How to Install and Uninstall perl-Net-Daemon.noarch Package on Amazon Linux 2
Last updated: December 03,2024
1. Install "perl-Net-Daemon.noarch" package
This tutorial shows how to install perl-Net-Daemon.noarch on Amazon Linux 2
$
sudo yum makecache
Copied
$
sudo yum install
perl-Net-Daemon.noarch
Copied
2. Uninstall "perl-Net-Daemon.noarch" package
Please follow the guidelines below to uninstall perl-Net-Daemon.noarch on Amazon Linux 2:
$
sudo yum remove
perl-Net-Daemon.noarch
Copied
$
sudo yum autoremove
Copied
3. Information about the perl-Net-Daemon.noarch package on Amazon Linux 2
Loaded plugins: ovl, priorities
Available Packages
Name : perl-Net-Daemon
Arch : noarch
Version : 0.48
Release : 5.amzn2
Size : 51 k
Repo : amzn2-core/2/x86_64
Summary : Perl extension for portable daemons
URL : http://search.cpan.org/dist/Net-Daemon/
License : GPL+ or Artistic
Description : Net::Daemon is an abstract base class for implementing portable
: server applications in a very simple way. The module is designed
: for Perl 5.006 and ithreads (and higher), but can work with fork()
: and Perl 5.004.
:
: The Net::Daemon class offers methods for the most common tasks a
: daemon needs: Starting up, logging, accepting clients,
: authorization, restricting its own environment for security and
: doing the true work. You only have to override those methods that
: aren't appropriate for you, but typically inheriting will safe you
: a lot of work anyways.
Available Packages
Name : perl-Net-Daemon
Arch : noarch
Version : 0.48
Release : 5.amzn2
Size : 51 k
Repo : amzn2-core/2/x86_64
Summary : Perl extension for portable daemons
URL : http://search.cpan.org/dist/Net-Daemon/
License : GPL+ or Artistic
Description : Net::Daemon is an abstract base class for implementing portable
: server applications in a very simple way. The module is designed
: for Perl 5.006 and ithreads (and higher), but can work with fork()
: and Perl 5.004.
:
: The Net::Daemon class offers methods for the most common tasks a
: daemon needs: Starting up, logging, accepting clients,
: authorization, restricting its own environment for security and
: doing the true work. You only have to override those methods that
: aren't appropriate for you, but typically inheriting will safe you
: a lot of work anyways.