>From RH7.1:

[root@ns init.d]# pwd
/etc/init.d
[root@ns init.d]# head xinetd
#!/bin/bash
#
# xinetd        This starts and stops xinetd.
#

I think you will find that 

/etc/init.d/xinetd restart

will do the job for you, but I could be wrong. The old version was
/etc/rc.d/init.d/inet restart

David.


On Sat, 9 Mar 2002, Christopher Booth wrote:

> /etc/rc.d/init.d/*network restart 
> 
> :D
> 
> Chris
> 
> 
> On Thu, 7 Mar 2002 12:17:06 +1100 
> "Stuart Cooper" <[EMAIL PROTECTED]> wrote:
> 
> > 
> > although this trick doesn't seem to work with the RedHat xinetd (grrrr)
> > 
> > in general for other services
> > /etc/init.d/SERVICE stop
> > /etc/init.d/SERVICE start
> > where SERVICE is a background service like inetd, apache, nfs, smb etc.
> > 
> > might be a different pathname on some flavours of Linux, but good to
> > know.
> > 
> > Stuart.
> > 
> > 
> > 
> >  
> > 
> >                     Michael Lake
> > 
> >                     <Mike.Lake@uts       To:     [EMAIL PROTECTED]
> > 
> >                     .edu.au>             cc:
> > 
> >                     Sent by:             Subject:     Re: [SLUG]
> > restarting after editing inetd.conf            
> >                     slug-admin@slu
> > 
> >                     g.org.au
> > 
> >  
> > 
> >  
> > 
> >                     07/03/2002
> > 
> >                     01:07 PM
> > 
> >                     Please respond
> > 
> >                     to Michael
> > 
> >                     Lake
> > 
> >  
> > 
> >  
> > 
> > 
> > 
> > 
> > Ben Donohue wrote:
> > > Hi slugs,
> > > excuse me if this is obvious to some.
> > > If I edit inetd.conf is there a way to re-run inetd.conf with the new
> > > settings without restarting the computer?
> > 
> > # killall -HUP inetd
> > 
> > 
> > --
> > --------------------------------------------------------------------
> > Michael Lake
> > University of Technology, Sydney
> > Email: mailto:[EMAIL PROTECTED] Ph: 02 9514 1724 Fx: 02 9514 1628
> > Linux enthusiast, active caver and interested in anything technical.
> > --------------------------------------------------------------------
> > 
> > 
> > UTS CRICOS Provider Code:  00099F
> > 
> > DISCLAIMER
> > =====================================================================
> > This email message and any accompanying attachments may contain
> > confidential information.  If you are not the intended recipient, do not
> > read, use, disseminate, distribute or copy this message or attachments.
> > If you have received this message in error, please notify the sender
> > immediately and delete this message. Any views expressed in this message
> > are those of the individual sender, except where the sender expressly,
> > and with authority, states them to be the views the University of
> > Technology Sydney. Before opening any attachments, please check them for
> > viruses and defects.
> > =====================================================================
> > 
> > 
> > --
> > SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
> > More Info: http://lists.slug.org.au/listinfo/slug
> > 
> > 
> > 
> > 
> > -- 
> > SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
> > More Info: http://lists.slug.org.au/listinfo/slug
> > 
> > ---
> > Incoming mail is certified Virus Free.
> > Checked by AVG anti-virus system (http://www.grisoft.com).
> > Version: 6.0.330 / Virus Database: 184 - Release Date: 28/02/02
> >  
> -- 
> SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
> More Info: http://lists.slug.org.au/listinfo/slug
> 

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to