/l3/users/12-12-2011/NT-BSDnet/freebsd1.net.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 |
|
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=12.187 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=2.294 ms ^C --- 192.168.30.190 ping statistics --- 2 packets transmitted, 2 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 2.294/7.240/12.187/4.946 ms |
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=12.187 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=2.294 ms ^C --- 192.168.30.190 ping statistics --- 2 packets transmitted, 2 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 2.294/7.240/12.187/4.946 ms |
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=12.187 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=2.294 ms ^C --- 192.168.30.190 ping statistics --- 2 packets transmitted, 2 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 2.294/7.240/12.187/4.946 ms |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 19
Trying 192.168.30.190... Connected to 192.168.30.190. Escape character is '^]'. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ... *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst ./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu /0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv 0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw 123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV telnet> quit Connection closed. |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#telnet 192.168.30.190 echo
Trying 192.168.30.190... telnet: connect to address 192.168.30.190: Connection refused telnet: Unable to connect to remote host |
#cd /usr/ports/security/nmap
|
#cd /usr/ports/security/nmap
|
#cd /usr/ports/security/nmap
|
#cd /usr/ports/security/nmap
|
#cd /usr/ports/security/nmap
|
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#make install clean
===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.61TEST2.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist/nmap-5.61TEST2.tar.bz2 nmap-5.61TEST2.tar.bz2 100% of 20 MB 560 kBps 00m00s ===> Extracting for nmap-5.61.t2 => SHA256 Checksum OK for nmap-5.61TEST2.tar.bz2. ===> Patching for nmap-5.61.t2 ===> Applying FreeBSD patches for nmap-5.61.t2 ===> nmap-5.61.t2 depends on executable: gmake - found ... /usr/local/bin/nmap If there are vulnerabilities in these programs there may be a security risk to the system. FreeBSD makes no guarantee about the security of ports included in the Ports Collection. Please type 'make deinstall' to deinstall the port if this is a concern. For more information, and contact details about the security status of this software, see the following webpage: http://nmap.org/ ===> Cleaning for lua-5.1.4_6 ===> Cleaning for nmap-5.61.t2 |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:04 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.13 seconds |
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=1.261 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=1.496 ms ^C --- 192.168.30.190 ping statistics --- 3 packets transmitted, 3 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 1.261/68.823/203.711/95.381 ms |
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=1.261 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=1.496 ms ^C --- 192.168.30.190 ping statistics --- 3 packets transmitted, 3 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 1.261/68.823/203.711/95.381 ms |
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=1.261 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=1.496 ms ^C --- 192.168.30.190 ping statistics --- 3 packets transmitted, 3 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 1.261/68.823/203.711/95.381 ms |
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=1.261 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=1.496 ms ^C --- 192.168.30.190 ping statistics --- 3 packets transmitted, 3 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 1.261/68.823/203.711/95.381 ms |
#ping 192.168.30.190
PING 192.168.30.190 (192.168.30.190): 56 data bytes 64 bytes from 192.168.30.190: icmp_seq=0 ttl=64 time=1.261 ms 64 bytes from 192.168.30.190: icmp_seq=1 ttl=64 time=1.496 ms ^C --- 192.168.30.190 ping statistics --- 3 packets transmitted, 3 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 1.261/68.823/203.711/95.381 ms |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.21 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.21 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.21 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.21 seconds |
#nmap 192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.21 seconds |
#nmap - p 168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Invalid target host specification: - QUITTING! |
#nmap - p 168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Invalid target host specification: - QUITTING! |
#nmap - p 168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Invalid target host specification: - QUITTING! |
#nmap - p 168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Invalid target host specification: - QUITTING! |
#nmap - p 168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:05 EET Invalid target host specification: - QUITTING! |
#nmap -Pn92.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:06 EET |
#nmap -Pn92.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:06 EET |
#nmap -Pn92.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:06 EET |
#nmap -Pn92.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:06 EET |
#nmap -Pn92.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:06 EET |
#nmap -P 192.168.30.190
Illegal Argument to -P, use -Pn, -PO, -PI, -PB, -PE, -PM, -PP, -PA, -PU, -PT, -PY, or -PT80 (or whatever number you want for the TCP probe destination port) QUITTING! |
#nmap -P 192.168.30.190
Illegal Argument to -P, use -Pn, -PO, -PI, -PB, -PE, -PM, -PP, -PA, -PU, -PT, -PY, or -PT80 (or whatever number you want for the TCP probe destination port) QUITTING! |
#nmap -P 192.168.30.190
Illegal Argument to -P, use -Pn, -PO, -PI, -PB, -PE, -PM, -PP, -PA, -PU, -PT, -PY, or -PT80 (or whatever number you want for the TCP probe destination port) QUITTING! |
#nmap -P 192.168.30.190
Illegal Argument to -P, use -Pn, -PO, -PI, -PB, -PE, -PM, -PP, -PA, -PU, -PT, -PY, or -PT80 (or whatever number you want for the TCP probe destination port) QUITTING! |
#nmap -P 192.168.30.190
Illegal Argument to -P, use -Pn, -PO, -PI, -PB, -PE, -PM, -PP, -PA, -PU, -PT, -PY, or -PT80 (or whatever number you want for the TCP probe destination port) QUITTING! |
#man nmap
|
#man nmap
|
#man nmap
|
#man nmap
|
#man nmap
|
#nmap -A192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:09 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 5.17 seconds |
#nmap -A192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:09 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 5.17 seconds |
#nmap -A192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:09 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 5.17 seconds |
#nmap -A192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:09 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 5.17 seconds |
#nmap -A192.168.30.190
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:09 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 5.17 seconds |
#nmap -A 192.168.30.65
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:10 EET |
#nmap -A 192.168.30.65
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:10 EET |
#nmap -A 192.168.30.65
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:10 EET |
#nmap -A 192.168.30.65
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:10 EET |
#nmap -A 192.168.30.65
Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-13 18:10 EET |
Время первой команды журнала | 16:50:19 2011-12-13 | ||||||||||||||||||
Время последней команды журнала | 17:09:24 2011-12-13 | ||||||||||||||||||
Количество командных строк в журнале | 101 | ||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 28.71 | ||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 0.00 | ||||||||||||||||||
Суммарное время работы с терминалом *, час | 0.32 | ||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 5.29 | ||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008