Solved

owner rights to run `dip -k` from a Perl script

Posted on 1997-01-10
1
401 Views
Last Modified: 2010-03-17
Trying to execute a 'dip -k' within a perl script I am getting no response == no I/O no failure no nuthin' ==

I have tried  system("dip -k");
and exec("dip -k")  and using backquotes instead, both in system() and exec() and just as naked lines in the script.

I have tried killing the ppp0 directly but dip seems to keep the hardware locked if I do that... Messy to have a script calling reboot, so ... I want to get dip -k to do the shutdown.

Also, this is an ISDN port so dip owns 2 ppp# processes.

Rapid replies appreciated, as this box is aworking gateway and needs to be reliable SOON!   8^o

riko
0
Comment
Question by:riko
1 Comment
 
LVL 1

Accepted Solution

by:
mstonge earned 100 total points
ID: 1584037
Perl treats exec arguments as an array so you have to separate them.  Actually if exec sometime can detect some common characters and pass them properly but it's always safer to call exec or system like this:

exec 'dip','-k'

Hope it helps
Marc
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
squid3 ntlm and itunes authentication 5 86
CentOS7 Xvnc gdm login 9 209
how to monitor remote shell execution on linux 9 100
Linux : can't create transaction lock error 1 67
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question