Sponsored Content
Top Forums UNIX for Dummies Questions & Answers command to get count in unzipped folder Post 302141032 by arunkumar_mca on Wednesday 17th of October 2007 10:26:18 AM
Old 10-17-2007
Thanks thomas ..

But i want to list the files only which has read permision

Thanks,
Arun
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

zipped or unzipped file

Is there a way you can tell if a file is still zipped or it's unzipped I have a file called ssss.zip and I would like to know if this file is still zipped or if it's unzipped? I'm on IBM AIX/RS6000 (3 Replies)
Discussion started by: ted
3 Replies

2. UNIX for Dummies Questions & Answers

Zip command (zip folder doesn't include a folder of the same name)

Hi guys, I have a question about the zip command. Right now I have a directory with some files and folders on it that I want to compress. When I run the zip command: zip foo -r I am getting a foo.zip file that once I unzip it contains a foo folder. I want to create the foo.zip, but that... (1 Reply)
Discussion started by: elioncho
1 Replies

3. UNIX for Dummies Questions & Answers

See the date of file after its been zipped and unzipped?

I have some log files that have been gzipped and then compressed using cpio. There are a number of log files that have been compressed to the one file. When I extract them the date of the file when doing an ls -la is today's date (the date I extracted them). Is there anyway to see the date... (3 Replies)
Discussion started by: Sepia
3 Replies

4. Shell Programming and Scripting

Count matching filenames in a folder

Hi all, I have 4 files for example named abc01012009.txt abc02012009.txt abc03012009.txt abc04012009.txt in a folder. I would like to firstly backup the latest file available, in this case, the latest date available, abc04012009.txt to its subfolder named backup, and then rename the... (4 Replies)
Discussion started by: tententen
4 Replies

5. UNIX for Dummies Questions & Answers

How to obtain a count of files in a folder and it's subfolders

First of all, the extent of my unix knowledge is next to nil. I've been able to telnet to a unix box, and thanks to the Computer Hope website, I've been able to learn a few basic commands to navigate from folder to folder, and view contents. What I really need to do is obtain a count of all... (2 Replies)
Discussion started by: scarfinv
2 Replies

6. UNIX for Dummies Questions & Answers

Separate text files in a folder by word count

Hi, been searching Google for like an hour and I doubt I got the right keywords so might as well ask here. What I need: Before: Article1.txt 564 Article2.txt 799 Article3.txt 349 Article4.txt 452 * Separate files over 400 wordcount * After: Article1.txt 564... (3 Replies)
Discussion started by: Richard2000
3 Replies

7. Shell Programming and Scripting

Get the file count in a folder

What is the best way to get the file count (Including the subdirectories) under a folder? (12 Replies)
Discussion started by: un1xl0ver_rwx
12 Replies

8. Shell Programming and Scripting

Renaming unzipped files with name of archive

I am attempting to rename files within a zipped archive with the beginning of the name of the zip file. For example unzip AAA_000.zip and rename file1.csv, file2.txt to AAA_file1.csv, AAA_file2.txt. I am able to do this for a zip file with one file inside, but not for multiple files. This is... (2 Replies)
Discussion started by: lcp
2 Replies

9. UNIX for Dummies Questions & Answers

Adding unzipped files to a Zip

Hey all, I have a zip file which I received, and I need to replace one of the files inside of it. I tried the obvious solution of unzipping the zip, replacing the file, and rezipping, but the following happened: Original Zip Size: 79MB Unzipped Size 80MB New Zip: 36MB When I feed the... (2 Replies)
Discussion started by: DeanLeitersdorf
2 Replies

10. UNIX for Advanced & Expert Users

Searching for file types by count in specific folder in RHEL 6

So I'm trying to search for the top 10 or 15 items under a directory by file type. I want to run a command on a directory and get something like the following: Example of expected output.. .PDF: 100, .txt: 95, .word: 80.. What would be the best way of going about this? I've searched around... (2 Replies)
Discussion started by: shackle101
2 Replies
NETPLAN(8)						      System Manager's Manual							NETPLAN(8)

NAME
netplan - IP server for plan(1) appointment lists SYNOPSIS
netplan [-f] [-d] [-v] [-a] DESCRIPTION
netplan is an IP server that serves calendar data to plan(1) programs. It maintains the /var/lib/plan/netplan.dir directory, that contains calendar files and an access list file. plan users can name files and hosts in their file list dialog, which causes plan to establish a connection to netplan on the given host and request data from the file. netplan handles multiple connections to the same file, sequences updates to files such that no data can be lost if multiple simultaneous updates are requested, and notifies connected plan programs of changes so they can update their displays. OPTIONS -f Runs in the foreground. This is useful for debugging. -d Debug mode. This implies -f. All connections and transactions are logged to the terminal. Among other things, the program version and file locations are printed. -v Verbose. Together with -d, the verbosity of the log messages is increased to include data requests. this can generate large numbers of messages. -a Authentication via IDENTD (RFC 1413) is mandatory. If authentication fails, map the client to UID/GID NOBODY. Use this only if all connecting client hosts (running plan or pland ) support the identd authentication service (you can find out by running ``telnet clienthost 113''; if telnet reports ``Connected'' type Ctrl-D, clienthost support identd). If a client host that does not support identd connects to a netplan server run with -a, it will have no or restricted access. Also, if you use -a, you must have a netplan- acl file or no access is granted to anybody; see below. FILES
All files accessible to netplan are stored in the /var/lib/plan/netplan.dir directory. netplan will not access any files that are not in this directory or in subdirectories of this directory. It will also refuse to access softlinks and files with multiple hard links. This prevents users from linking normally inaccessible files to netplan.dir and accessing them through netplan . Finally, files beginning with a dot are rejected to prevent access to netplan-acl and other future configuration files. /etc/plan/ may also contain a file netplan-acl that controls which user can access which file. If the file is missing, no restrictions are imposed unless netplan is started with the -a option, in which case no access to any file is granted. The syntax for netplan-acl file is a sequence of rules like this: name | owner | * : [permit | deny] [read] [write] [delete] [netmask n.n.n.n] [[user | group | host] data [data...]] name is the file the rule applies to; an asterisk (*) applies to all files. The special name owner applies to the file by the name of cur- rent user, containing that user's ``own'' appointments. Permit is the default. If none of read, write, or delete are specified, all three are the default. The netmask applies to the client's IP address. The default netmask is 255.255.255.255. data is one or more user names or numerical UIDs, group names or numerical GIDs, or host names or numerical n.n.n.n IP addresses for user, group, and host clauses, respectively. In user clauses, values of the form user@host are also accepted. Symbolic names will be looked up on the server host (where netplan is running) and will be converted to numerical values while the ACL file is read. This assumes that all hosts agree on symbolic and numeric user, group, and host IDs; the plan/netplan protocol always uses numerical IDs and assumes that they correspond to the same symbolic names on both hosts. If no user, group, or host keyword and data list is specified, the meaning is ``any''. Trailing n=0 IP address components are not assumed to denote nets; use the netmask specifier for subnet masking. All whitespace is ignored. Pound signs (#) introduce comments that extend to the end of the line. For example, *: permit read *: permit write host daphne vacation: permit write user 207 thomas: deny user * thomas: permit read write delete user 207 208 announce: permit write netmask 255.255.255.0 host 10.0.1.0 first permits reading all files to everybody, and restricts write access to users on host daphne. The third line permits write access to the file vacation to user 207, in addition to the read access permitted in lines 1-2. Next, read and write access for file thomas is granted to users 207 and 208 only. Finally, the file announce can be written by all users on hosts whose network address begins with 10.0.1. Trailing ".0" parts need not be entered. The netmask basically specifies which bits of the client address are compared; all addresses are binary-ANDed with the netmask before comparison. When opening a file, the rules are scanned sequentially. All rules whose file part (before the colon) matches the opened file, set or clear permission flags for reading and writing, based on the identity of the plan client as given by his user ID, group IDs, and IP address. The final settings of these flags determine the permissions of the file for the client. The final permission setting is the AND result of the permissions derived for the host/netmask, and user/group part, respectively. netplan tries to verify the identity of the client user with the IDENTD (RFC 1413) protocol. If the identification succeeds, the client username is mapped to UID and GIDs per the local passwd and group files on the server host. If RFC 1413 identification is unsuccessful, netplan trusts the (numerical) identity provided by the client. If the -a option is given on the invocation of netplan, RFC 1413 identification becomes mandatory, and a failed identification will map the client to the NOBODY UID and GID. Note that although the ACL syntax was roughly patterned after TIS fwtk firewall configuration files, the code and interpretation is rather different. SECURITY
netplan trusts IP addresses to determine host (network) access restrictions. If IP addresses cannot be trusted, host access restrictions become meaningless. Without RFC 1413 authetication, netplan trusts whatever user id and group id the client provides. If netplan is used through the regular plan front-end application, the access list file specifications are honored, but any half-witted programmer can fake his identity using telnet or a hacked version of plan (the sources are, after all, freely available) to circumvent the access restrictions. If RFC 1413 authentication is mandatory (-a flag), netplan still trusts whatever the remote identd provides. If you cannot trust root on the remote host, you cannot trust the identd result. (And if you cannot trust IP addresses, you effectively cannot trust the remote root any more.) In this version of netplan, no challenge-response encryption is used to guarantee secure transactions. This may or may not change in future versions. In this version, access lists provide only a moderate protection. DEBIAN NOTE The location for /etc/plan/netplan-acl is specific to Debian GNU/Linux. For compliance with FSSTND/FHS, it has been moved there from its traditional /var/lib/plan/netplan.dir/.netplan-acl location. The program still accesses that file via a symlink located at the traditional location. SEE ALSO plan(1). AUTHOR Thomas Driemeyer <thomas@bitrot.de> Please send all complaints, comments, bug fixes, and porting experiences to me. Always include your plan version as reported by "plan -v" in your mail. To be added to the mailing list, send mail to majordomo@bitrot.de with the line "subscribe plan" (without the quotes) in the message body (not the subject). See http://www.bitrot.de/plan.html for new releases. NETPLAN(8)
All times are GMT -4. The time now is 10:34 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy