2010-04-29 183 words 1 min read

$ eject -i 1 This command will lock the hardware eject button of your cdrom drive. Some uses are:

1: If you have a toddler and has discovered the cdrom button

2: If you are carrying a laptop in a bag or case and don’t want it to eject if the button is inadvertently pressed.

To unlock the button use:

eject -i 0

  • <a href="http://www.commandlinefu.com/commands/view/5390/lock-the-hardware-eject-button-of-the-cdrom">View this command to comment, vote or add to favourites
  • <a href="http://feeds2.feedburner.com/commands/by/mdelatorre">View all commands by <a href="http://feeds2.feedburner.com/commands/by/mdelatorre">mdelatorre

<a href="http://www.commandlinefu.com"><img src="http://blog.amit-agarwal.co.in/wp-content/uploads/2010/08/header-logo.jpg" alt="" align="bottom" />

by David Winterbottom (<a href="http://codeinthehole.com">codeinthehole.com)

<a href="http://feedads.g.doubleclick.net/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/0/da"><img src="http://blog.amit-agarwal.com/wp-content/uploads/img.zemanta.com/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/0/di" alt="" align="bottom" />
<a href="http://feedads.g.doubleclick.net/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/1/da"><img src="http://blog.amit-agarwal.com/wp-content/uploads/img.zemanta.com/~a/kZZStgmMxDxxz2BtP2Xoxof_B0M/1/di" alt="" align="bottom" />

<img src="http://blog.amit-agarwal.com/wp-content/uploads/img.zemanta.com/~r/Command-line-fu/~4/_ZEuVoJP8nE" alt="" width="1" height="1" align="bottom" />

URL: <a href="http://feedproxy.google.com/~r/Command-line-fu/~3/_ZEuVoJP8nE/lock-the-hardware-eject-button-of-the-cdrom">http://feedproxy.google.com/~r/Command-line-fu/~3/_ZEuVoJP8nE/lock-the-hardware-eject-button-of-the-cdrom<h6 class="zemanta-related-title">Related articles by Zemanta <ul class="zemanta-article-ul"> <li class="zemanta-article-ul-li"><a href="http://www.seroundtable.com/archives/022083.html">Google Says Trailing Slash & Non-Trailing Slash Are Different Pages (seroundtable.com) <li class="zemanta-article-ul-li"><a href="http://domainmacher.com/shadyemail-mask-your-email-to-make-it-look-suspicious/">ShadyEmail: Mask Your Email to Make it Look Suspicious (domainmacher.com) <li class="zemanta-article-ul-li"><a href="http://emilychang.com/ehub/app/like-it-tweet-it/">Like it? Tweet it! (emilychang.com) <li class="zemanta-article-ul-li"><a href="http://new.exchristian.net/2010/04/your-de-conversion-story-in-30-seconds.html">Your De-conversion story in 30 seconds (new.exchristian.net) <div class="zemanta-pixie"><a class="zemanta-pixie-a" title="Reblog this post [with Zemanta]" href="http://reblog.zemanta.com/zemified/53800787-9fb1-4f10-b42b-7277ef726c45/"><img class="zemanta-pixie-img" src="http://blog.amit-agarwal.co.in/wp-content/uploads/2010/08/reblog_b77.png" alt="Reblog this post [with Zemanta]" /><span class="zem-script more-related more-info pretty-attribution paragraph-reblog">


author

Authored By Amit Agarwal

Amit Agarwal, Linux and Photography are my hobbies.Creative Commons Attribution 4.0 International License.

We notice you're using an adblocker. If you like our webite please keep us running by whitelisting this site in your ad blocker. We’re serving quality, related ads only. Thank you!

I've whitelisted your website.

Not now
This website uses cookies to ensure you get the best experience on our website. Learn more Got it