05-30-2007
I'm sorry to say that the suggestion from "encrypted" really doesn't work.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
How to recursively remove Ctrl M characters in files from a directory and its sub directory ?
I know unix2dos command is there but to remove in bunch of files ... ?
Thanks (7 Replies)
Discussion started by: skdp
7 Replies
2. Shell Programming and Scripting
Hello my friends,
I need to write a simple shell bad file :D that search and delete a file it's name 'Microsoft.txt' in the current directory and its subdirectories?
So can you help to guide me how i can write this shell, Just give me the beginning :o thank you. (1 Reply)
Discussion started by: Net-Man
1 Replies
3. Shell Programming and Scripting
Hello Friends,
I've been trying to write a script which finds a string and change it with another string. For this i want to search all files (with its arguments) under a spesific directory and its subdirectories.
For example lets assume i want to replace an IP= 192.168.0.4 with another... (4 Replies)
Discussion started by: EAGL
4 Replies
4. Shell Programming and Scripting
Hello dear Community,
I have a task to wrtie a script which will gzip not zipped files in a directory and itīs subdirectories. I succeeded in gzippung the directory but not the subdirectories:
#/bin/bash
#go to the directory where to zip
cd $1
#Zip unzipped files
for i in `ls | xargs... (2 Replies)
Discussion started by: JamesCarter
2 Replies
5. Shell Programming and Scripting
Hi,
I have to find files only in the current directory...not in the sub directories.
But when I use Find command ... it searches all the files in the current directory as well as in the subdirectories. I am using AIX-UNIX machine.Please help..I tried to use maxdepth..but it is not working in AIX. (2 Replies)
Discussion started by: vsachan
2 Replies
6. Shell Programming and Scripting
Dear all,
I have a dir structure like
main_dir
At_nn Ag_js Nf_hc ....
mcd32 mgd43... mcd32 mgd43... mcd32 mgd43...
and each subdir (e.g. mcd32, mgd43) contains files.
Now, i... (15 Replies)
Discussion started by: yogeshkumkar
15 Replies
7. Shell Programming and Scripting
Hi,
I am not too familiar with Unix scripting but I have to write code to find all the files under all the sub directories under a parent directory of unix location and move them to the corresponding Windows location.
For eg: I have \home\sreenu\Files\
Under neath this I have multiple sub... (3 Replies)
Discussion started by: raj.sreenu
3 Replies
8. Shell Programming and Scripting
I need to write a script to :
list files with *.i extension in a directory and all its subdirectories + 30days old, save it in a file and then remove (2 Replies)
Discussion started by: lena keung
2 Replies
9. UNIX for Dummies Questions & Answers
I Want to remove all the sub-directories except latest five in any given TGTDIR.
Is there a way to do so without making a cd to TGTDIR?
I have tried the following but not worked.
Thank you.
rm -rf `ls -t $TGTDIR | awk 'NR>5'` (20 Replies)
Discussion started by: Devendra Hupri
20 Replies
10. Shell Programming and Scripting
Hii,
Could someone help me to append string to the starting of all the filenames inside a directory but it should exclude .zip files and subdirectories.
Eg.
file1: test1.log
file2: test2.log
file3 test.zip
After running the script
file1: string_test1.log
file2: string_test2.log
file3:... (4 Replies)
Discussion started by: Ravi Kishore
4 Replies
crypt(1) General Commands Manual crypt(1)
Name
crypt - encode/decode (available only if the Encryption layered product is installed)
Syntax
crypt key < input.File > output.File
Description
This reference page describes software that is available only if the Encryption layered product is installed.
The command reads from the standard input and writes on the standard output. You must supply a key which selects a particular transforma-
tion. If no password is given, demands a key from the terminal and turns off printing while the key is being typed in. The command
encrypts and decrypts with the same key.
Files encrypted by are compatible with those treated by the ed, ex and vi editors in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve, direct search of the key space must
be infeasible, and sneak paths by which keys or clear text can become visible must be minimized.
The command implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack
on such machines are known, but not widely; moreover the amount of work required is likely to be large.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, for example, to take a sub-
stantial fraction of a second to compute. However, if keys are restricted to three lowercase letters, then encrypted files can be read by
expending only a substantial fraction of five minutes of machine time.
Since the key you choose is an argument to the command, it is potentially visible to users executing ps(1) or a derivative. To minimize
this possibility, destroys any record of the key immediately upon entry. The most vulnerable aspect of is the choice of keys and key secu-
rity.
Examples
The following examples use KEY as the key to encrypt and decrypt files. The first example encrypts the file naming the resulting encrypted
file The second example decrypts the file naming the resulting decrypted file The third example prints the encrypted file in clear text.
crypt KEY < plain.File > crypt.File
crypt KEY < crypt.File > decrypt.File
crypt KEY < crypt.File | pr
Files
for typed key
See Also
ed(1), ex(1), vi(1), xsend(1), crypt(3), makekey(8)
crypt(1)