02-27-2007
You seem to reject my technique without commenting on it. If your script is working I guess it's good enough. But you are depending on the rexec protocol being enabled and often it is not available. You also use one ftp process per file. If you switch to a ksh coprocess, a single ftp process is enough for the entire job.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hello! is there a way for me to use the chmod command to change permissions for several files all at once -based on the fact that these files were all most recently modified TODAY ?
I can't use a wildcard on their filenames because the filenames are varied. But I was hoping I could somehow do... (2 Replies)
Discussion started by: polka_friend
2 Replies
2. UNIX for Dummies Questions & Answers
Made changes to a file using vi editor and saved those changes
now realised that the changes are not required
How can I get the previous version of the file.i.e the one which was there on which I had made changes (3 Replies)
Discussion started by: novice100
3 Replies
3. Shell Programming and Scripting
hi gurus,
i would like to know how can i find logs files which were recently modified or updated? :confused:
using this command?
find . -name "*.log" -mtime ??
so what should i put for mtime?
thanks.
wee (9 Replies)
Discussion started by: lweegp
9 Replies
4. UNIX for Dummies Questions & Answers
How do I do it? Simple answers preferred... using BASH.. the less code the better.
I want to find out where Indesign is caching PDF tmp data ... I figure this is a good way to do it.. either way i wanna know how to do it. (2 Replies)
Discussion started by: glev2005
2 Replies
5. Shell Programming and Scripting
Good evening everybody,
I have to find the user owner of the most recently file in the system
How can I do? :confused: (5 Replies)
Discussion started by: Guccio
5 Replies
6. Shell Programming and Scripting
Hi all,
i need to write a shell script to transfer a file modified after a particular date from one server to another. I searched for the related posts in this forum and got hints and snippets for it. i tried the below code
ftp serverA
user uname pwd
lcd to_dir
cd from_dir
files=$(find... (7 Replies)
Discussion started by: mick_000
7 Replies
7. UNIX for Advanced & Expert Users
I have three files a.txt , b.txt , c.txt in a directory called my_dir1 .These files were created before two or three months . I have a tar file called my_tar1.tar which contains three files a.txt , b.txt , d.txt . Somebody untarred the my_tar1.tar into my_dir1 directory. So existing two files were... (1 Reply)
Discussion started by: joe.mani
1 Replies
8. Shell Programming and Scripting
Hi,
I am looking for a command to search for a specific file which was recently modified in the current directory leaving some unwanted files to be listed.
For example, when I try ls - lrt
it shows the following output.
I want to ommit the files with the name 'resend' and... (3 Replies)
Discussion started by: svajhala
3 Replies
9. Shell Programming and Scripting
Hello,
I am fairly new to shell scripting. I see a lot of examples out there of how to find if a file has been modified within a certain period of time. What I'm looking for help with is a script that will run and I'm thinking check for the last 24 hours but if not just check at runtime to see... (6 Replies)
Discussion started by: PyroPlasm
6 Replies
10. UNIX for Dummies Questions & Answers
Hi all, I am a bit of a beginner with shell scripting..
What I want to do is merge two drives, for example moving all data from X to Y.
If a file in X doesn't exist in Y, it will be moved there.
If a file in X also exists in Y, the most recently modified file will be moved to (or kept) in... (5 Replies)
Discussion started by: apocolapse
5 Replies
netrc(4) Kernel Interfaces Manual netrc(4)
NAME
netrc: .netrc - login information for ftp, rexec, and rexec()
DESCRIPTION
The file contains login and initialization information used by the autologin process, by the library routine, and by the command (see
ftp(1), rexec(3N), and remsh(1)), respectively. This file is optional. It exists, if at all, in the user's home directory.
If the file contains password or account information for use other than for anonymous its owner must match the effective user ID of the
current process. Its read, write, and execute mode bits for group and other must all be zero, and it must be readable by its owner. Oth-
erwise, the file is ignored.
The file can contain the following tokens, separated by whitespace (spaces, tabs, or newlines) or commas To include a comma as part of a
token, enclose that token in quotation marks ().
Identify a remote machine name.
The autologin process searches the file for a token that matches the remote machine specified on the command line, as
an command argument, or as the parameter of Once a match is made, the subsequent tokens are processed, stopping when
the end-of-file is reached or another token or a token is encountered.
If the remote machine name has an alias host name, and both the official host name and the alias are present in the
file, the client gives precedence to the official host name over the alias when searching the file. If an alias is
given as an entry to the command, and in the search from the top of the file to the bottom, the client finds the alias
host name before it finds the official host name, it will use the alias's entry. However, if it finds the official
host name first, it will use the official entry even though the alias host name also exists in the file. So the high
precedence given to the official host name requires placing the official host name entry last in the file for when
aliases exist.
Same as except that matches any name. There can be only one token, and it must be after all tokens. This is normally used for
as follows:
This provides automatic anonymous login to machines not specified in This can be overridden in by using the flag to
disable autologin.
Identify a user on the remote machine.
If this token is present, the or autologin process initiates a login using the specified name. If this token matches
the user name used by the command option, or, by default, the local user name, uses the token, if present.
Supply a password. If this token is present, the autologin process supplies the specified string, if the remote server requires a password
as part of the login process. Note that if this token is present in the file for any user other than aborts the
autologin process if the is readable by anyone other than the owner. Also note that the passwords in are not
encrypted.
Supply an additional account password for
login. If this token is present, the autologin process supplies the specified string if the remote server requires an
additional account password, or the autologin process initiates an command if it does not.
Define an macro. This token is just like the command. A macro is defined with the specified name; its contents begin with the
next line and continue until an empty line (consecutive newline characters) is encountered. If a macro named is
defined, it is automatically executed as the last step in the autologin process.
EXAMPLES
The following is a valid entry for the host whose account has the password
WARNINGS
It is a security risk to have unencrypted passwords in a file.
AUTHOR
was developed by the University of California, Berkeley.
FILES
SEE ALSO
ftp(1), remsh(1), rexec(3N).
netrc(4)