01-29-2007
Please read the rules. Duplicate threads are not permitted.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi Again Guys ,
Please i installed linux RH 6.1 on Toshiba , 10G , RAM=128 , 600 MHZ .
After i installed linux i got many error messages , seems it was not installed correctly , also when i finished installation it did not ask me for the 2nd installation CD , and when i logged as root , i... (5 Replies)
Discussion started by: tamemi
5 Replies
2. Shell Programming and Scripting
Hi,
I have a html file which is unformatted and need to concatenate the lines between each "table" statement in order to run an awk statement on it. Here is the example of the raw file:
<table border="0" cellspacing="0" cellpadding="0" class="playerDetails">
def
... (3 Replies)
Discussion started by: Tonka52
3 Replies
3. Shell Programming and Scripting
I have a file with the below lines
1521
1522
1523
1524
1525
1526
...
174 lines all numbers like above. I want the above file to appear as below.
1521,1522,1523,1524.....
All the numbers should be separated by comma.
Pls tell me how to do this ....
Thanks in advance. (8 Replies)
Discussion started by: dreams5617
8 Replies
4. UNIX for Dummies Questions & Answers
What is the command to count lines in a files, but ignore blank lines and commented lines?
I have a file with 4 sections in it, and I want each section to be counted, not including the blank lines and comments... and then totalled at the end.
Here is an example of what I would like my... (6 Replies)
Discussion started by: kthatch
6 Replies
5. Shell Programming and Scripting
i have some 100 of lines from a script o/p into a file called naveed.txt
below some of the lines:
1-GH32X, CC, AMR, Number of Intervals Not Inserted: 1 / 95
1-150KP1, CC, AMR, Number of Intervals Not Inserted: 1 / 96
1-VWEMR, CC, AMR, Number of Intervals Not Inserted: 1 / 98
1-15HM1A, CC,... (5 Replies)
Discussion started by: ali560045
5 Replies
6. UNIX for Dummies Questions & Answers
I want to take the below data, and have it output to file only the STMC#/(IP address) and the "there are X number of updates to install" lines for each machine. I know it's easy, but Im a beginner in BASH stuff, my solution would probably take way too many lines to do something easy.Thanks!
... (5 Replies)
Discussion started by: glev2005
5 Replies
7. Shell Programming and Scripting
I need to format a txt file and convert it in CSV.
Any "future" column is separated by a newline.
FROM:
XS1
1.43294
0.0
XS2
1.21824
0.0
TO:
XS1,XS2 (2 Replies)
Discussion started by: alfreale
2 Replies
8. UNIX for Advanced & Expert Users
I have large file with data as below, in unix using sed or some cammand how to get output as below.
cat 1.txt
Normal data
1|AA|NN
4|BB|NNN
C|DDD|N
//Additional details
9C|12C|8N
Specific Details
12N|JIN|KK\NY1\
345\ABC1\KKK
90|ENO0|NDO
17|NO921|NCOKL
output shoud be as below
... (10 Replies)
Discussion started by: Tecnical_help12
10 Replies
9. UNIX for Dummies Questions & Answers
Hi Everybody! First post! Totally noobie.
I'm using the terminal to read a poorly formatted book.
The text file contains, in the middle of paragraphs, hyphenation to split words that are supposed to be on multiple pages. It looks ve -- ry much like this.
I was hoping to use grep -v " -- "... (5 Replies)
Discussion started by: AxeHandle
5 Replies
LEARN ABOUT CENTOS
gss_auth_rules
gss_auth_rules(5) Standards, Environments, and Macros gss_auth_rules(5)
NAME
gss_auth_rules - overview of GSS authorization
DESCRIPTION
The establishment of the veracity of a user's credentials requires both authentication (Is this an authentic user?) and authorization (Is
this authentic user, in fact, authorized?).
When a user makes use of Generic Security Services (GSS) versions of the ftp or ssh clients to connect to a server, the user is not neces-
sarily authorized, even if his claimed GSS identity is authenticated, Authentication merely establishes that the user is who he says he is
to the GSS mechanism's authentication system. Authorization is then required: it determines whether the GSS identity is permitted to access
the specified Solaris user account.
The GSS authorization rules are as follows:
o If the mechanism of the connection has a set of authorization rules, then use those rules. For example, if the mechanism is Kerberos,
then use the krb5_auth_rules(5), so that authorization is consistent between raw Kerberos applications and GSS/Kerberos applications.
o If the mechanism of the connection does not have a set of authorization rules, then authorization is successful if the remote user's
gssname matches the local user's gssname exactly, as compared by gss_compare_name(3GSS).
FILES
/etc/passwd
System account file. This information may also be in a directory service. See passwd(4).
ATTRIBUTES
See attributes(5) for a description of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
ftp(1), ssh(1), gsscred(1M), gss_compare_name(3GSS), passwd(4), attributes(5), krb5_auth_rules(5)
SunOS 5.10 13 Apr 2004 gss_auth_rules(5)