12-05-2007
Extracting specific info from finger command
my unix is bash based and the finger command output is:
Login Name Tty Idle LoginTime Office
amos.john Amos John pts/26 1 Dec 5 16:18 (77.100.22.07)
What am trying to achieve is extract the Login (amos.john) and Name (Amos John) from this output without using awk or sed.
Any pointers please, thanks.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Ok heres the situation,
We use Solaris 8 at work with Sybase for the db. I need to be able to easily create visual diagrams of some of our more complex systems. I've been using Visio which is such a manual process and takes a while.
I was thinking maybe using Visio somehow in conjunction... (0 Replies)
Discussion started by: fusion99
0 Replies
2. UNIX for Dummies Questions & Answers
i have a file that contain lines like this
9.4.7.8.5.7.9.0.5.7.1.2.msisdn.sub.cs. 1 IN CNAME SDP01.cs.
there are about 50,000 lines like this in the files i want to the extract the digits from the above line like:-
947857905712
OS Solaris9 (3 Replies)
Discussion started by: muneebr
3 Replies
3. Shell Programming and Scripting
Hi,
Command "chfn" can be used to change finger information.. can anybody tell me how to unset i mean reset the same finger information.
Thanks in advance,
Chanakya (3 Replies)
Discussion started by: Chanakya.m
3 Replies
4. UNIX for Dummies Questions & Answers
Hello all,
my unix is bash based and the finger command output is:
Login Name Tty Idle LoginTime Office
amos.john Amos John pts/26 1 Dec 5 16:18 (77.100.22.07)
What am trying to achieve is extract the Login (amos.john) and Name (Amos John) from this output without using awk or sed.
... (1 Reply)
Discussion started by: franny
1 Replies
5. Programming
Hi all,
I am stuck with a ruby script that extracts detials from yaml file and processes accordingly.
the yaml file
confivnic:
device:
vnic1:
policy:
- L2
mode: active
vnic2:
policy:
- L3
- L4
mode: active
type: aggr
... (1 Reply)
Discussion started by: wrapster
1 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I have 2 files
File 1:
1 2 3 4 5 6 .......etc until column 300K
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
1 23 21 24 12 22
.
.
etc until row 1411
File 2: (14 Replies)
Discussion started by: sogi
14 Replies
7. Shell Programming and Scripting
Hi all,
I have two .txt file i.e.
First text file:
2
4
1
4
Second text file
2 1.nii.gz
4 334.nii.gz
1 12.nii.gz
4 134.nii.gz
If entry in 1st column of 1st text file matches the 1st column of 2nd text file, then copy the file (name of which is the second column) associated with... (4 Replies)
Discussion started by: vd24
4 Replies
8. Solaris
Hello,
I am very new to solaris so please bear with me. I have 2 machines in question. For both I am trying to get the HBA Card Hardware information such as:
HBA Model Name
HBA Firmware version
HBA Port details
HBA Driver details
First machine is a Solaris 10. When I execute fcinfo... (6 Replies)
Discussion started by: flagman5
6 Replies
9. UNIX for Dummies Questions & Answers
how to extract user machine name for current terminal using finger command
below command gives machinename for all session , is it possible to filter it to only currernt terminal ?
finger -b -p $LOGNAME | grep from (12 Replies)
Discussion started by: lalitpct
12 Replies
10. Shell Programming and Scripting
i have a text file which i am generating from few sqls.
format is like :
col1 col2 col3 col4 col5
1001 DONE ABC 17-sep-14 12:02:05
1001 DONE ABC 17-sep-14 12:02:05
1001 DONE ABC 17-sep-14 12:02:55
1001 REDONE ABC ... (6 Replies)
Discussion started by: deepakiniimt
6 Replies
LEARN ABOUT REDHAT
fingerd
FINGERD(8) BSD System Manager's Manual FINGERD(8)
NAME
fingerd -- remote user information server
SYNOPSIS
fingerd [-wulf] [-pL path] [-t timeout]
DESCRIPTION
Fingerd is a simple daemon based on RFC1196 that provides an interface to the ``finger'' program at most network sites. The program is sup-
posed to return a friendly, human-oriented status report on either the system at the moment or a particular person in depth.
If the -w option is given, remote users will get an additional ``Welcome to ...'' banner which also shows some informations (e.g. uptime,
operating system name and release) about the system the fingerd is running on. Some sites may consider this a security risk as it gives out
information that may be useful to crackers.
If the -u option is given, requests of the form ``finger @host'' are rejected.
If the -l option is given, information about requests made is logged. This option probably violates users' privacy and should not be used on
multiuser boxes.
If the -f option is given, finger forwarding (user@host1@host2) is allowed. Useful behind firewalls, but probably not wise for security and
resource reasons.
The -p option allows specification of an alternate location for fingerd to find the ``finger'' program. The -L option is equivalent.
The -t option specifies the time to wait for a request before closing the connection. A value of 0 waits forever. The default is 60 sec-
onds.
Options to fingerd should be specified in /etc/xinetd.d/finger.
The finger protocol consists mostly of specifying command arguments. The xinetd(8) ``super-server'' runs fingerd for TCP requests received
on port 79. Once connected fingerd reads a single command line terminated by a <CRLF> which is passed to finger(1). It closes its connec-
tions as soon as all output is finished.
If the line is empty (i.e. just a <CRLF> is sent) then finger returns a ``default'' report that lists all people logged into the system at
that moment. This feature is blocked by the -u option.
If a user name is specified (e.g. eric<CRLF>) then the response lists more extended information for only that particular user, whether
logged in or not. Allowable ``names'' in the command line include both ``login names'' and ``user names''. If a name is ambiguous, all pos-
sible derivations are returned.
SEE ALSO
finger(1), xinetd(8)
RESTRICTIONS
Connecting directly to the server from a TIP or an equally narrow-minded TELNET-protocol user program can result in meaningless attempts at
option negotiation being sent to the server, which will foul up the command line interpretation.
HISTORY
The finger daemon appeared in 4.3BSD.
Linux NetKit (0.17) August 29, 1996 Linux NetKit (0.17)