Sponsored Content
Top Forums Shell Programming and Scripting Need for loop to do 2 activities Post 302085009 by jim mcnamara on Monday 14th of August 2006 12:45:56 PM
Old 08-14-2006
Code:
for file in $targetfilepattern ; do
mv "$file" $targetarchive
compress $targetarchive/"$file"
done

 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Keeping an eye on all user activities

I am responsible for administering 6 Tru64UX servers. I need to keep an eye on all the commands executed by all the users. Is there a way where I can save the commands executed in a seperate folder and then keep checking the list every now and then. How can do it ? (5 Replies)
Discussion started by: shauche
5 Replies

2. UNIX for Advanced & Expert Users

Tracking activities of Users using a particular login.

Hi!! Experts, I have a typical scenario here in which several users have access to a particular login .. say "build". None of the users know the passwd for this login. The name of some of the user have been to .rhosts file. The users can connect only by doing a rlogin to this id and then... (4 Replies)
Discussion started by: jyotipg
4 Replies

3. Shell Programming and Scripting

patterns from logs and activities

hi, i need help writing shell scripts to define patterns of user activities on our apache. i thought about going through logfiles and other places where user activities are stored and use that data to define patterns of action. i want these patterns to be visualized then. now my... (3 Replies)
Discussion started by: rocketkids
3 Replies

4. Solaris

restricting users privileges and logging their activities

Hello, I'm administrating new installed cluster that runs Legato Networker and Oracle 9. And I want to restrict the use of root to my self and givr the application and DBA the proper and needed privileges to do their duties without hassle in addition I would like to log users activities. my... (0 Replies)
Discussion started by: sh_ksa
0 Replies

5. Shell Programming and Scripting

Script to log into unix box and do a set of activities

Hi all, I want to automate a set of activities i am doing daily.the activities in the order are: 1.loging in to the unix box. 2.sudo su - tsiap, give pwd 3. cd appsrv 4. cd log 5. run the below cmd one by one, if you find any query which has run for more than 5 secs, open the... (1 Reply)
Discussion started by: cybersandex
1 Replies

6. Solaris

May i know the day to day activities of a Solaris system administrator?

Recently i have attended a telephonic interview. As i dont have work experience in solaris i was not able to deliver correct answer for this question. Your answer will help for the people like me who is looking to become Solaris System administrator. (4 Replies)
Discussion started by: Sesha
4 Replies

7. Shell Programming and Scripting

shell script for monitoring users activities

hi I need a shell script which runs perpetually in background and monitors different aspects of different users on different files and their usages for example say there r 3 users so i want when they log in i.e. their log in time and their file access, modify and change log of each file of a... (3 Replies)
Discussion started by: rrd1986
3 Replies

8. Solaris

SYSLOGS - Where can I find FTP activities

Greetings to all. I need help from the experts. I have been given a FTP server script that runs all day, looking for files that are FTP'd to our machines. Its hoaky I know, but there are times that files are sent but somehow get lost. Is there a logfile I can view to see when files are received? ... (1 Reply)
Discussion started by: Harleyrci
1 Replies

9. SuSE

How do I make activities appear in SYSLOG file?

SUSE Linux 11 and 10 SP3. I am trying to capture some of my activities in SYSLOG file, /var/log/messages. To do this I created and dropped some test files and directories and users. But these activities are not captured in /var/log/messages. What should I do to make these activities... (7 Replies)
Discussion started by: JDBA
7 Replies

10. Programming

DB2 z/os How to Track table delete Activities

Dear Team I am using DB2 v10 z/os database . Need expert guidance to figure out best way to track table activities ( Ex Delete, Insert,Update ) Scenario We have a table which is critical and many developer/testing team access on daily basis . We had instance where some deleted entire table .... (1 Reply)
Discussion started by: Perlbaby
1 Replies
compress(1)						      General Commands Manual						       compress(1)

Name
       compress, uncompress, zcat - compress and expand data

Syntax
       compress [ -f ] [ -v ] [ -c ] [ -b bits ] [ name ...  ]
       uncompress [ -f ] [ -v ] [ -c ] [ name ...  ]
       zcat [ name ...	]

Description
       The  command reduces the size of the named files using adaptive Lempel-Ziv coding.  Whenever possible, each file is replaced by one
       with the extension .Z, while keeping the same ownership modes, access, and modification times.  If  no  files  are  specified,  the
       standard input is compressed to the standard output.  Compressed files can be restored to their original form using or

       The  -f	option	will  force  compression  of  name, even if it does not actually shrink name, or if the corresponding name .Z file
       already exists.	If the -f option is omitted, the user is asked whether an existing name.Z file should be  overwritten  (unless	is
       run in the background under

       The -c (cat) option makes compress/uncompress write to the standard output without changing any files.  Neither -c nor alter files.

       The  command  uses  the modified Lempel-Ziv algorithm.  Common substrings in the file are first replaced by 9-bit codes 257 and up.
       When code 512 is reached, the algorithm switches to 10-bit codes and continues to use more bits until the limit specified by the -b
       flag is reached (default 16).  The bits must be between 9 and 16.  The default can be changed in the source to allow to be run on a
       smaller machine.

       After the bits limit is attained, periodically checks the compression ratio.  If the ratio is  increasing,  continues  to  use  the
       existing  code  dictionary.   However,  if  the	compression ratio decreases, discards the table of substrings and rebuilds it from
       scratch.  This allows the algorithm to adapt to the next block of the file.

       Note that the -b flag is omitted for since the bits parameter specified during compression is encoded within the output along  with
       a number that ensures that neither decompression of random data nor recompression of compressed data is attempted.

       How much each file is compressed depends on the size of the input, the number of bits per code, and the distribution of common sub-
       strings.  Typically, text such as source code or English is reduced by 50-60%.  Compression is  generally  much	better	than  that
       achieved by Huffman coding or adaptive Huffman coding, and takes less time to compute.

       The -v option displays the percent reduction of each file.

       If  an  error  occurs,  exit  status is 1.  However, if the last file was not compressed because it became larger, the status is 2.
       Otherwise, the status is 0.

Options
       -f   Forces compression of name.

       -c   Makes compress/uncompress write to the standard output.

       -b   Specifies the allowable bits limit.  The default is 16.

       -v   Displays the percent reduction of each file.

Diagnostics
       Usage: compress [-fvc] [-b maxbits] [file ...]
       Invalid options were specified on the command line.

       Missing maxbits
       Maxbits must follow -b.

       file: not in compressed format
       The file specified to uncompress has not been compressed.

       file: compressed with xx bits, can only handle yy bits
       The file was compressed by a program that could deal with more bits than the compress code on this machine.   Recompress  the  file
       with smaller bits.

       file: already has .Z suffix -- no change
       The file is assumed to be compressed already.  Rename the file and try again.

       file already exists; do you wish to overwrite (y or n)?
       Type y if you want the output file to be replaced; type n if you do not.

       uncompress: corrupt input
       A SIGSEGV violation was detected which usually means that the input file is corrupted.

       Compression: xx.xx%
       Percent of the input saved by compression.  (For the -v option only.)

       -- not a regular file: unchanged
       If the input file is not a regular file (for example, a directory), it remains unchanged.

       -- has xx other links: unchanged
       The input file has links; it is left unchanged.	See for more information.

       -- file unchanged
       No savings is achieved by compression.  The input remains unchanged.

Restrictions
       Although compressed files are compatible between machines with large memory, -b12 should be used for file transfer to architectures
       with a small process data space (64KB or less).

								       RISC							       compress(1)
All times are GMT -4. The time now is 07:50 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy