I get many e-mail messages in my mailbox like the following: On Thu Oct 5 12:19:44 2000, the user root was editing a file named /proc/aironet/eth0/Config on the machine sirach, when it was saved for recovery. You can recover most, if not all, of the changes to this file using the -r option to ex:
ex -r /proc/aironet/eth0/Config This is a file that is edited by a (homemade) script to activate my wireless ethernet card. This is the script: #!/bin/sh ex -s /proc/aironet/eth0/Config >/dev/null <<EOF %s/open/shared :wq! EOF echo paswoord > /proc/aironet/eth0/SSID ifup eth0 (which has to be run as root. 'chmod a+s'-ing the executable owned by root doesn't seem to work). Why? How do I prevent this? -- Arnout Engelen <[EMAIL PROTECTED]> Debian GNU/Linux - when code matters, not commercials