Sponsored Content
Top Forums UNIX for Advanced & Expert Users du -k shows different size in two nodes Post 302137964 by porter on Friday 28th of September 2007 12:59:16 AM
Old 09-28-2007
Quote:
Originally Posted by KhawHL
Besides checking each file size, how can I confirm ftp of all files is correct since this is the fact?
The best way is to get an MD5 checksum generated at the server end, then you can compare it at the client end with the MD5 of whatever you downloaded (and after confirming the lengths are correct).

man md5

You'll see this technique used on the internet where, for example, CDs will have both an iso and a md5 checksum file.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

i-nodes

first off, i am new to unix so please bear with me. i was reading somewhere that if your i-nodes get critical that it can slow your network down. what are i-nodes and when do they become a critical number? this is what mine states: / (/dev/root ): 777058 blocks 569290 i-nodes... (4 Replies)
Discussion started by: djatwork
4 Replies

2. UNIX for Dummies Questions & Answers

nodes

how do you list all the nodes in unix :confused: (3 Replies)
Discussion started by: kamisi
3 Replies

3. UNIX for Advanced & Expert Users

Managing nodes???

Does anyone know something about this? I have no idea what it means and how to do it. but if anyone can give me and explanation and also point me to a website, i'd really appreciate it (5 Replies)
Discussion started by: TRUEST
5 Replies

4. Shell Programming and Scripting

Symbolic link to an empty file shows size 2

Hi, I have created an empty file and a symbolic link to a file. But when I issue the following commands, I am getting the output 2. stat -c "%s" linkfile du -hb linkfile Why this is happening? (4 Replies)
Discussion started by: royalibrahim
4 Replies

5. High Performance Computing

request more nodes

I am new to cluster commands. But I have tried utilizing: -pe, but I do not know my parallel computing environment. We are running SGE, is there a simpler command to request more nodes? also: qsub -N auto -M name@email.com -m abe auto.sh does not email me at all. Help would be appreciated (0 Replies)
Discussion started by: theawknewbie
0 Replies

6. High Performance Computing

showq shows less active nodes as normal

Hi, I am new in system administration. I observe that some nodes in our cluster are not considered as active by showq: 22 active jobs 217 of 257 processors in use by local jobs (84.44%) 15 of 17 nodes active (88.24%) but then I try to log into... (1 Reply)
Discussion started by: armando_2011
1 Replies

7. UNIX for Dummies Questions & Answers

scp shows size variation

Hi i have folder of 26 GB on server A and want to copy to server B .i used the below commands to check file size and scp copy du -h /folder : its shows 26G on server A from server B: scp -r user@serverA:/folder/* ./copying got initiated and i am checking the file size on server B... (7 Replies)
Discussion started by: rakeshkumar
7 Replies

8. UNIX for Dummies Questions & Answers

One service, two nodes, HA

Hi all. I have two nodes taken different places. They are connected together on a network. So, i have a service, it works on one of nodes and when the node is unavailable the service should will be launched on other node. Solution: rhel cluster, keepalive, hearbeat...may be Carp but what if... (2 Replies)
Discussion started by: Flomaster
2 Replies

9. Shell Programming and Scripting

Remove duplicate nodes

Hi all, I have a list of node pairs separated with a comma and also, associated with their respective values. For example: b0015,b1224 1.1 b0015,b2576 1.4 b0015,b3162 2.5 b0528,b1086 1.7 b0528,b1269 5.4 b0528,b3602 2.1 b0948,b2581 3.2 b1224,b0015 1.1... (8 Replies)
Discussion started by: AshwaniSharma09
8 Replies

10. UNIX for Beginners Questions & Answers

Proliferate commands across nodes?

Hi folks. I've been a developer for far too many years, but know very little of unix. I have setup a very inexpensive cluster of 6 raspberry pi nodes so I can play around with multi node programming. This is only for fun, but I want to learn properly, else what's the point?! Setup can be a... (4 Replies)
Discussion started by: MuntyScrunt
4 Replies
MD5(1)							    BSD General Commands Manual 						    MD5(1)

NAME
md5 -- calculate a message-digest fingerprint (checksum) for a file SYNOPSIS
md5 [-pqrtx] [-s string] [file ...] DESCRIPTION
The md5 utility takes as input a message of arbitrary length and produces as output a ``fingerprint'' or ``message digest'' of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5 algorithm is intended for digital signature applications, where a large file must be ``compressed'' in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA. MD5's designer Ron Rivest has stated "md5 and sha1 are both clearly broken (in terms of collision-resistance)". So MD5 should be avoided when creating new protocols, or implementing protocols with better options. SHA256 and SHA512 are better options as they have been more resilient to attacks (as of 2009). The following options may be used in any combination and must precede any files named on the command line. The hexadecimal checksum of each file listed on the command line is printed after the options are processed. -s string Print a checksum of the given string. -p Echo stdin to stdout and append the checksum to stdout. -q Quiet mode - only the checksum is printed out. Overrides the -r option. -r Reverses the format of the output. This helps with visual diffs. Does nothing when combined with the -ptx options. -t Run a built-in time trial. -x Run a built-in test script. EXIT STATUS
The md5 utility exits 0 on success, and 1 if at least one of the input files could not be read. SEE ALSO
cksum(1), md5(3), ripemd(3), sha(3), CC_SHA256_Init(3) Vlastimil Klima, Finding MD5 Collisions - a Toy For a Notebook, Cryptology ePrint Archive: Report 2005/075. ACKNOWLEDGMENTS
This program is placed in the public domain for free general use by RSA Data Security. BSD
June 6, 2004 BSD
All times are GMT -4. The time now is 01:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy