12-05-2007
Extracting specific info from finger command
my unix is bash based and the finger command output is:
Login Name Tty Idle LoginTime Office
amos.john Amos John pts/26 1 Dec 5 16:18 (77.100.22.07)
What am trying to achieve is extract the Login (amos.john) and Name (Amos John) from this output without using awk or sed.
Any pointers please, thanks.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Ok heres the situation,
We use Solaris 8 at work with Sybase for the db. I need to be able to easily create visual diagrams of some of our more complex systems. I've been using Visio which is such a manual process and takes a while.
I was thinking maybe using Visio somehow in conjunction... (0 Replies)
Discussion started by: fusion99
0 Replies
2. UNIX for Dummies Questions & Answers
i have a file that contain lines like this
9.4.7.8.5.7.9.0.5.7.1.2.msisdn.sub.cs. 1 IN CNAME SDP01.cs.
there are about 50,000 lines like this in the files i want to the extract the digits from the above line like:-
947857905712
OS Solaris9 (3 Replies)
Discussion started by: muneebr
3 Replies
3. Shell Programming and Scripting
Hi,
Command "chfn" can be used to change finger information.. can anybody tell me how to unset i mean reset the same finger information.
Thanks in advance,
Chanakya (3 Replies)
Discussion started by: Chanakya.m
3 Replies
4. UNIX for Dummies Questions & Answers
Hello all,
my unix is bash based and the finger command output is:
Login Name Tty Idle LoginTime Office
amos.john Amos John pts/26 1 Dec 5 16:18 (77.100.22.07)
What am trying to achieve is extract the Login (amos.john) and Name (Amos John) from this output without using awk or sed.
... (1 Reply)
Discussion started by: franny
1 Replies
5. Programming
Hi all,
I am stuck with a ruby script that extracts detials from yaml file and processes accordingly.
the yaml file
confivnic:
device:
vnic1:
policy:
- L2
mode: active
vnic2:
policy:
- L3
- L4
mode: active
type: aggr
... (1 Reply)
Discussion started by: wrapster
1 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I have 2 files
File 1:
1 2 3 4 5 6 .......etc until column 300K
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
.
.
etc until row 1411
File 2: (14 Replies)
Discussion started by: sogi
14 Replies
7. Shell Programming and Scripting
Hi all,
I have two .txt file i.e.
First text file:
2
4
1
4
Second text file
2 1.nii.gz
4 334.nii.gz
1 12.nii.gz
4 134.nii.gz
If entry in 1st column of 1st text file matches the 1st column of 2nd text file, then copy the file (name of which is the second column) associated with... (4 Replies)
Discussion started by: vd24
4 Replies
8. Solaris
Hello,
I am very new to solaris so please bear with me. I have 2 machines in question. For both I am trying to get the HBA Card Hardware information such as:
HBA Model Name
HBA Firmware version
HBA Port details
HBA Driver details
First machine is a Solaris 10. When I execute fcinfo... (6 Replies)
Discussion started by: flagman5
6 Replies
9. UNIX for Dummies Questions & Answers
how to extract user machine name for current terminal using finger command
below command gives machinename for all session , is it possible to filter it to only currernt terminal ?
finger -b -p $LOGNAME | grep from (12 Replies)
Discussion started by: lalitpct
12 Replies
10. Shell Programming and Scripting
i have a text file which i am generating from few sqls.
format is like :
col1 col2 col3 col4 col5
1001 DONE ABC 17-sep-14 12:02:05
1001 DONE ABC 17-sep-14 12:02:05
1001 DONE ABC 17-sep-14 12:02:55
1001 REDONE ABC ... (6 Replies)
Discussion started by: deepakiniimt
6 Replies
LEARN ABOUT DEBIAN
unshadow
UNSHADOW(8) System Manager's Manual UNSHADOW(8)
NAME
unshadow - combines passwd and shadow files
SYNOPSIS
unshadow password-file shadow-file
DESCRIPTION
This manual page documents briefly the unshadow command, which is part of the john package. This manual page was written for the Debian
GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find
weak passwords of users in a server.
The unshadow tool combines the passwd and shadow files so John can use them. You might need this since if you only used your shadow file,
the GECOS information wouldn't be used by the "single crack" mode, and also you wouldn't be able to use the '-shells' option. On a normal
system you'll need to run unshadow as root to be able to read the shadow file.
SEE ALSO
john(8), mailer(8), unafs(8), unique(8).
The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on
your system.
AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others).
John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED-
ITS file in the documentation directory.
john June 03, 2004 UNSHADOW(8)