The i2a2-auth.pl file contains a Perl script, written by Ron Kittendorf, that shows how to use the Net::LDAP Perl module to bind via the I2A2 LDAP protocol converter. The script uses the Net::LDAP ...
Bringing automation to ASIC design typically includes the use of “Scripts†. In the new competitive generation of chip designing where Time-to-Market is so critical, you need a way to finish your ...
Command-line Perl scripts can make adminstering a UNIX box easier by replacing certain commands with some routine scripts. Find out how to take advantage of this approach. Perl is everywhere. Most ...
Every programming language has its strengths...and its weaknesses. We identify five tasks for which perl is ideally suited, and four that...well, really, shouldn't you choose something else? We all ...
Since I’m seldom in control of all the devices between myself and whatever system I am trying to reach, I often like to verify whether I will be able to connect to a particular port on the particular ...
Many people are thinking of ssh tunnels when they talk about port forwarding. It’s easy to set up and you probably have everything you need (i.e., ssh) on most any system you want to use it on. Port ...