Karl J. Runge writes:
Does Perl on Win32 have the fork() call yet? If so, is it reasonably
fast (as it is on Unix)? fork() is a nice, simple way to make a server
(for example).
$ uname -a
Windows_NT CLARK2 4.0 17.5 i686
$ perl -v
This is perl, version 5.004_04 built for cygwin32
Copyright
the
interpeter and some thread-specific data as well.
From reading the p5p list I infer that the details of this are still
being worked out...
--kevin
--
Kevin D. Clark | | Will hack Perl for
[EMAIL PROTECTED] | kdcNOSPAM@.alumni.unh.edu | fine food, good beer,
Cabletron
go:
perl -0777 -ne 'print "$1\n\n" while(m/(^HCA.*(?:\nI[XY]\d{5}.*)+)/mg)'
your-file-name
I hope you find this to be useful,
--kevin
--
Kevin D. Clark | | Will hack Perl for
[EMAIL PROTECTED] | kdcNOSPAM@.alumni.unh.edu | fine food, good beer,
Ca
ct had the misfortune of using the
identifier "far" all over the place for variable names...)
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Cabletron Systems, Inc. | PGP Key Available| an
ook, an embedded double-quote "
$
Hope this helps,
--kevin
--
Kevin D. Clark | | Will hack Perl for
[EMAIL PROTECTED] | kdcNOSPAM@.alumni.unh.edu | fine food, good beer,
Cabletron
nvironment.
This will work on most of the Unices that I am familiar with, with the
notable exception of HP-UX, which, IIRC, uses the variable SHLIB_PATH
instead.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Cabletron Sy
[EMAIL PROTECTED] writes:
I am looking for a mail program for UNIX/Linux that works from the command
line. I need to be able to specify recipients (or preferably a file containing a
list of recipients), change the sender address, specify a file to get the body
text from, and attach a
Niall Kavanagh writes:
In a message dated: Wed, 23 Feb 2000 07:21:08 EST
Adam Wendt said:
Somewhere in the past 24 hours my script that grabs slashdot headlines and
puts them in my root menu
Can I see this? :)
Or check out http://www.newsclipper.com/ .
--kevin
--
Kevin D. Clark
Ferenc Tamas Gyurcsan writes:
snmpset NTSERVER public interfaces.ifTable.ifEntry.ifAdminStatus.1 i 2
If you don't know what this does, your nt sysadmins don't want you to play with
this. All it does is bring the eth0 down on an NT box, but from outside, with
snmp. And since this is the
work at all.
If you need such functionality, please consider other vendor's
offerings.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Cabletron Systems, Inc. | PGP Key Available| and I can move the world
Durham
e.
I hope this helps,
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Cabletron Systems, Inc. | PGP Key Available| and I can move the world
Durham,
to
the directory that you're interested in, scroll around in the browser.
Type something like "ls foo*" to filter out all of the cruft that
you're not interested in.
There you go,
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED]
Karl J. Runge writes:
(except to note the *file* listing
trick: "get README |more" with no space between | and more)
Sometimes this is useful as well:
get README -
Especially if you can read fast. (-:
But this doesn't solve the original poster's problem.
--kevin
-
badly that I needed
this information, but it's nice knowing that I have this information
if I ever need it.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can
ng the BSD documentation and code might be
your best bet for now.
I hope this helps,
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham,
witch statments need to be integral
constants. A character string in C doesn't really work here.
My advice to you: just use strcmp(). It's straightforard to code and
when you look at the code 6 months from now it'll be very
understandable.
--kevin
--
Kevin D. Clark |
Jerry Feldman writes:
Here is the generated code where strlen of a constant is evaluated at
compile time.
...
mov 6, $0 # load the
strlen("abcdef")
(This was for an Alpha, right?)
Wow, this only further confirms my belief that
, etc.)
BTW, just to confirm, you're aware that Perl's "-c" flag causes Perl
to just to syntax checking, right? It won't run (most) of your
program if you use this flag.
--kevin
--
Kevin D. Clark | | Will hack Perl for
[EMAIL PROTECTED] |
both systems?
What does your $DISPLAY environment variable look like on the your
remote(home) system?
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can mo
? Is the machine running your application behind this
firewall? A diagram...?
How about typing:
tcpdump 'port 80 || port 21459'
or even:
tcpdump 'ip host YOUR-HOSTNAME and ( port 80 || port 21459 )'
What does this produce and what did you do to produce it?
--kevin
--
Kevin D. Clark
(above).
It doesn't seem out of the ordinary to me that your /bin/login is
suid-root.
If your /bin/sh is suid-root, then yes, freak out.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key
socket. I
think that this *finally* changed around a year or so ago with some
part of Winsock2.
This made writing portable NMS programs that depended on ICMP/ping
pretty painful.
--kevin (former chicken farmer, and *no*, I never used antibiotics)
--
Kevin D. Clark |
. Make sure that you're thinking
about security before you implement this!
Hope this helps,
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED])
ADVERTISEMENT: On Sunday May 7th, I'm riding my bicycle 100 miles
in the American Diabetes Association's Tour de Cure ride. If you're
interested
. RH 6.1, updated (mostly) to 6.2.
Ask the damn paperclip:
http://www.red-bean.com/~joelh/vigor/
(-:
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move
check the attached LOVELETTER coming from me.
/dev/null
Obviously, since this is VB based, this only affects Windoze machines.
But even if you're not using Windoze, you're going to get a lot of
mail if your site is affected...
I hope someone else finds this to be useful,
--kevin
--
Kevin D
ata.
Also, who is the manufacturer of the NAT box?
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham,
See: https://www.nhptv.unh.edu/auction/spring00/s-15.shtml
(this is an item from the NH Public TV auction)
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I
Jeffry Smith writes:
Boeing
jets are extremely complex, requiring hundreds of thousands, if not
millions of parts, each of which must do its job correctly. The
odds are that there are flaws in the jets. Yet, as recent actions
involving the Boeing 737 show, Boeing is held legally and
be taking a big risk
in releasing a software product with any other kind of license.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham,
to her once to update some info in her book but the address
bounced.
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham, N.H. (USA
quot;cat"
will block in write(). Strange things will happen when "cat" becomes
unblocked and attempts to read from "junk" again (after the file has
been truncated).
So there's a race condition going on here.
I've kindof simplified what'
Rodent of Unusual Size writes:
How can I turn a port number from netstat's output into a PID?
I want to find out what non-obvious thing is listening on a
particular port..
Use lsof.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED
listening by default. There is
supposed to be a way to tell x not to listen on that port, but my tries have
been unsuccessful up to this point.
Also try this:
startx -- -nolisten tcp
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give
s to X
(the X server). startx doesn't know what to do with the arguments
"-nolisten" "tcp", but X does...
So when you tried to invoke "startx" without the "--", startx gobbled
up the "-nolisten" "tcp" arguments and never passed them onto the
Kevin D. Clark writes:
In the case of startx, startx just passes these "extra" arguments to X
(the X server). startx doesn't know what to do with the arguments
"-nolisten" "tcp", but X does...
Oops, I meant "xinit" and not "X".
(Jeff Sm
)
functionality isn't supported yet (last time I checked...).
To sum up: you can't export "nested" directories with knfsd. Either
stop using knfsd or else restructure your filesystems so that your
exported directories aren't nested anymore.
Hope this helps,
--kevin
--
Kevi
Derek Martin writes:
I haven't tried it, but can't you just export the subdirectory seperately,
and mount it seperately, and have everything work?
My understanding is "no".
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED]
of the usual Linux package formats.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham, N.H. (USA
begun the process of obtaining new OUIs.
Ha ha. Only serious.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham, N.H. (USA
Has anybody out there gotten a non-windows/non-mac version of the
RealPlayer to work through a proxy/firewall?
I'm specifically interested in versions that run under Linux or
Solaris.
I've never had any luck with this with the free versions that I've
downloaded.
Thanks,
--kevin
--
Kevin D
Ted Knupke writes:
"Kevin D. Clark" wrote:
Has anybody out there gotten a non-windows/non-mac version of the
RealPlayer to work through a proxy/firewall?
...
I am using a free version of RealPlayer 7
Maybe that's it then. The last time I checked (a few months ago),
Re
the user having to
interact at all?
Get Expect.
(My opinion: Expect's usefulness outweighs TCL's hokey syntax.
However, if you've run up against a brick wall with TCL, check out
Perl's Expect module -- it works very well)
--kevin
--
Kevin D. Clark
n it dies the kernel sends the SIGHUP signal to the rest
of the processes in that process group. But netscape isn't in the
shell's process group -- it deliberately disassociated itself from
that group and formed its own.
That's why netscape doesn't die when you kill the shell.
Regards,
--kevi
such problem. And working with
history/long lines is a pleasure to deal with in bash -- in ksh this
is painful.
Of course, if the problem is even moderately complicated, I'd prefer
not to use a shell at all and instead use Perl.
Regards,
--kevin
--
Kevin D. Clark | |
Kevin D. Clark writes:
The key here seems to be that netscape (and a few other GUI programs
that I've looked at) become their own process group leaders.
It occured to me as I was biking home tonight that netscape isn't the
thing that is "placing the netscape process in its own pr
Randy Edwards writes:
So what I was wondering is what are the rules of net etiquette about port
scans. In short, how do others perceive and react to them?
What do you suppose happens after someone employs the following line
of reasoning in a world-wide public forum consisting of
s a UI-independent tool for designing easy-to-use front-ends for
things.
The Tk interface for Perl is pretty nice as well.
--kevin
--
Kevin D. Clark | | Will hack Perl for
[EMAIL PROTECTED] | kdcNOSPAM@.alumni.unh.edu | fine food, good beer,
Enterasys Networks
Derek Martin writes:
No but you have equally obscure and meaningless keywords like car, cdr,
and lambda etc.
CAR and CDR refer to a register in the IBM 704.
Lambda refers to the lambda calculus.
Obscure? Maybe, although my (excellent) LISP teacher told me what CAR
and CDR referred to on
Yet another procmail recipe that you might find to be useful today:
:0:
* B ?? (^( )?The male and female stages of life|LIFE_STAGES.TXT.SHS)
/dev/null
See: http://dailynews.yahoo.com/h/ap/2620/tc/computer_virus_2.html
--kevin
--
Kevin D. Clark
I know what I can do as root and I take the responsibility seriously.
But, hell no, I'm never scared.
Regards,
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Netwo
o out
over the weekend.
I'm telling you right now, if you call into question the
trustworthiness of my friend, I'm going to be insulted.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key
(knock on wood...).
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham, N.H. (USA
Paul Lussier writes:
Sorry for the typo :)
Yeah, I picked up on that instantly and knew what happened. (-:
I'm amazed at the number of typos I make when I post to this list
(especially minor spelling errors). Gee, you'd think I'd know how to
type by now.
No big deal.
--kevin
--
Kevin D
an engineer the root password causes
more problems then it solves.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham, N.H. (USA
u show us your route table (IIRC, "netstat -nw")?
Could you show us the output of "ifconfig -a"?
What kernel version are you running?
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks
Derek Martin writes:
Now, as to what the possible benefits of this might be in a world where
everything is free? Je ne sais pas, mon ami.
More little girls would probably be reading _A Young Lady's
Illustrated Primer_, that's what.
--kevin
--
Kevin D. Clark
this is really useful, but then again I'm
biased: my systems are always on and they're always running cron jobs
and they're nearly always busy doing something. Oh, and the systems
that I use allow me to sensibly access them remotely...
--kevin
--
Kevin D. Clark
tion between the routing code and the ARP
code going on here.
Regards,
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks |
towards us helping
you out. (if you've already done this, just ignore me)
I hope this helps you solve your problem.
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available|
th "set +x")
Now I can get
back to coding . . . ugh.
Hey, I *like* coding... (-:
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the wor
sym } }
print "Hey look, a unique symbol: ", $_, "\n" while (($_ = gensym2) 140);
That's all there is to it. IIRC, there's a discussion of why this
works somewhere in _The Perl Cookbook_.
Sorry I couldn't stay for the entire meeting; I had to get home.
Thanks for
Kenny Donahue writes:
I don't want to go back
to the Pine/Elm/Emacs days since I've
become spoiled with spell check, easy attachments
etc
I use Xemacs for mail (VM), web-surfing (W3), spell-check (ispell),
"easy" attachments (VM handles MIME just fine -- I can even view
JPEG/GIF/PBM
ow how I'd ever live without them...
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED] | [EMAIL PROTECTED] | Give me a decent UNIX
Enterasys Networks | PGP Key Available| and I can move the world
Durham,
Derek Martin writes:
Well, I was mistaken apparently, but Lord Dimwit Flathead is the not so
benevolent ruler in Zork et. al. Sorry Ben, dating myself I guess...
A hollow voice utters ``Cretin!''.
(-:
--kevin
--
Kevin D. Clark | |
[EMAIL PROTECTED
[EMAIL PROTECTED] writes:
Greenfield Community College.
That's where I first got really interested in computers. I took some
"computers for kids" class there. It was taught on Apple II's and
Atari 400's.
The thing that piqued my interest? The instructor showed a BASIC
program that drew
file has the appropiate
permissions (chmod 600 ~root/.rhosts).
I would highly recommend doing this with ssh though. IP addresses can
be spoofed
--kevin (hey, long time no see...)
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me
. I had to go
to Donald Becker's site and update them myself. Bleh.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) | Will hack Perl for
Cetacean Networks, Inc.| fine food, good beer,
Portsmouth, N.H. (USA) | or fun.
[EMAIL PROTECTED
. Without public-key
cryptography, you don't get that.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key Available
~/.shosts file was set up
correctly.
To be honest, I hardly ever use this option.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL
.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key Available
, if you do this, you'd better know what you're doing.
--kevin
PS If you happen to implement this in Perl, taint checks are your
friend.
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA
[EMAIL PROTECTED] writes:
I hate being protected from myself!
I find Perl's taint checks and other warning mechanisms to be much
more helpful than harmful.
Do what you think is best.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) | Will hack Perl for
Cetacean Networks, Inc
tion would be to use
them.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key
arguments.
Try:
@values = $query-param('foo');
$value = $query-param('foo');
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) | Will hack Perl for
Cetacean Networks, Inc.| fine food, good beer,
Portsmouth, N.H. (USA) | or fun.
[EMAIL
the time; it works great for me.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key Available
[EMAIL PROTECTED] writes:
is asks for my passwd and I supply it then it returns error 2.
it tells me something like username valid but ip address not existent
(Im not at home right now)
Please send us the relevant text from the fetchmail logfile.
--kevin
--
Kevin D. Clark ([EMAIL
[EMAIL PROTECTED] writes:
I REALLY would like to know more
about this aspect. It reminds me of the part of Matrix when they're having
dinner...discussing how an AI could possibly know what chicken tastes like.
Suggested readings:
Plato's _Republic_, book 7)
(specifically the allegory of
to poll every N hours, where N9.
The only other way I can think of to glean this information would be
to poll MIB-II sysUpTime values, but it'd probably be safe to say that
most hosts running serious web-servers aren't also running SNMP
servers. So that rules this scheme out.
--kevin
--
Kevin D
'd be very compliant
with RFC793 if you used completely random numbers all the time.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTE
(HWaddr) above? That's it.
(sometimes the MAC is also printed on a sticky label on the outside of
the card)
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move
?
Gosh, if they're using SNMP to configure this, and if they're using
SNMPv1 (which I strongly suspect), I'll bet $100 that Todd can figure
out the community string and the basic MIB structure.
Hahahahah.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc
cablemodem as
well, so I can't exactly say what is going on in that space. Just
because they're a standard doesn't mean everybody is following it...
I've heard about enough misconfigurations of cablemodems so that
checking this out might be fruitful. Or maybe not. YMMV.
--kevin
--
Kevin D. Clark
[EMAIL PROTECTED] writes:
So without an IP addr to point my pings (or SNMP traffic) at,
is there any way to talk to (rather than through) our modems?
Special raw Enet frames, maybe?
I dunno. I'll ask around.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc
and this will do what you want.
For a beginning emacs user who wants to customize things, I highly
recommend using XEmacs. The menu structure of XEmacs might make it
possible for you to customize XEmacs to your needs without learning
Lisp.
--kevin
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks
. ;-)
On a related note, I find rpmfind (http://rpmfind.net) to be
useful for this task.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL
t myself, I wouldn't
tune my kernel in this manner. The TIME_WAIT state exists for good
reason, and there's good reason to not muck with this value.
Hope this helps,
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.
.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key Available
[EMAIL PROTECTED] writes:
People said that about hand calculators 40 years ago...
[this isn't addressed to Derek personally, instead more generally to
those of you on this list who are furthering the argument that we
should stay away from public key cryptosystems "for a few decades"]
OK,
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key Available
)
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key
\.cc?/.o/g'` ; gmake
if I really need a parallel build, but in general I don't use them for
important builds)
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.| Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move
/.Xauthority
--kevin (who wishes he was at the GNHLUG meeting right now)
--
Kevin D. Clark (cetaceannetworks.com!kclark) |
Cetacean Networks, Inc. | Give me a decent UNIX
Portsmouth, N.H. (USA)| and I can move the world
alumni.unh.edu!kdc (PGP Key
idn't hear this from me... (-:
--kevin
--
Kevin D. Clark (cetaceannetworks.com!kclark) |
Cetacean Networks, Inc. | Give me a decent UNIX
Portsmouth, N.H. (USA)| and I can move the world
alumni.unh.edu!kd
[EMAIL PROTECTED] writes:
Any ideas? I've googled to no avail..
How about "sendmail -bD -v"? (or some variant)
^
Regards,
--kevin
--
Kevin D. Clark (cetaceannetworks.com!kclark) |
Cetacean Networks, Inc. | Give me a d
restricted shell. This shell will only allow you to run
programs contained (or linked to) in the smrsh directory.
Hope this helps,
--kevin
--
Kevin D. Clark (cetaceannetworks.com!kclark) |
Cetacean Networks, Inc. | Give me a decent UNIX
Portsmouth, N.H. (USA
[EMAIL PROTECTED] writes:
Anyone know of a decent password checker? I'm not looking for something to
"check" encrypted strings, rather something that tells the person the password
the *want* to use "is bad because...".
IIRC, the pink camel book had one of these.
[EMAIL PROTECTED] writes:
ln -s /etc/smrsh/mailps2pdf.pl /tmp/mailps2pdf.pl
Sorry, that should be:
ln -s /tmp/mailps2pdf.pl /etc/smrsh/mailps2pdf.pl
--kevin
--
Kevin D. Clark (cetaceannetworks.com!kclark) |
Cetacean Networks, Inc. | Give me a decent UNIX
(/([a-zA-Z]+|\d+)/g);
I can think of convoluted ways to do this too, but I'm not sure that
they're worth the effort.
--kevin
--
Kevin D. Clark (cetaceannetworks.com!kclark) | Will hack Perl for
Cetacean Networks, Inc. | fine food, good beer,
Portsmouth, N.H. (USA
strings. For example, it
doesn't work with "21.1.12" or "6.86abc".
Also, you could do something funky like replace the while loop with a for loop:
for ($i = 0;$f = substr ($foo,$i,1);$i++) {
push @foo,$f;
}
Same problem here too.
Sorry.
--kevi
[EMAIL PROTECTED] writes:
I just finished writing a shell script. Well, not really cause it
doesn't do what I want yet. Anyway:
I have a pictures directory. in that directory are three more called
disk1, disk2, and disk3.
What the script is *supposed* to do is "ls $1*.jpg" but when I
1 - 100 of 245 matches
Mail list logo