion started by: kduffin
putpwent() - write password file entry
is the inverse of (see getpwent(3C)). Given a pointer to a structure as created by or writes a line on the stream f, which matches the
ignores the audit ID and audit flag in the structure; and create the corresponding entries used in the protected password database, used
for trusted systems. which produces entries that match the trusted password database file format, must be used to create these entries.
returns non-zero if an error was detected during its operation; otherwise it returns zero.
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
System Password file
getpwent(3C), getprpwent(3), passwd(4), prpwd(4), stdio(3S), fopen(3S), thread_safety(5).