|[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]|
Am I understanding this correctly? My current needs are to to a few things: get a few binary files onto a system and excecute to install alter the contents some config files alter the permissions of some files and foldersadd some users, execute ssh-keygen as them, and place ssh keys in their authorized_users file Am I going down the wrong path by considering RPM as a tool for making these system changes?
-- Clay Stuckey GovSG (843) 218-7042 office (843) 469-5467 cell cstuckey@xxxxxxxxx thomas.c.stuckey@xxxxxxxxxxx thomas.c.stuckey.ctr@xxxxxxxxxxxxxxxx
begin:vcard fn:Clay Stuckey n:Stuckey;Clay org:Government Solutions Group adr:;;;Charleston;SC;29492;USA email;internet:cstuckey@xxxxxxxxx title:Systems Administrator tel;work:(843) 218-7042 tel;cell:(843) 469-5467 x-mozilla-html:FALSE url:www.govsg.com version:2.1 end:vcard
Description: S/MIME Cryptographic Signature
_______________________________________________ Rpm-list mailing list Rpm-list@xxxxxxxxxxxxx http://lists.rpm.org/mailman/listinfo/rpm-list