Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.20
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
jed-common /
txt /
[ HOME SHELL ]
Name
Size
Permission
Action
abbrev.txt
7.28
KB
-rw-r--r--
color.txt
1.64
KB
-rw-r--r--
compile.txt
2.2
KB
-rw-r--r--
dfa.txt
8.8
KB
-rw-r--r--
edt.txt
2.45
KB
-rw-r--r--
emacs.txt
8.53
KB
-rw-r--r--
filelock.txt
1.08
KB
-rw-r--r--
fold.txt
5.89
KB
-rw-r--r--
hooks.txt
19.85
KB
-rw-r--r--
ide-mode.txt
7.65
KB
-rw-r--r--
jed_faq.txt
18.17
KB
-rw-r--r--
linux-keys.txt
1.05
KB
-rw-r--r--
menus.txt
1.84
KB
-rw-r--r--
mouse.txt
6.64
KB
-rw-r--r--
pc-keys.txt
3.78
KB
-rw-r--r--
program.txt
5.13
KB
-rw-r--r--
rgrep.txt
1.25
KB
-rw-r--r--
rmail.txt
3.75
KB
-rw-r--r--
script.txt
4.05
KB
-rw-r--r--
syntax.txt
2.47
KB
-rw-r--r--
undo.txt
264
B
-rw-r--r--
utf8.txt
3.56
KB
-rw-r--r--
wjed.txt
7.65
KB
-rw-r--r--
wordstar.txt
1.76
KB
-rw-r--r--
xjed.txt
6.21
KB
-rw-r--r--
xrenderfont.txt
868
B
-rw-r--r--
yankpop.txt
4.44
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : filelock.txt
On Unix systems, JED locks files in a way that is consistent with Emacs, which is also consistent with Interleaf. It made no sense to implement a different incompatible locking system because that would render it useless when interacting with other programs. Whenever a buffer that is attached to a file gets modified, JED will attempt to lock the file. When the buffer is no longer modified (via getting saved to disk or changes discarded via undo), JED will unlock the file. The lock is made by creating a symbolic link in the file's directory with a name that is derived by prefixing the buffer file's name with `.#'. The value of the link is given by USER@HOST.PID. If there is already a lock but owned by another process, then JED will prompt the user for one of the following actions: steal the lock ignore the lock and proceed anyway abort the operation If the user elects to steal the lock, then the symbolic link will be recreated with the value appropriate for the current process. It is probably best to abort the operation and contact the person who has the file locked.
Close