10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello,
I have text data that looks like this,
Mrv16a3102061815532D
6 6 0 0 0 0 999 V2000
-0.4018 1.9634 0.0000 C 0 0 0 0 0 0 0 0 0 0 0 0
-1.1163 1.5509 0.0000 C 0 0 0 0 0 0 0 0 0 0 0 0
-1.1163 0.7259 ... (9 Replies)
Discussion started by: LMHmedchem
9 Replies
2. Shell Programming and Scripting
Hi,
I am writing a shell script where I want that # should be added in all those lines as the first character where the pattern matches.
file has lot of functions defined
a.sh
#!/bin/bash
fn a {
beautiful evening
sunny day
}
fn b {
}
fn c {
hello world .its a beautiful day
... (12 Replies)
Discussion started by: ashima jain
12 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I made following configuration to create user directory:
# authconfig --enablemkhomedir --update
But the directory is created as permission 755, I'd like to modify the script to change directory access permission to 700, where is the script which copies /etc/skel to /home... (0 Replies)
Discussion started by: hce
0 Replies
4. UNIX for Dummies Questions & Answers
I logged in as root and visudo'd /etc/sudoers.
I found several users with the username ALL=(ALL) ALL entries and added an account after the last one.
Saved the file.
When the user logs in and does "sudo su -" they are prompted for their password and then told they are not in the sudoers file.... (8 Replies)
Discussion started by: rpm_on_lnx
8 Replies
5. Shell Programming and Scripting
Hi, I am creating a ksh script to search for a string of text inside files within a directory tree. Some of these file are going to be read/execute only. I know to use chmod to change the permissions of the file, but I want to preserve the original permissions after writing to the file. How can I... (3 Replies)
Discussion started by: right_coaster
3 Replies
6. Programming
(I have mentioned about this situation and arisen problems in another thread: Is there a limit for a code line length in C?, but those questions are OffTop for that subject; so I open a new topic, here.)
The main problem is that I have some situation in my program where memory has been changed... (2 Replies)
Discussion started by: alex_5161
2 Replies
7. UNIX for Dummies Questions & Answers
Hi there,
I'm installing the sleuthkit from sources (because the debian package is crap).
So I go threw the process of wget + tar + configure + make + make install.
At the end, all the executables and libraries are in /usr/local/bin/, /usr/local/lib/, /usr/local/share/...
How can I do to... (3 Replies)
Discussion started by: chebarbudo
3 Replies
8. Programming
How I can get the current make-file name in a make-file
So, if I run make with specified file:make -f target.mak
is it possible to have the 'target' inside of the that 'target.mak' from the file name? (2 Replies)
Discussion started by: alex_5161
2 Replies
9. UNIX for Dummies Questions & Answers
ulimit -a gives the following output:$ulimit -a
time(seconds) unlimited
file(blocks) 2097152
data(kbytes) 131072
stack(kbytes) 16384
memory(kbytes) unlimited
coredump(blocks) 32768
nofiles(descriptors) 400
vmemory(kbytes) 147456
Abot output... (3 Replies)
Discussion started by: nervous
3 Replies
10. Shell Programming and Scripting
I would like to make the same change in multiple shell script files and would like to know if anyone can be of some help? I would appreciate it. (4 Replies)
Discussion started by: rdakhan
4 Replies
updaters(1M) updaters(1M)
NAME
updaters - configuration file for NIS updating
SYNOPSIS
Remarks
The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality of the two remains the same; only the
name has changed.
DESCRIPTION
is a makefile used for updating the Network Information Service (NIS) databases. Databases can be updated only if the network is secure,
that is, only if there is a NIS database ( The default script will update only the map.
An entry in the file is a make target for a particular NIS database. For example, if you wanted to add to this script, you would create a
make target named passwd.byname with the command to update that database. See udpublickey(1M).
The information necessary to make the update is passed to the update command through standard input. The information passed is described
below. All items are followed by a NEW LINE except for Actual bytes of key and Actual bytes of data.
Network name of client wishing to make the update (a string)
Kind of update (an integer)
Number of bytes in key (an integer)
Actual bytes of key
Number of bytes in data (an integer)
Actual bytes of data
After receiving this information through standard input, the command to update the particular database should decide whether the user is
allowed to make the requested change.
If not, the command should exit with the status
If the user is allowed to make the change, the command should make the change and exit with a status of zero.
If there are any errors that may prevent the updater from making the change, it should exit with the status that matches a valid NIS error
code described in
AUTHOR
was developed by Sun Microsystems, Inc.
SEE ALSO
make(1), newkey(1M), rpc.ypupdated(1M), udpublickey(1M), publickey(4).
updaters(1M)