knife (8) manual page

KNIFE(8) MAINTENANCE COMMANDS KNIFE(8)

KNIFE

knife, axe, cutter, chainsaw – tools to improve network performance via SNIP

SYNOPSIS

knife is used to control the network via Sysadmin Network Interrupt Protocol [SNIP].

DESCRIPTION

Experience has shown that suitable application of these tools on the network can lead to improved network performance, as busy segments of useless traffic can be isolated from the important stuff (and the rest of the world, for that matter). However, care must be taken, otherwise lusers will be complaining about “network downtime”.

knife vs lart(1m)

While knife can be used as a replacement for lart(1m), the reverse is not generally true; while blunt trauma works wonders on lusers, it tends to be ineffective on cables. Also, note that using knife or one of it’s associates as a lart(1m) will probably lead to higher level assault charges than one would get with a standard LART.

chainsaw, the power SNIP tool

chainsaw is a version of knife that makes quick work of almost any problem. It also has a correspondingly higher potential for causing unintentional damage. Handle with care.

FILES

In its normal application to cables, knife uses no files. If applied to a disk, many files may be affected; see mkfs(8).

SEE ALSO

lart(1m)

BUGS

You may be required to fix things eventually.

RESTRICTIONS

Bosses and the legal system may take a dim view of overenthusiastic application of these tools.

AUTHOR

While the origin of the first knife remains a mystery, this man page was written by Kurt Hockenbury <kurt@something.com>. He disclaims responsibility for any actions inspired by this man page.

HISTORY

SNIP was first described on alt.sysadmin.recovery by J.D. Falk <jdfalk@cais.cais.com> as a followup to a post by <martin@angela.ctrl-c.liu.se>.

Kommentar hinterlassen

Nutze dieses Kommentarfeld um deine Meinung oder Ergänzung zu diesem Beitrag kundzutun. Verhalte dich bitte respektvoll und höflich! Kommentare werden vor der Veröffentlichung in der Regel moderiert und bei Verstößen gegen geltendes Recht, die guten Sitten, fehlendem Bezug oder missbräuchlicher Verwendung nicht freigegeben oder gelöscht.
Über die Angabe deines Namens, deiner E-Mail Adresse und deiner Webseite freuen wir uns, doch diese Felder sind optional. Deine E-Mail Adresse wird dabei zu keinem Zeitpunkt veröffentlicht.

Um mit dem Betreiber dieser Seite nicht-öffentlich in Kontakt zu treten, nutze die Möglichkeiten im Impressum.