Летопись МИФИ

Против жуликов и воров


ЕГЭ-2024
Тесты ЕГЭ Онлайн
Задачи ЕГЭ по математике
Решения ЕГЭ по математике

Вступительные экзамены и специальности
Фишки для Корума:
Рейтинг пользователей Корума
Настроение • Модераторы
Темы • Картина дня • Realtime
Прочие фишки:
Нецензурная брань
Народная орфография
Морзянка онлайн • Калькулятор
Анаграммы • Игра в города

Загрузка календаря

Новые записи

20.05Задача про фермера и его кредит
26.01Актуализация сервисов ЕГЭ по математике 2014 года
05.11Поломалось
28.08Смена парадигмы
18.07Как вести себя в приличном обществе, предварительно обмочив штаны
оглавление »

Лучшие записи

1.Математическое порно1563
2.Ответы ко всем задачам ЕГЭ по математике 2010 года793
3.Тесты ЕГЭ Онлайн515
4.Результаты ЕГЭ по математике368
5.Результаты ЕГЭ по русскому языку268

О чем тут?

NX VBAB Webometrics igjhs А1-08 Абитуриенты Бачинский ВКонтакте Ващенифтему Волга Диплом Дрессировка преподов Дума ЕГЭ Жизнь Забабахал Инновации История Кафедра 26 Кларк Корум Лженаука МИФИ МИФИсты Морзянка НИЯУ Нанотехнологии Наука Образование Омоймоск ПЦ Поздравляю Поиск Президент Преподы Приколы Программное обеспечение Рейтинги Русский язык Сессия Смерть Статистика Стихи Сувениринг Тест Учеба Учебные материалы ФЯУ Физтех Фотки Ядерщики матанализ

Комментарии

День памяти
  20 мая 2023 (мифи умер)

Задача про фермера и его кредит
  20 мая 2023 (Алекс)

Математическое порно
  22 марта 2023 (Angleton)

Российский Союз ректоров
  19 февраля 2023 (Hellen Paul )

В помощь юному радисту: Морзянка 1.0
  13 ноября 2022 (Сергей)

Знахари и шаманы в МГТУ имени Баумана
  5 ноября 2021 (монах из кельи)

Зачет по инженерной графике
  24 августа 2020 (Инженерная графика)

Пасынки Вселенной
  18 февраля 2020 (Max Brown)

Финансовая пирамида за 10 рублей
  7 февраля 2020 (Флора Миллс)

База решений задач ЕГЭ по математике
  26 декабря 2019 (Мария)

$kib@t®onЪ
Сейчас на скибатроне
Шедевры
Я ищу слово,  «» 

а б в г д е ё ж з и й к л м н о п р с т у ф х ц ч ш щ ъ ы ь э ю я
a b c d e f g h i j k l m n o p q r s t u v w x y z

Слово «put»
впервые сказано пользователем valex 11.06.2005 в 17:58,
и с тех пор употреблялось 54 раза.
СообщенияПользователиПользователи (top10)

Сообщения со словом
«put»

Запрос выполнился за 0.0038 сек.
  1. 18.11.2011, 22:25. рб Дмитрий в теме
    «Ответ на обращения группы студентов МИФИ о демонтаже креста.»
    ... вот его проповедь целиком http www pravoslavie ru put 1780 htm с уважением рб дмитрий
  2. 13.11.2011, 01:53. jiffy в теме
    «The C Programming Language.»
    ... start of sk buff data area insl ioaddr rx fifo skb put skb pkt len pkt len 3 2 outw rxdiscard ioaddr el3...
  3. 16.10.2011, 16:30. jiffy в теме
    «The C Programming Language.»
    ... торвальдсу прилеплено к сообщению 18 этой ветки don t put multiple statements on a single line unless you...
  4. 10.10.2011, 01:14. jiffy в теме
    «The C Programming Language.»
    ... to us by the prophets kernighan and ritchie is to put the opening brace last on the line and put the closing brace first thusly код if x is true we do y this applies to all non-function statement blocks if switch for while do e g код switch action case kobj add return add case kobj remove return remove case kobj change return change default return null however there is one special case namely functions they have the opening brace at the beginning of the next line thus код int function int x body of function heretic people all over the world have claimed that this inconsistency is well inconsistent but all right-thinking people know that a k r are right and k r are right besides functions are special anyway you can t nest them in c note that the closing brace is empty on a line of its own except in the cases where it is followed by a continuation of the same statement ie a while in a do-statement or an else in an if-statement like this код do body of do-loop while condition and код if x y else if x y else rationale k r also note that this brace-placement also minimizes the number of empty or almost empty lines without any loss of readability thus as the supply of new-lines on your screen is not a renewable resource think 25-line terminal screens here you have more empty lines to put comments on ps если тело цикла или оператора if-else...
  5. 25.03.2011, 15:39. ArrK в теме
    «Линукс и мелкомягкие»
    ... objgroup objou create group cn new group name objgroup put samaccountname new group name objgroup setinfo set objou getobject ldap ou ou name ldap domain name for i 1 to 30 if i 10 then set objuser objou create user cn new group name 0 i objuser put samaccountname new group name 0 i else set objuser objou create user cn new group name i objuser put samaccountname new group name i end if objuser accountexpirationdate 01 01 1970 objuser setinfo objgroup add objuser adspath if i 10 then set objuser getobject ldap cn new group name 0 i ou ou name ldap domain name else set objuser getobject ldap cn new group name i ou ou name ldap domain name end if intuac objuser get useraccountcontrol objuser put useraccountcontrol intuac or ads uf dont expire passwd set objsd objuser get ntsecuritydescriptor set objdacl objsd discretionaryacl arrtrustees array nt authority self everyone for each strtrustee in arrtrustees set objace createobject accesscontrolentry objace trustee strtrustee objace aceflags 0 objace acetype ads acetype access denied object objace flags ads aceflag object type present objace objecttype change password guid objace accessmask ads right ds control access objdacl addace objace next objsd discretionaryacl objdacl objuser put ntsecuritydescriptor objsd objuser accountdisabled...
  6. 11.11.2010, 01:06. Chameleon в теме
    «Maxima на Corum'е»
    ... is an acronym usually cited as meaning man and computer or machine aided cognition the laboratory for computer science at the massachusetts institute of technology was known as project mac during the initial development of macsyma the name macsyma is now trademarked by macsyma inc is a large computer program designed for the manipulation of algebraic expressions you can use maxima for manipulation of algebraic expressions involving constants variables and functions it can differentiate integrate take limits solve equations factor polynomials expand functions in power series solve differential equations in closed form and perform many other operations it also has a programming language that you can use to extend maxima s capabilities the dangers of computer algebra with all this marvelous capability however you must bear in mind the limitations inherent in any such tool those considering the use of computers to do mathematics particularly students must be warned that these systems are no substitute for hands on work with equations and struggling with concepts these systems do not build your mathematical intuition nor will they strengthen your core skills this will matter a great deal down the road especially to those of you who wish to break new ground in theoretical mathematics and science do not use a computer as a substitute for your basic education by the same token however proficiency with computers and computer based mathematics is crucial for attacking the many problems which literally cannot be solved by pencil and paper methods in many cases problems which would take years by hand can be reduced to seconds by powerful computers also in the course of a long derivation it is sometimes useful for those who have already mastered the fundamentals to do work in these systems as a guard against careless errors or a faster means than a table of deriving some particular result also in case of an error fixing the resulting error can often be much quicker and simpler courtesy of a mathematical notebook which can be reevaluated with the correct parameters in place but just as a computer can guard against human error the human must not trust the computer unquestioningly all of these systems have limits and when those limits are reached it is quite possible for bizarre errors to result or in some cases answers which are actually wrong to say nothing of the fact that the people who programmed these systems were human and make mistakes to illustrate the limits of computer algebra systems we take the following example when given the integral integrate 1 sqrt 2-2 cos x from x -pi 2 to pi 2 mathematica 4 1 gives with no warnings 2 log 4 2 log cos pi 8 2 log sin pi 8 which n evalutates numerically to give 1 00984 maxima 5 6 returns the integral unevaluated the commercial macsyma says the integral is divergent and maple 7 says infinity cite maxima email list here had the person who wished to learn the result blindly trusted most of the systems in question he might have been misled so remember to think about the results you are given the computer is not always necessarily right and even if it gives a correct answer that answer is not necessarily complete a brief history of macsyma the birthplace of macsyma where much of the original coding took place was project mac at mit in the late 1960s and earlier 1970s projectmac was an mit research unit which was folded into the current laboratory for computer science research support for macsyma included the advanced research projects agency arpa department of defense the us department of energy and other government and private sources the original idea first voiced by marvin minsky was to automate the kinds of manipulations done by mathematicians as a step toward understanding the power of computers to exhibit a kind of intelligent behavior the undertaking grew out of a previous effort at mitre corp called mathlab work of carl engelman and others plus the mit thesis work of joel moses on symbolic integration and the mit thesis work of william a martin the new effort was dubbed macsyma project mac s symbolic manipulator the original core design was done in july 1968 and coding began in july 1969 this was long before the days of personal computers and cheap memory initial development was centered around a single computer shared with the artificial intelligence laboratory a dec pdp-6 this was replaced by newer more powerful machines over the years and eventually the mathlab group acquired its own dec-pdp-10 mit-ml running the its operating system this machine became a host on the early arpanet predecessor to the internet which helped it gain a wider audience as the effort grew in scope and ability the general interest it created led to attempts to port the code that is to take the series of instructions which had been written for one machine and operating system and adapt them to run on another different system the earliest such effort was the running of macsyma in a maclisp environment on a ge honeywell multics mainframe another system at mit the multics environment provided essentially unlimited address space but for various reasons the system was not favored by programmers and the multics implementation was never popular the next effort came about when a group at mit designed and implemented a machine which was based on the notion that hardware support of lisp would make it possible to overcome problems that inhibited the solution of many interesting problems the lisp machine clearly had to support macsyma the largest lisp program of the day and the effort paid off with probably the best environment for macsyma to date although requiring something of an expert perspective lisp machines as well as other special purpose hardware tended to become slow and expensive compared to off-the-shelf machines built around merchant-semiconductor cpus and so the two companies that were spun off from mit symbolics inc and lmi both eventually disappeared texas instruments built a machine called the explorer bases on the lmi design but also stopped production around 1980 the idea of porting macsyma began to be more interesting and the unix based vaxima distribution which ran on a lisp system built at the university of california at berkeley for vax unix demonstrated that it was both possible and practical to run the software on less expensive systems this system franz lisp was implemented primarily in lisp with some parts written in c once the code stabilized the new version opened up porting possibilities ultimately producing at least six variations on the theme which included macsyma maxima paramax paramacs punimax aljbar and vaxima these have followed somewhat different paths and most were destined to fade into the sunset the two which survived obscurity maxima and macsyma we will discuss below punimax was actually an offshoot of maxima some time around 1994 bruno haible author of clisp ported maxima to clisp due to the legal concerns of richard petti then the owner of the commercial macsyma the name was changed to punimax it has not seen much activity since the initial port and although it is still available the ability of the main maxima distribution to compile on clisp makes further development of punimax unlikely there is a certain surprising aspect in this multiplicity of versions and platforms given how the code seemed tied to the development environment which included a unique operating system fortunately berkeley s building a replica of the maclisp environment on the mit-ml pdp-10 using tools available in almost any unix c environment helped solve this problem complicating the matter was the eventual demise of the pdp-10 and maclisp systems as common lisp resembling lisp-machine lisp influenced by bbn lisp and researchers at stanford carnegie mellon university and xerox began to take hold it seemed sensible to re-target the code to make it compatible with what eventually became the ansi common lisp standard since almost everything needed for for macsyma can be done in ansi cl the trend toward standardization made many things simpler there are a few places where the language is not standardized in particular connecting to modules written in other languages but much of the power of the system can be expressed within ansi cl it is a trend the maxima project is planning to carry on to maintain and expand on this flexibility which has emerged with all these versions in recent history there are two which have been major players due this time more to economics than to code quality 1982 was a watershed year in many respects for macsyma it marks clearly the branching of macsyma into two distinct products and ultimately gave rise to the events which have made maxima both possible and desirable mit had decided with the gradual spread of computers throughout the academic world to put macsyma on the market commercially using as a marketing partner the firm of arthur d little inc this version was sold to the symbolics inc which depending on your perspective either turned the project into a significant marketing effort to help sell their high-priced lisp machines or was a diversionary tactic to deny their competitors lmi this program at the same time mit forced uc berkeley richard fateman to withdraw the copies from about 50 sites of the vax unix and vax vms versions of macsyma that he had distributed with mit s consent until some agreement could be reached for technology transfer symbolics hired some of the mit staff to work at symbolics in order to improve the code which was now proprietary the mit-ml pdp-10 also went off the arpanet in 1983 interestingly the closing of the mit lisp and macsyma efforts was a key reason richard stallman decided to form the free software foundation between the high prices closed source code and neglecting all platforms in favor of lisp machines pressure came to bear on mit to release another version to accommodate these needs which they did with some reluctance the new version was distributed via the national energy software center and called doe macsyma it had been re-coded in a dialect of lisp written for the vax at mit called nil there was never a complete implementation at about the same time a vax unix version vaxima was put into the same library by berkeley this ran on any of hundreds of machines running the berkeley version of vax unix and through a unix simulator on vms on any vax system the doe versions formed the basis of the subsequent non-symbolics distributions the code was made available through the national energy software center which in its attempt to recoup its costs charged a significant fee 1-2k it provided full source but in a concession to mit did not allow redistribution this prohibition seems to have been disregarded and especially so since nesc disappeared perhaps it didn t recoup its costs among all the new activity centered around doe macsyma prof william schelter began maintaining a version of the code at ut austin calling his variation maxima he refreshed the nesc version with a common-lisp compatible code version there were from the earliest days other computer algebra systems including reduce camal mathlab-68...
  7. 19.10.2010, 02:42. ln(x) в теме
    «Линукс и мелкомягкие»
    ... regexp for the list of characters that are unsafe to put inside a system or it is built by saying everything but known safe characters anyone want to make bets on if this holds true for i18n ed systems my safe set -a-za-z0-9 s my unsafe re safe set my safe re safe set pppdir the directory containing the ppp config files my pppdir env pppdir die stop screwing with me and set pppdir to something reasonable n if defined pppdir pppdir unsafe re o pppdir etc ppp unless defined pppdir pptpdir the directory containing the pptp drop-in config files my pptpdir env pptpdir die stop screwing with me and set pptpdir to something reasonable n if defined pptpdir pptpdir unsafe re o pptpdir etc pptp d unless defined pptpdir chap secrets the full path to the the chap challenge handshake authentication protocol secrets file my chap secrets pppdir chap-secrets my pap secrets pppdir pap-secrets tunnel dir the directory containing tunnel config files my tunnel dir pppdir peers subsys dir the place rc looks to see if a servics is started before it runs the k scripts my subsys dir var lock subsys the resolv confs my resolv etc resolv conf my resolv pptp resolv pptp my resolv real resolv real clean up the path since this is run as root env path bin usr bin usr sbin delete env bash env delete env ifs delete env env sub usage print usage 0 setup stop start tunnel n print all options must be specified to run non-interactively n exit 1 first some support functions that are used everywhere yesno prompt ask the user prompt and return true for yes false for no sub yesno my prompt 0 while 1 print n prompt y n my choice stdin chomp choice return 1 if choice eq choice yy return 0 if choice nn print ni don t understand choice please try again n queryuser prompt default ask the user prompt and return the answer default if cr sub queryuser my prompt default print prompt print default if defined default print my answer stdin chomp answer answer default if answer eq and defined default return answer configuredtunnels returns a list of configured tunnels sub configuredtunnels my tunnels if -d tunnel dir foreach my f cd tunnel dir ls chomp f next if f eq default my p tunnel dir f if p safe re o print unsafe characters in tunnel name p n next p 1 push tunnels f if -f p and grep pptp p return tunnels bselect a rough equilivent of the bourne shell s select sub bselect my prompt shift my choices for my i 0 choices print i 1 choices i n my reply queryuser prompt undef return reply selecttunnel interactive prints 0 as a prompt and returns the choice sub selecttunnel my tunnel my tunnels configuredtunnels while tunnel eq tunnel bselect 0 tunnels return tunnels tunnel 1 if tunnel d return tunnel if grep tunnel tunnels return addtunnel name ip local remote adds a new tunnel with name name server ip address ip and using the chap secret determined by local name local and remote name remote sub addtunnel my name ip local remote routes if -f tunnel dir name print error peer name already exists n return open peer tunnel dir name or die can t open tunnel dir name for writing print peer pptp tunnel configuration for tunnel name server ip ip n foreach my r routes print peer route r n print peer tags for chap secret selection name local remotename remote tunnel name for ip-up local or ip-up d scripts ipparam name include the main pptp configuration file file pppdir options pptp close peer or die can t close tunnel dir name print added tunnel name n deltunnel name deletes the tunnel named name sub deltunnel my name 0 return if defined name name eq if -f tunnel dir name print error peer name does not exist n return force name to be untainted name is clean because it passed the -f test above and it s not being sent to a shell but -t doesn t know that name o name 1 unlink tunnel dir name print removed tunnel name n breaksymlink file if file is a symlink 1 break the link 2 copy the contents of the file pointed to do file sub breaksymlink my file shift if -l file my link readlink file link 1 link if file m and not link m print breaking symlink file link n unlink file die file pointed at a strangely named file n if link safe re link 1 cp link file rotate target new old rotates config files target full path of the config file new full path of the file being rotated in old expected contents of the file being rotated out example rotate etc resolv conf etc resolv conf pptp etc resolv conf real sub rotate my target new old return undef unless -f new -f old my diff diff target new chomp diff return 1 if diff eq diff diff target old chomp diff if diff ne print warning new not installed n print target does not match old n return undef ln -sf new target print installed new as target n return addchaporpap interactive prompts for parameters and adds a chap or pap secret sub addchaporpap my secret type 0 print add a new secret type secret note any backslashes must be doubled local name this is the local identifier for secret type authentication note if the server is a windows nt machine the local name should be your windows nt username including domain for example domain username my local queryuser local name undef print remote name this is the remote identifier for secret type authentication in most cases this can be left as the default it must be set if you have multiple secret type secrets with the same local name and different passwords just press enter to keep the default my remote queryuser remote name pptp print password this is the password or secret type secret for the account specified the password will not be echoed get the password without echoing stty -echo my pass queryuser password undef stty echo my secrets file if secret type eq chap secrets file chap secrets elsif secret type eq pap secrets file pap secrets else die wrong secret type open secrets file secrets file or die couldn t open secrets file print nadding secret local remote password n n print secrets file local t remote t pass t n print secrets file remote t local t pass n close secrets file or die couldn t close secrets file chmod 0600 secrets file addchaporpap addpptp interactive add a new pptp tunnel configuration sub addpptp my name ip local remote print nadd a new pptp tunnel n n my configs keys pptp servers my choice bselect which configuration would you like to use configs other my routes if choice configs 1 while 1 name queryuser tunnel name undef per man perlsec check for special characters if name w name 1 last print name contains special characters n print please use only alphanumerics and n ip queryuser server ip undef print what route s would you like to add when the tunnel comes up n print this is usually a route to your internal network behind the pptp server n print you can use substitution keywords as in etc pptp d config file n print tunnel dev is the tunnel interface n print def gw is the existing default gateway n print iplocal is the local ip address n print ipremote is the remote ip address n print the syntax to use is the same as the route 8 command n print enter a blank line to stop n while 1 my route queryuser route undef last unless defined route last if route eq if route unsafe re o print route contains unsafe characters discarded n next push routes route else name configs choice-1 ip pptp servers configs choice-1 ip routes pptp servers configs choice-1 routes print local name and remote name should match a configured chap or pap secret local name is probably your nt domain username note any backslashes must be doubled local queryuser local name undef remote queryuser remote name pptp print adding name ip local remote n addtunnel name ip local remote routes sub configureresolv if yesno use a pptp-specific resolv conf during tunnel connections if -f resolv pptp print resolv pptp exists n if yesno do you want to use the existing resolv pptp print renaming resolv pptp resolv pptp orig n rename resolv pptp resolv pptp orig or die couldn t rename resolv pptp if -f resolv pptp my configs keys dns servers my choice bselect which configuration do you want to use configs other my addresses search if choice configs 1 print what domain names do you want to search for partially n specified names n print enter all of them on one line seperated by spaces n search queryuser domain names undef print enter the ip addresses of your nameservers n print enter a blank ip address to stop n while 1 my address queryuser nameserver ip address undef last unless defined address last if address eq push addresses address else search dns servers configs choice-1 search list addresses dns servers configs choice-1 ip list open pptp resolv pptp or die couldn t open resolv pptp for writing print pptp search search n foreach my a addresses print pptp nameserver a n close pptp or die couldn t close resolv pptp if -f resolv real my diff diff resolv resolv real chomp diff if diff ne print resolv real exists n print copying it to resolv real orig n unlink resolv real orig rename resolv real resolv real orig breaksymlink resolv print copying resolv to resolv real n cp -f resolv resolv real print creating link from resolv real to resolv n ln -sf resolv real resolv else they choose not to twiddle etc resolv conf breaksymlink resolv if -f resolv pptp print resolv pptp exists n if yesno do you want to delete etc resolv conf pptp unlink resolv pptp print resolv pptp deleted n else print you have chosen not to delete resolv pptp n this existing resolv pptp may still be used n when tunnel connections are established if you n really don t want it to be used you should n rename or remove it n if -f resolv real my diff diff resolv resolv real chomp diff if diff eq print resolv is identical to resolv real n if yesno do you want to delete resolv real unlink resolv real print resolv real deleted n else print resolv and resolv real both exist n but are not the same you should decide which n one is correct and make sure that file is named n resolv n getchaporpap this returns all the chap or pap secrets with ed out the paswords sub getchaporpap my secret type 0 my secrets file if secret type eq chap secrets file chap secrets elsif secret type eq pap secrets file pap secrets else die wrong sercet type if -f secrets file my list cat secrets file foreach my secret list secret s s s s 1 n unless secret s return list else return undef managesecrets this manages secret files sub managesecrets my secret type 0 while 1 my manage task bselect list secret type secrets add a new secret type secret delete a secret type secret quit if manage task eq 1 print current secret type secrets n my list getchaporpap secret type if list print list else print none n elsif manage task eq 2 addchaporpap secret type elsif manage task eq 3 my list my secrets file if secret type eq chap secrets file chap secrets elsif secret type eq pap secrets file pap secrets else die wrong secret type list getchaporpap secret type if list print select one of the pair of lines that you want removed n print both matching lines will be deleted n my choice bselect remove which secret type secret list none choice-- if choice list print aborted deleting a secret type secret n next else stty -echo my passwd queryuser enter the password for this secret type secret undef stty echo my secrets cat secrets file open secrets file secrets file or die couldn t open secrets file for writing my local remote undef split s list choice my count 0 foreach my c secrets my c local c remote c secret undef split s c if c secret eq passwd c local eq local c remote eq remote c local eq remote c remote eq local count next else print secrets file c close secrets file or die couldn t close secrets file after writing print ndeleted count entries print perhaps you mistyped the password if count 0 print n elsif manage task eq 4 manage task eq q last else next setup this is the part that does the old pptp-setup work first the site-specific config files sub setup my name search list ip list ip configs foreach my f ls pptpdir if f safe re o print name your files something reasonable f doesn t qualify n next f 1 open config pptpdir f or next silently fail here configs config close config chomp f for my i 0 i configs i configs i s o if configs i s chomp configs i if configs i eq nameservers until i configs name search list ip list split configs i name f name dns servers name search list search list dns servers name ip list split ip list else name ip split configs i name f name pptp servers name ip ip pptp servers name routes until configs i eq n chomp configs i if configs i unsafe re o print warning the line n configs i n contains unsafe characters n next pptp servers name routes pptp servers name routes configs i ok now all the info from the config files is in pptp servers and dns servers now let s do something with it while 1 my task bselect manage chap secrets manage pap secrets list pptp tunnels add a new pptp tunnel delete a pptp tunnel configure resolv conf select a default tunnel quit if task eq 1 managesecrets chap elsif task eq 2 managesecrets pap elsif task eq 3 my tunnels configuredtunnels print current tunnels n if scalar tunnels 0 print join n tunnels print n else print none n elsif task eq 4 addpptp elsif task eq 5 my tunnel selecttunnel delete which tunnel deltunnel tunnel if tunnel ne elsif task eq 6 configureresolv elsif task eq 7 my tunnels configuredtunnels if -l tunnel dir default print the current default is readlink tunnel dir default n if -f die tunnel dir default is a regular file not a symlink n my choice bselect which tunnel do you want to be the default tunnels cancel next if choice tunnels 1 unlink tunnel dir default my scratch tunnel dir tunnels choice-1 scratch 1 if scratch safe re o symlink scratch tunnel dir default or die couldn t create defualt symlink elsif task eq 8 task eq q exit 0 start this does the old pptp-start work sub start my tunnel f filter ifs if foo my tunnels configuredtunnels die no configured tunnels n if tunnels 0 if defined argv 1 tunnel argv 1 elsif -l tunnel dir default defined argv 0 my default readlink tunnel dir default tunnel split default -1 elsif -t stdin -t stdout tunnel selecttunnel start a tunnel to which server else usage die nasty characters in tunnel n if tunnel safe re o tunnel 1 my config tunnel dir tunnel die tunnel configuration for tunnel not found n unless -f config open config config or die couldn t open config my conf config close config my ip undef grep server ip conf my server undef server 1 if ip ip -a-za-z0-9 die server address for tunnel not found n unless defined server build a regexp of the currently existing interfaces my ifconfig sbin ifconfig foreach f ifconfig next unless f a-z foo split f push filter foo 0 my if re join filter bring up the tunnel if system usr sbin pppd pty pptp server --nolaunchpppd call tunnel updetach 0 die pptp-command pppd indicated failure n future idea parse the output of the system call above for the interface name...
  8. 29.04.2010, 10:42. рб Дмитрий в теме
    «Ответ на обращения группы студентов МИФИ о демонтаже креста.»
    ... пушкину очень близко к этому http www pravoslavie ru put 2917 htm и опять коротко кому длинно читать неинтересно...
  9. 03.03.2010, 17:40. valex в теме
    «Про Олимпиаду и вообще...»
    ... coubertin suggested that the british should aim to put an olympic medal on the summit everest this suggestion...
  10. 12.11.2009, 23:10. McSim в теме
    «Послание Федеральному Собранию.»
    ... позорной зависимости от нефти и газа we don t wanna put in

← раньше

позже →


Рейтинг блогов



 

откуда • куда • где • eureka!
Бездарно потраченное время:
105824 дня