08-26-2008
A suffiently big file, not very well.
Unless you did it in C - and use the rewrite command. This will work only if the new data is the same size as the old.
Perhaps a C class would be the way to go.
Quote:
Originally Posted by
prassu
Can it be done without using a new_file ?
I mean updating the same file is that possible?
Please Advice
Thanks
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies
2. Programming
Hi,
Could any one help me to write a C program for password mask
with ******. I mean whatever word i will type that will show on the screen as ***** and should store the correct value in a variable.
Thanks in advance
Krishna (5 Replies)
Discussion started by: krishna
5 Replies
3. IP Networking
What is the command to change the mask to 255.255.255.0
The system was set up incorectly and the mask needs to be corrected (1 Reply)
Discussion started by: kkinnon
1 Replies
4. Shell Programming and Scripting
HP-UX 11i v2. #!/bin/sh
Hi all.
I have a flat file like this with lines like this:
|07/19/07|08:26AM|1|CupsCoffee|CupsCo|989898989 |Doe, John Y |THE PLUS CARD - Price| | |Y| | 2.00|
I would like to replace the id number (field 6) with a masked... (3 Replies)
Discussion started by: lyoncc
3 Replies
5. Shell Programming and Scripting
I have an requirement. There is a file which has the below contents
Unix|123|17-01-2010
....
....
....
....
and so an
now each letter has a corresponding predefined mapping letter in order to mask the original data.(for example U = A,
n=b, i=c, x=d, same like number 1=9,2=8,3=7. Also... (8 Replies)
Discussion started by: ksmbabu
8 Replies
6. UNIX for Dummies Questions & Answers
Hi All,
i am executing peoplesoft sqr command from unix prompt which has the unix id/password as parameter along with other parameters. i want to show whole command in log file but want to mask the id/password field. this command i am executing in shell script. Please suggest..
>sqr sqrname... (2 Replies)
Discussion started by: avi.coep
2 Replies
7. Red Hat
Hi Experts,
I'm using samba -3.6.1 on Red Hat Enterprise Linux ES release 4 (Nahant Update 8) ,all seems ok. The issue im facing is as follows.
When ever a user creates a file via windows explorer the permissions assgined to the file are as follows
-rw-rwxr--+ 1 tom group2 0 Mar 9... (1 Reply)
Discussion started by: maverick_here
1 Replies
8. UNIX for Dummies Questions & Answers
Hi Guys,
can someone explain what is mask and effective right mask in setfacl and
getfacl command with example, unable to get it. (3 Replies)
Discussion started by: Jcpratap
3 Replies
9. Red Hat
hey, i have an array which stores different type of file name like
File_123.csv,
File_as34.csv
File_dff.csv
that is after undersore it can be a numeric value or alphanumeric or alphabets
and it can be different values.
now what i have to do is to compare the values after underscore and... (1 Reply)
Discussion started by: ramsavi
1 Replies
10. Shell Programming and Scripting
Hi all,
Im trying to use grep to match a exact mask where some characters are known and some are not. for example:
j***n@email.com
in this case the length is known and the position of the unknown characters are know (and will be )
any idea how I can do this? the file list is not just... (3 Replies)
Discussion started by: flamer
3 Replies
LEARN ABOUT DEBIAN
aspect::advice::after
Aspect::Advice::After(3pm) User Contributed Perl Documentation Aspect::Advice::After(3pm)
NAME
Aspect::Advice::After - Execute code after a function is called
SYNOPSIS
use Aspect;
after {
# Trace all returning calls to your module
print STDERR "Called my function " . $_->sub_name . "
";
# Suppress exceptions AND alter the results to foo()
if ( $_->short_name eq 'foo' ) {
if ( $_->exception ) {
$_->return_value(1);
} else {
$_->return_value( $_->return_value + 1 );
}
}
} call qr/^ MyModule::w+ $/
DESCRIPTION
The "after" advice type is used to execute code after a function is called, regardless of whether or not the function returned normally or
threw an exception.
The "after" advice type should be used when you need to potentially make multiple different changes to the returned value or the thrown
exception.
If you only care about normally returned values you should use "returning" in the pointcut to exclude join points occuring due to
exceptions.
If you only care about handling exceptions you should use "throwing" in the pointcut to exclude join points occuring due to normal return.
AUTHORS
Adam Kennedy <adamk@cpan.org>
COPYRIGHT AND LICENSE
Copyright 2010 Adam Kennedy.
This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
perl v5.14.2 2012-02-01 Aspect::Advice::After(3pm)