IBM AIX Toolbox download - date listing. AIX Toolbox for Linux Applications Open Source packages available for installation on AIX. FAQ AIX Contents Backup and Restore. How can I archive a directory with backup? How to exclude a directory from being backed up by the mksysb command? Fix plugin dependency resolution. Jenkins will now refuse to load plugins with unsatisfied dependencies, which resulted in difficult to diagnose problems. A collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. SUSE Linux Enterprise Server 1. SP4. Storage Administration Guide. Copyright (C) 1. 98. Free Software Foundation, Inc. Temple Place - Suite 3. Boston, MA 0. 21. USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software- -to ensure that the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to ensure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must ensure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author’s protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. ![]() If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors’ reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a). You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a). Accompany it with the complete corresponding machine- readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b). Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine- readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c). Accompany it with the information you received as to the offer to distribute corresponding source code. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. Unix Toolbox. Unix Toolbox. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. This is a practical guide with concise explanations, however the reader is supposed to know what s/he is doing. Hardware . See also /etc/issue. If the master. passwd is modified manually (say to delete a password), run # pwd. The message in nologin will be displayed (might not work with ssh pre- shared keys). The default limits are usually too low. The status is checked. For example to change the open files limit from. This is only valid within the shell. The ulimit command can be used in a script to change the limits for the script only. For example. # cat /etc/security/limits. Limit user processes. Limit application open files. System wide. Kernel limits are set with sysctl. Permanent limits are set in /etc/sysctl. An unlimited value is still limited by the system maximal value. Permanent limits are set in /etc/sysctl. The syntax is the same as Linux but the keys are different. Better for apache/sendmail. How many file descriptors are in use. How many open sockets are in use. Default is 1. 02. See The Free. BSD handbook Chapter 1. And also Free. BSD performance tuninghttp: //serverfault. Solaris. The following values in /etc/system will increase the maximum file descriptors per proc. The scripts are stored in /etc/init. N. d with N the runlevel number. It is usually 3 or 5. The actual runlevel can be changed with init. For example to go from 3 to 5. Enters runlevel 5. Shutdown and halt. Single- User mode (also S)2 Multi- user without network. Multi- user with network. Multi- user with X6 Reboot. Use chkconfig to configure the programs that will be started at boot in a runlevel. Default is to start in 2,3,4 and 5 and shutdown in 0,1 and 6. The final boot state (single user, with or without X) is configured in /etc/ttys. All OS scripts are located in /etc/rc. The activation of the service is configured in /etc/rc. The default behavior is configured in /etc/defaults/rc. The scripts responds at least to start. For example # init 6 for reboot. Use the command passwd at the prompt to change the password and then reboot. Forget the single user mode as you need the password for that. You can select the single user mode on the boot menu (option 4) which is displayed for 1. The single user mode will give you a root shell on the / partition. The solution is to mount the root partition from an other OS (like a rescue CD) and change the password on the disk. To restart the build after an interruption, add the option NO. Boot from a live cd, . Suppose linux lies on /dev/sda. Misc. Disable OSX virtual memory (repeat with load to re- enable). Faster system, but a little risky. A list of all running process is retrieved with ps. Negative numbers have a higher priority, the lowest is - 2. Positive is . Make sure you know if /usr/bin/nice or the shell built- in is used (check with # which nice). This is very useful for intensive IO application (e. You can select a class (idle - best effort - real time), the man page is short and well explained. Every command launched from this shell will have a lover priority. List the processes with jobs. When needed detach from the terminal with disown. See also the program htop from htop. Linux and Free. BSD (ports/sysutils/htop/). While top is running press the key h for a help overview. Useful keys are. u . Use + or blank to see all usersk . The default umask can be changed for all users in /etc/profile for Linux or /etc/login. Free. BSD. The default umask is usually 0. The umask is subtracted from 7. If listed in /etc/fstab. Or find the device in /dev/ or with dmesg. Free. BSD# mount - v - t cd. If the Free. BSD has many slices, they are the one not listed in the fdisk table, but visible in /dev/sda* or /dev/hda*. Necessary for fsck for example. Linux. # mount - o ro - u / # Free. BSD. Copy the raw data from a cdrom into an iso image (default 5. Virtualbox. Allow a share on the host. VBox. Manage sharedfolder add . It now in use. # swapoff /swap. Mount an SMB share. Suppose we want to access the SMB share myshare on the computer smbserver, the address as typed on a Windows PC is \\smbserver\myshare\. We mount on /mnt/smbshare. Warning> cifs wants an IP or DNS name, not a Windows name. Without conv=notrunc, the image will be smaller if there is less content on the cd. See below and the dd examples. To overcome the file names restrictions: - r enables the Rock Ridge extensions common to UNIX systems, - J enables Joliet extensions used by Microsoft systems. DMA is enabled with the sysctl command and the arguments below, or with /boot/loader. Additionally it is possible to use the native ATAPI interface which is found with. ATAPI - scanbus. And burn the CD/DVD as above. The examples refer to the dvd device as /dev/dvd which could be a symlink to /dev/scd. Linux) or /dev/cd. Free. BSD) or /dev/rcd. Net. BSD/Open. BSD character SCSI) or /dev/rdsk/c. Solaris example of a character SCSI/ATAPI CD- ROM device). There is a nice documentation with examples on the Free. BSD handbook chapter 1. This can be trimmed with dd. It is in the Free. BSD ports in sysutils/bchunk. Here we use the vnode 0, but it could also be 1. Test your setup with # /etc/rc. The reason is that the /etc/rc. Images located outside the root partition will be mounted later with the script /etc/rc. How to create a 6. MB partition mounted on /memdisk. Free. BSD# mount. Don't tell me why you want to change the MAC address.. For example etherchangehttp: //ntsecurity. Or look for . The program netstat- nathttp: //tweegy. The domain to which the host belongs is also stored in this file. A minimal configuration is. Check the system domain name with. Same as dnsdomainname. Windows. On Windows the DNS are configured per interface. To display the configured DNS and to flush the DNS cache use. Firefox) and will be unaffected. For example the public DNS server 2. See from which server the client receives the answer (simplified answer). Any entry can be queried and the DNS server can be selected with @. MX google. com. # dig @1. NS sun. com # To test the local server. NS MX heise. de # Query an external server. AXFR @ns. 1. xname. Get the full zone (zone transfer). The program host is also powerful. This can be done with dig, host and nslookup. Single hosts can be configured in the file /etc/hosts instead of running named locally to resolve the hostname queries. The format is simple, for example. The priority between hosts and a dns query, that is the name resolution order, can be configured in /etc/nsswitch. AND /etc/host. conf. The file also exists on Windows, it is usually in. C: \WINDOWS\SYSTEM3. DRIVERS\ETCDHCPLinux. Some distributions (Su. SE) use dhcpcd as client. The default interface is eth. To configure an interface (for example bge. The lease with the full information is stored in. Use /etc/dhclient. Use windump - D to list the interfaces. If you don't scan your servers, hackers do it for you.. The following examples are simple practical uses of the Linux and Free. BSD capabilities to better use the available bandwidth. However filling the queue with a fast device (e. It is therefore useful to limit the device upload rate to match the physical capacity of the modem, this should greatly improve the interactivity. Set to about 9. 0% of the modem maximal (cable) speed. Pipes are used to set limits the bandwidth in units of . Using the same pipe number will reconfigure it. For example limit the upload bandwidth to 5. Kbit. See the full example on voip- info. Suppose Vo. IP uses udp on ports 1. The following commands define the Qo. S to three queues and force the Vo. IP traffic to queue 1 with Qo. S 0x. 1e (all bits set). The default traffic flows into queue 3 and Qo. S Minimize- Delay flows into queue 2. Find the 2^N ending of the port range, deduce the range and convert to HEX. This is your mask. Example for 1. 00. Mon Sep 2. 4 1. 3: 5. The master server is servername. Here some useful examples, there are many more on the net, for example g- loaded. You might need to use the command netcat instead of nc. Also see the similar command socat. The transfer is very quick (no protocol overhead) and you don't need to mess up with NFS or SMB or FTP or so, simply make the file available on the server, and get it from the client. Here 1. 92. 1. 68. IP address. Or use nc 1. The text is transferred with the enter key. The idea is to append your public key to the authorized. For this example let's connect host- client to host- server, the key is generated on the client. With cygwin you might have to create your home directoy and the . USER/. ssh. Use ssh- keygen to generate a key pair. Keys generated by the ssh. Open. SSH server. This can be done with the ssh- keygen command. The key is not protected by a password. To avoid a man- in- the- middle attack the administrator of the server can send you the server fingerprint which is then compared on the first login. Use ssh- keygen - l to get the fingerprint (on the server). However the implementation is very slow. See fuse sshfshttp: //fuse. This only works with TCP. The general nomenclature for forward and reverse is (see also ssh and NAT example). L localport: desthost: destport user@gate # desthost as seen from the gate. R destport: desthost: localport user@gate # forwards your localport to destination# desthost: localport as seen from the client initiating the tunnel. X user@gate # To force X forwarding. This will connect to gate and forward the local port to the host desthost: destport. Note desthost is the destination host as seen by the gate, so if the connection is to the gate, then desthost is localhost. More than one port forward is possible. This is the simplest example, desthost is thus localhost, and we use the port 8. Once the ssh session is open, both services are accessible on the local ports. We need access to the smb share and also remote desktop to the server. Furthermore the local RDP is already listening on 3. For this example let's use a virtual IP of 1. With putty use Source port=1.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |