9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All,
I need a favour.
I have a file called "redhat_servers.txt" containing some server names line by line.
When I try to ssh to each server, and I have already done with ssh key-gen stuff. Now, for first time if I do ssh .. I need to type yes I have more than 400 servers...it will take... (4 Replies)
Discussion started by: kumar85shiv
4 Replies
2. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
3. Shell Programming and Scripting
Hi,
Please help me,its urgent.
I have a tool that i want to run from a shell script. When we run the tool it will ask the user choice to add or delete. When user enter the choice it will then ask how many units he want to delete or add and will add or delete accordingly.
Now I want to... (1 Reply)
Discussion started by: saket18@ymail.c
1 Replies
4. Shell Programming and Scripting
I am trying to write a shell script which will use a text file as an argument to produce pgp encryted file.
Shell script name: encryptext.sh
This is the code of encryptext.sh
#!/usb/bin/ksh
file=$1
cd /home/project/source
gpg --verbose --armour --encrypt --recipient "IMS_L2" --output... (2 Replies)
Discussion started by: shanbalao
2 Replies
5. Shell Programming and Scripting
Hi,
I have this problem of merging 2 shell scripts and run it one after the other. For eg: script A runs to give OutputA. This OutputA should become the input of script B which will run to give OuputB. Now this has to happen automatically i.e, script A and script B should run consecutively one... (1 Reply)
Discussion started by: Vindhyaauri
1 Replies
6. Shell Programming and Scripting
hi guys,
I need a shell script to send mail automatically to my personal mail id like xxxx@hotmail.com but while experimenting with "mail" command I faced following problems.
cat text1.txt | mail -s 'test mail' xxxx@hotmail.com
command successfully executed
but while
checking for... (4 Replies)
Discussion started by: rrd1986
4 Replies
7. Shell Programming and Scripting
Dear All,
I want to execute a shell script,whlie system is booting.
I was try using /etc/rc.d/rc.local file but its not working. (1 Reply)
Discussion started by: rajamohan
1 Replies
8. Shell Programming and Scripting
I want to automatically download a CSV file daily which can be found here:
http://www.londonstockexchange.com/en-gb/pricesnews/prices/coveredwarrants/search.htm
and the link is named "Click to download covered warrants (100Kb)" onthe right hand side.
What commands can I use to invoke clicking... (1 Reply)
Discussion started by: figaro
1 Replies
9. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
INTRO(9) BSD Kernel Developer's Manual INTRO(9)
NAME
intro -- introduction to system kernel interfaces
DESCRIPTION
This section contains information about the interfaces and subroutines in the kernel.
PROTOTYPES ANSI-C AND ALL THAT
Yes please.
We would like all code to be fully prototyped.
If your code compiles cleanly with cc -Wall we would feel happy about it. It is important to understand that this isn't a question of just
shutting up cc, it is a question about avoiding the things it complains about. To put it bluntly, don't hide the problem by casting and
other obfuscating practices, solve the problem.
INDENTATION AND STYLE
Believe it or not, there actually exists a guide for indentation and style. It isn't generally applied though.
We would appreciate if people would pay attention to it, and at least not violate it blatantly.
We don't mind it too badly if you have your own style, but please make sure we can read it too.
Please take time to read style(9) for more information.
NAMING THINGS
Some general rules exist:
1. If a function is meant as a debugging aid in DDB, it should be enclosed in
#ifdef DDB
#endif /* DDB */
And the name of the procedure should start with the prefix DDB_ to clearly identify the procedure as a debugger routine.
SCOPE OF SYMBOLS
It is important to carefully consider the scope of symbols in the kernel. The default is to make everything static, unless some reason
requires the opposite.
There are several reasons for this policy, the main one is that the kernel is one monolithic name-space, and pollution is not a good idea
here either.
For device drivers and other modules that don't add new internal interfaces to the kernel, the entire source should be in one file if possi-
ble. That way all symbols can be made static.
If for some reason a module is split over multiple source files, then try to split the module along some major fault-line and consider using
the number of global symbols as your guide. The fewer the better.
SEE ALSO
style(9)
HISTORY
The intro section manual page appeared in FreeBSD 2.2.
BSD
December 13, 1995 BSD