Lock the hardware eject button of the cdrom
$ eject -i 1 This command will lock the hardware eject button of your cdrom drive. Some uses are:
1: If you have a toddler and has discovered the cdrom button
2: If you are carrying a laptop in a bag or case and don’t want it to eject if the button is inadvertently pressed.
To unlock the button use:
eject -i 0
- <a href="http://www.commandlinefu.com/commands/view/5390/lock-the-hardware-eject-button-of-the-cdrom">View this command to comment, vote or add to favourites
- <a href="http://feeds2.feedburner.com/commands/by/mdelatorre">View all commands by <a href="http://feeds2.feedburner.com/commands/by/mdelatorre">mdelatorre
<a href="http://www.commandlinefu.com"><img src="http://blog.amit-agarwal.co.in/wp-content/uploads/2010/08/header-logo.jpg" alt="" align="bottom" />
by David Winterbottom (<a href="http://codeinthehole.com">codeinthehole.com)
<a href="http://feedads.g.doubleclick.net/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/0/da"><img src="http://blog.amit-agarwal.com/wp-content/uploads/img.zemanta.com/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/0/di" alt="" align="bottom" />
<a href="http://feedads.g.doubleclick.net/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/1/da"><img src="http://blog.amit-agarwal.com/wp-content/uploads/img.zemanta.com/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/1/di" alt="" align="bottom" />
<img src="http://blog.amit-agarwal.com/wp-content/uploads/img.zemanta.com/~r/Command-line-fu/~4/_ZEuVoJP8nE" alt="" width="1" height="1" align="bottom" />
URL: <a href="http://feedproxy.google.com/~r/Command-line-fu/~3/_ZEuVoJP8nE/lock-the-hardware-eject-button-of-the-cdrom">http://feedproxy.google.com/~r/Command-line-fu/~3/_ZEuVoJP8nE/lock-the-hardware-eject-button-of-the-cdrom<h6 class="zemanta-related-title">Related articles by Zemanta <ul class="zemanta-article-ul"> <li class="zemanta-article-ul-li"><a href="http://www.seroundtable.com/archives/022083.html">Google Says Trailing Slash & Non-Trailing Slash Are Different Pages (seroundtable.com) <li class="zemanta-article-ul-li"><a href="http://domainmacher.com/shadyemail-mask-your-email-to-make-it-look-suspicious/">ShadyEmail: Mask Your Email to Make it Look Suspicious (domainmacher.com) <li class="zemanta-article-ul-li"><a href="http://emilychang.com/ehub/app/like-it-tweet-it/">Like it? Tweet it! (emilychang.com) <li class="zemanta-article-ul-li"><a href="http://new.exchristian.net/2010/04/your-de-conversion-story-in-30-seconds.html">Your De-conversion story in 30 seconds (new.exchristian.net) <div class="zemanta-pixie"><a class="zemanta-pixie-a" title="Reblog this post [with Zemanta]" href="http://reblog.zemanta.com/zemified/53800787-9fb1-4f10-b42b-7277ef726c45/"><img class="zemanta-pixie-img" src="http://blog.amit-agarwal.co.in/wp-content/uploads/2010/08/reblog_b77.png" alt="Reblog this post [with Zemanta]" /><span class="zem-script more-related more-info pretty-attribution paragraph-reblog">
Related Articles:
- 2010/04/21 Convert decimal numbers to binary
- 2009/12/19 Opens Four Google Frames At Once
- 2009/11/10 5 Good Image Search Engines Apart From Google Image Search
- 2009/10/25 raj77in on Google – I am the only one on the first page.
- 2010/03/10 Xoost – Search engine