10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
We have three files as mentioned below:
1. main_file.txt: This is the file in which all operations will be done. Which means this file will be signed by using the below two files
2. signature_file.txt: This is a status file and contains two signatures.
3. command.txt:file contains two commands... (2 Replies)
Discussion started by: chetanojha
2 Replies
2. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
3. Solaris
Hi All,
I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration.
Regards,
Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies
4. IP Networking
Hi
Good Day, i would like to ask for further info about my problems experiencing this evening. Im a PPP0 connection in the internet using 3G located in asia pacific region.i had this problem this evening in my INTERNET connections that there are some sites i can't open example ( Gizmodo.com,... (2 Replies)
Discussion started by: jao_madn
2 Replies
5. UNIX for Dummies Questions & Answers
hi all,
i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies
6. Programming
I'm in the UNIX environment. I'd like to read a Microsoft Access MDB file, and write the contents of that file into an ASCII text file. I want to write a C program to do this.
Does anyone know if there's already source code out there that does this?
Please advise. Thanks. (3 Replies)
Discussion started by: serendipity1276
3 Replies
7. Cybersecurity
Hello,
i need some help/advice on how to solve a particular problem.
these are the users:
|name | group |
---------- ---------------
|boss | department1 |
|assistant | department1 |
|employee | department1 |
|spy | department2 |
this is the... (0 Replies)
Discussion started by: elzalem
0 Replies
8. Programming
INFO:
The program should enter a circle radius and Id for that circle to a file, then it should search for that id and print the radius for that circle.
PROBLEM:
This program compiles but it's not searching properly.
Circle.h
#ifndef CIRCLE_H
#define CIRCLE_H
#include <iostream>... (0 Replies)
Discussion started by: VersEtreOuNe
0 Replies
9. UNIX for Dummies Questions & Answers
Hi there
I just want to know what is the best way to know who access my file and when?
I want also to know if it's possiple to hide or restrict access to file or directory even from the root ' I THINK MUCH BETTER TO CHANGE THE NAME THEN :D "!!!
thanks in advance
Abdulkarim (3 Replies)
Discussion started by: geoquest
3 Replies
10. UNIX for Dummies Questions & Answers
Hi
I need to access files from a specific folder of a Linux system from an another Linux System Remotely.
I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility.
Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies