Zkill script to detect and kill zombie processes

Assignment Help Basic Computer Science
Reference no: EM133234896

Question

Write the "zkill" script to detect and kill zombie processes. a. The script should run every 30 minutes using a cron job under user "bill" and work exactly as described in the man page accompanying this exercise. When a zombie is detected a log message is appended to /tmp/zombie-logs. The message is: "Detected zombie process: 234. User: bob. Successfully killed." (where the PID of the zombie is inserted in place of "234", and the username is in place of "bob"). If the zombie was not successfully killed the message is: "Detected zombie process: 235. User: Alice. Could not kill".

Reference no: EM133234896

Questions Cloud

Electric car company-overapplied-underapplied overhead : Electric Car Company listed the following data for the current year. If overhead is applied based on machine hours, the overapplied/underapplied overhead is.
Integrated program in fortran language : Write an integrated program in Fortran language to read the temperature (T) for 44 different values ??in a single matrix and find the sum of the temperatures
Numerous categories : The Pro Shop sells a variety of items from numerous categories. Aleeta would like to promote all items that are NOT accessories.
Prepare staff rosters : Prepare staff rosters that meet diverse operational requirements across three different roster periods.
Zkill script to detect and kill zombie processes : Write the "zkill" script to detect and kill zombie processes. The script should run every 30 minutes using a cron job under user "bill" and work exactly
Threat-risk-vulnerability-exploit and actions : Explain in detail the following terms from the terminology often used in IPS and network security: threat, risk, vulnerability, exploit, and actions.
Acid properties are maintained within database : Why would it be important for a business to ensure ACID properties are maintained within the database?
Financial-controlling and human capital management : Express your understanding about FINANCIAL, Controlling, and Human Capital Management.
Determine which database management system : What are some ways you can determine which database management system will work best for a given project?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide future of mimo

What is MIMO? What's the history? What issues are addressed? What are the goals? Identify all advantages and disadvantages of MIMO.

  Compare a public network to a private network

Explain the various privacy rights that businesses on the Web are lawfully obligated to adhere to. Describe some of the gray areas in enforcing these laws on the Internet.

  Research an example of cyber terrorism

Write a brief Discussion describing the terrorism attack and it's aftermath. Comment on ways the attack could have been prevented.

  Inconsistent data on interesting nature of relationship

These measures, taken in whole, may instead give us inconsistent data on the interesting nature of the relationship.

  Process improvement and workflow automation

Brief description of your workflow. What information differs from process improvement to technology optimization when creating the workflow?

  How large a sample do they need

Estimate the mean to within 0.1 hours at 95% reliability and assume the sample standard deviation provides a good estimate for the population

  Returns on yasmin corporation

You've observed the following returns on Yasmin Corporation's stock over the past five years: 18 percent, -14 percent, 20 percent, 22 percent, and 10 percent.

  What are the keys to successful project portfolio management

What are the keys to successful project portfolio management? What are some of the key difficulties in successfully implementing portfolio management practices?

  How many ones would be in the network mask

Suppose a network administrator wants to place 64 subnets on a /19 network.

  Find the asymptotic upper bound for in the recurrences

How do we find the asymptotic upper bound for T(n) in the below recurrences? (Please show work using at least a recurrence tree and substitution method)

  Describe the plain view doctrine

Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine

  Configuring a network location

As an administrator of the Contoso Corporation, you are responsible for configuring the users' mobile computers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd