Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. darkstar

    Limiting FTP access

    What you are referring to is anonymous FTP, which does a chroot to a predetermined directory to prevent the user from surfing your machine. Once chroot'ed, the user can't even find things like ls, which FTP needs to show the contents of a directory. This is why you need to replicate a...
  2. darkstar

    Serial Port as Input

    That is not an AWK question. AWK either reads from standard input or from a file you specify on the command line. You can reference a serial port both ways.<br> Awk will close out as soon as it sees eof though, so a serial port without data on it will cause awk to prematurely close.<br> You...
  3. darkstar

    Limiting FTP access

    You can't get there from here. Solaris ftpd doesn't swing that way.<br> If memory serves, the Washington University FTPD (Wu-ftpd) has some capabilities like that, but it involves significant effort.
  4. darkstar

    Does anyone know of a third party package that locks a user account af

    Sun has long considered what you want to be a form of Denial of Service attack. They don't let you do that with their system as it comes out of the box.<br> There are other tools that you can BUY to accomplish this. One I am familiar with is Guardian, from datalynx. Check out <A...
  5. darkstar

    Y2K

    You can also call IBM up and ask them for a Y2K CD, which we did. They put all the APARS you need on one CD and you can install it (soon!)
  6. darkstar

    How do I write interactive korn shell script

    I have been unsuccessful in doing this with ksh. However, it is possible to do, and I have done it, with Perl.
  7. darkstar

    moving lowercase to uppercase files

    using the script submitted by allias, typesetting to uppercase, of course, add an entry that crops the .cpy from the variable thusly:<br> ${File}=${File%%.cpy}<br> before doing the LowerCase=$File thing (or UpperCase if you changed your variables to match your intention).<br> Of course, you need...
  8. darkstar

    Using telnet

    The most obvious answer is that you have a wrong username/password combination. You would typically get another chance, which you have not indicated.<br> TCP wrappers or inetd.sec would prevent you from ever seeing a login prompt in the first place.<br> Another possibility is that you...
  9. darkstar

    High Availbility

    The Veritas product is called &quot;First Watch&quot;.<br> It would be difficult to recommend a product without knowing what your expectations are.<br> I would look seriously at the HP product first, due to the simple issue of multiple vendor support for what is, always, a complex setup (high...
  10. darkstar

    Can't ping

    It would be very foolhardy to have a non-Unix literate person configure and implement a Unix based firewall. I recommend that you perform the following exercise:<br> locate the ON/OFF switch for the DEC.<br> Push it repeatedly until the DEC is OFF.<br> Wait for the UNIX guy to return.
  11. darkstar

    UNIX Korn shell scripting

    Assuming these character strings are in a variable, say FRED, use the reference ${FRED##xxx}.<br> xxx refers to a RE matching the end of your string. You may have trouble unless you know either the total number of characters (say it's 5, then xxx would be ????), or some other character to match...
  12. darkstar

    How to know when a disk subsystem has stopped responding

    In this case there are no internal disks. And we are indeed using a 3rd party product (ITO) to monitor the system. All of ITO's processes that check the wellness of the machine locked up as well, apparently pending on I/O.
  13. darkstar

    AIX 4.2 vs. NT4.0

    For using SMB resources on an Unix box you might want to look into Samba.
  14. darkstar

    Newbie question - what is OpC?

    OPC is a product that runs on top of Openview -- it is used to monitor the internals of a Unix or NT computer. Nowadays it is called HP Openview IT/Operations Center.<br> "Just learn it" is a steep command. Try spending a couple of weeks in HP's classes on ITO first.
  15. darkstar

    How to know when a disk subsystem has stopped responding

    Greetings,<br> We had a case where a server with external disks had a bad problem. Somehow the power cord for the disks got pulled out and the disk stopped responding (of course).<br> Oddly enough, the kernel kept running, at least for the time being, and the box responded to pings, snmp...
  16. darkstar

    Going from a DEC/Digital Unix enviorment to a IBM/AIX or HP/UX.

    Well, the size of the mail app is an issue as well. How big a Linux box can you make? Our mail server has 9Gb of space just for mail, and handles 70,000 pieces of mail a day. The throughput is fairly good, but a smaller, slower box would not be able to keep up.<br> Add the web server hits on top...
  17. darkstar

    no username prompt for telnet

    User Access Verification is a response I see from our Cisco routers. Are you sure you are telnetting to an HP Unix system?
  18. darkstar

    Defining change control scope

    Everyone agrees that change control is a good thing. Our Mgmt. has started firing people who do no have change records for performing changes. The question in the admins' mind is, what is a change? Does changing your .profile constitute change? Does logging in (which updates wtmp)constitute...

Part and Inventory Search

Back
Top