hidepages plugin - suppressed page: test
Recherche
Voici les résultats de votre recherche.
Résultats plein texte:
- redbook @doc
- <WRAP center round important 60%> <del>**Big Brother**</del> **PRISM** is Waching You ! </WRAP> ... -------------------------------------<br> <strong>The #OpNewblood Super Secret Security Handbook</stron... ------------<br> <tt>If you have not gone through the IRC chat client <br>setup for your operating system, we recommend <br>you go back and get started there.</tt> </center> <p></p> <p><br><br> <b>Maste
- behaviours @terminal
- s a "login shell", Bash reads and sets (executes) the user's profile from ''/etc/profile'' and one of '... _login'', or ''~/.profile'' (in that order, using the first one that's readable!). When a login shell exits, Bash reads and executes commands from the file ''~/.bash_logout'', if it exists. Why an extra login shell mode? There are many actions and variable sets that only ma
- logrotate @debian
- Here is more information on the directives which may be included in a logrotate configuration file: ... fies which command to use to compress log files. The default is gzip(1). See also compress. un... es which command to use to uncompress log files. The default is gunzip(1). compressext ... compressed logfiles, if compression is enabled. The default follows that of the con‐ figu
- basics @terminal
- ====== The basics of shell scripting ====== {{keywords>bash shell scripting basics learning tutorial}}... === A shell script usually resides inside a file. The file can be executable, but you can call a Bash s... name as a parameter: <code> bash ./myfile </code> There is **no need to add a boring filename extension... from UNIX(r), where executables are not tagged by the extension, but by **permissions** (filemode). The
- obsolete @scripts
- bsolete by some measure. A thorough discussion of the rationale is beyond the scope of this page. See the [[scripting:nonportable | portability page]] for a discussion on portabili... rated by Bash but has few if any legitimate uses. These features exist mostly for Bourne, csh, or some
- obselete @terminal
- bsolete by some measure. A thorough discussion of the rationale is beyond the scope of this page. See the [[scripting:nonportable | portability page]] for a discussion on portabili... rated by Bash but has few if any legitimate uses. These features exist mostly for Bourne, csh, or some
- scripting @terminal
- ==== Scripting with style ====== FIXME continue These are some coding guidelines that helped me to read and understand my own code over the years. They also will help to produce code that will be a bit more robust than "if something breaks, I... and terrible code (not only in shell) during all the years, that I'm 100% convinced there needs to be
- port @network
- n ports: 0–1023</span></h2> <p>According to IANA "The Well Known Ports are assigned by the IANA and on most systems can only be used by system (or root) pro... s executed by privileged users. Ports are used in the TCP [RFC793] to name the ends of logical connections which carry long term conversations. For the purp
- code_html @doc
- DES 100-101 ====== **100** - Continue - Tells the client that the first part of the request has been received and that it should continue with the rest of the request or ignore if the request has
- mirc @irc
- IRC: Custom Window** Prior to mIRC 5.5, this was the main method for making a GUI (graphical user interface). A custom window is just another window, like a channel window or a server window. The following commands allow you to modify, add, and ... = Creating a window ==== you can do anything in the window of yours, you will need to actually open i
- positional-parameters @scripts
- positional parameters ====== ===== Intro ===== The day will come when you want to give arguments to your scripts. These arguments are known as **positional parameters*... scribed below: ^Parameter(s)^Description^ |''$0''|the first positional parameter, equivalent to ''argv[0]'' in C, see [[scripting:posparams#the_first_argument | the first argument]]| |''$FUNCNA
- ipset @debian
- - we'll call our list 'blacklist' (please forgive the lack of originality). Note you can create several types of ipset lists, with the type defining the IP address input formats. The two we're interested in here is ip and nethash. ip simply allows defin
- redirection @scripts
- \ Redirection makes it possible to control where the output of a command goes to, and where the input of a command comes from. It's a mighty tool that, together with pipelines, makes the shell powerful. The redirection operators are checked whenever a [[syntax:g
- quoting @scripts
- double}} Quoting and escaping are important, as they influence the way Bash acts upon your input. There are three recognized types: * **per-character escaping** using ... '<nowiki>'stuff'</nowiki>'' All three forms have the very same purpose: **They give you general contro
- terminal
- can be related to switching colors or positioning the cursor, i.e. anything that can't be done by the application itself. ===== How it technically works =... sequence of characters that is printed (like any other text). If the terminal understands the code, it won't display the character-sequence, but will perfor