09-28-2007
Quote:
Originally Posted by
KhawHL
Besides checking each file size, how can I confirm ftp of all files is correct since this is the fact?
The best way is to get an MD5 checksum generated at the server end, then you can compare it at the client end with the MD5 of whatever you downloaded (and after confirming the lengths are correct).
man md5
You'll see this technique used on the internet where, for example, CDs will have both an iso and a md5 checksum file.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
first off, i am new to unix so please bear with me. i was reading somewhere that if your i-nodes get critical that it can slow your network down. what are i-nodes and when do they become a critical number? this is what mine states:
/ (/dev/root ): 777058 blocks 569290 i-nodes... (4 Replies)
Discussion started by: djatwork
4 Replies
2. UNIX for Dummies Questions & Answers
how do you list all the nodes in unix
:confused: (3 Replies)
Discussion started by: kamisi
3 Replies
3. UNIX for Advanced & Expert Users
Does anyone know something about this? I have no idea what it means and how to do it. but if anyone can give me and explanation and also point me to a website, i'd really appreciate it (5 Replies)
Discussion started by: TRUEST
5 Replies
4. Shell Programming and Scripting
Hi,
I have created an empty file and a symbolic link to a file. But when I issue the following commands, I am getting the output 2.
stat -c "%s" linkfile
du -hb linkfile
Why this is happening? (4 Replies)
Discussion started by: royalibrahim
4 Replies
5. High Performance Computing
I am new to cluster commands. But I have tried utilizing: -pe, but I do not know my parallel computing environment. We are running SGE, is there a simpler command to request more nodes?
also: qsub -N auto -M name@email.com -m abe auto.sh
does not email me at all.
Help would be appreciated (0 Replies)
Discussion started by: theawknewbie
0 Replies
6. High Performance Computing
Hi,
I am new in system administration. I observe that some nodes in our cluster
are not considered as active by showq:
22 active jobs 217 of 257 processors in use by local jobs (84.44%)
15 of 17 nodes active (88.24%)
but then I try to log into... (1 Reply)
Discussion started by: armando_2011
1 Replies
7. UNIX for Dummies Questions & Answers
Hi
i have folder of 26 GB on server A and want to copy to server B .i used the below commands to check file size and scp copy
du -h /folder : its shows 26G on server A
from server B:
scp -r user@serverA:/folder/* ./copying got initiated and i am checking the file size on server B... (7 Replies)
Discussion started by: rakeshkumar
7 Replies
8. UNIX for Dummies Questions & Answers
Hi all. I have two nodes taken different places. They are connected together on a network. So, i have a service, it works on one of nodes and when the node is unavailable the service should will be launched on other node.
Solution: rhel cluster, keepalive, hearbeat...may be Carp
but what if... (2 Replies)
Discussion started by: Flomaster
2 Replies
9. Shell Programming and Scripting
Hi all,
I have a list of node pairs separated with a comma and also, associated with their respective values. For example:
b0015,b1224 1.1
b0015,b2576 1.4
b0015,b3162 2.5
b0528,b1086 1.7
b0528,b1269 5.4
b0528,b3602 2.1
b0948,b2581 3.2
b1224,b0015 1.1... (8 Replies)
Discussion started by: AshwaniSharma09
8 Replies
10. UNIX for Beginners Questions & Answers
Hi folks.
I've been a developer for far too many years, but know very little of unix. I have setup a very inexpensive cluster of 6 raspberry pi nodes so I can play around with multi node programming. This is only for fun, but I want to learn properly, else what's the point?!
Setup can be a... (4 Replies)
Discussion started by: MuntyScrunt
4 Replies
MD5(1) BSD General Commands Manual MD5(1)
NAME
md5 -- calculate a message-digest fingerprint (checksum) for a file
SYNOPSIS
md5 [-pqrtx] [-s string] [file ...]
DESCRIPTION
The md5 utility takes as input a message of arbitrary length and produces as output a ``fingerprint'' or ``message digest'' of the input. It
is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having
a given prespecified target message digest. The MD5 algorithm is intended for digital signature applications, where a large file must be
``compressed'' in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA.
MD5's designer Ron Rivest has stated "md5 and sha1 are both clearly broken (in terms of collision-resistance)". So MD5 should be avoided
when creating new protocols, or implementing protocols with better options. SHA256 and SHA512 are better options as they have been more
resilient to attacks (as of 2009).
The following options may be used in any combination and must precede any files named on the command line. The hexadecimal checksum of each
file listed on the command line is printed after the options are processed.
-s string
Print a checksum of the given string.
-p Echo stdin to stdout and append the checksum to stdout.
-q Quiet mode - only the checksum is printed out. Overrides the -r option.
-r Reverses the format of the output. This helps with visual diffs. Does nothing when combined with the -ptx options.
-t Run a built-in time trial.
-x Run a built-in test script.
EXIT STATUS
The md5 utility exits 0 on success, and 1 if at least one of the input files could not be read.
SEE ALSO
cksum(1), md5(3), ripemd(3), sha(3), CC_SHA256_Init(3)
Vlastimil Klima, Finding MD5 Collisions - a Toy For a Notebook, Cryptology ePrint Archive: Report 2005/075.
ACKNOWLEDGMENTS
This program is placed in the public domain for free general use by RSA Data Security.
BSD
June 6, 2004 BSD