Sponsored Content
Full Discussion: Need Help in Cutting a word
Top Forums Shell Programming and Scripting Need Help in Cutting a word Post 302238518 by jim mcnamara on Saturday 20th of September 2008 11:33:06 AM
Old 09-20-2008
The PS1 environment variable is how the prompt is defined. Try the echo trick on that variable, or use one of the string operations on the variable - the ones in shell.

What shell?
Code:
echo $SHELL

will tell you your shell.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

cutting

Is there any cut or awk function that would allow me to take the last part of a path away and save the list into a file? I wrote: find $HOME -mtime +3 > fileList cat fileList /home/102/s/jn/folder/HW /home/102/s/jn/otherfolder/B.txt /home/102/s/jn/folder4/3dA/w... (1 Reply)
Discussion started by: terms5
1 Replies

2. Shell Programming and Scripting

Can a shell script pull the first word (or nth word) off each line of a text file?

Greetings. I am struggling with a shell script to make my life simpler, with a number of practical ways in which it could be used. I want to take a standard text file, and pull the 'n'th word from each line such as the first word from a text file. I'm struggling to see how each line can be... (5 Replies)
Discussion started by: tricky
5 Replies

3. Shell Programming and Scripting

How to cut first line only from a text near a specific column without cutting a word

First I have to say thank you to this community and this forum. You helped me very much builing several useful scripts. Now, I can't get a solution the following problem, I'm stuck somehow. Maybe someone has an idea. In short, I dump a site via lynx and pipe the output in a file. I need to... (7 Replies)
Discussion started by: lowmaster
7 Replies

4. Shell Programming and Scripting

To read data word by word from given file & storing in variables

File having data in following format : file name : file.txt -------------------- 111111;name1 222222;name2 333333;name3 I want to read this file so that I can split these into two paramaters i.e. 111111 & name1 into two different variables(say value1 & value2). i.e val1=11111 &... (2 Replies)
Discussion started by: sjoshi98
2 Replies

5. Shell Programming and Scripting

Perl Cutting character(s) from a word

Hello, How to cut a char(s) for a word using perl?? I want to cut the number(s) from these sample words: Port-channel24 Po78 Po99 Port-channel34 $word = "Port-channel24"; I want to put only the number in a varible. Appreaciate using simple way in order to use it... (3 Replies)
Discussion started by: ahmed_zaher
3 Replies

6. UNIX for Dummies Questions & Answers

Find EXACT word in files, just the word: no prefix, no suffix, no 'similar', just the word

I have a file that has the words I want to find in other files (but lets say I just want to find my words in a single file). Those words are IDs, so if my word is ZZZ4, outputs like aaZZZ4, ZZZ4bb, aaZZZ4bb, ZZ4, ZZZ, ZyZ4, ZZZ4.8 (or anything like that) WON'T BE USEFUL. I need the whole word... (6 Replies)
Discussion started by: chicchan
6 Replies

7. Shell Programming and Scripting

AWK Substring without cutting off word

Can someone help me to make this code without cutting off words ni the string? awk '{for(i=1;i<length;i+=100) print substr($0,i,100)}' Thank you! (4 Replies)
Discussion started by: sanantonio7777
4 Replies

8. Shell Programming and Scripting

Search for the word and exporting 35 characters after that word using shell script

I have a file input.txt which have loads of weird characters, html tags and useful materials. I want to display 35 characters after the word "description" excluding weird characters like $&lmp and without html tags in the new file output.txt. Help me. Thanx in advance. I have attached the input... (4 Replies)
Discussion started by: sachit adhikari
4 Replies

9. Shell Programming and Scripting

Find a word and increment the number in the word & save into new files

Hi All, I am looking for a perl/awk/sed command to auto-increment the numbers line in file, P1.tcl: run_build_model sparc_ifu_dec run_drc set_faults -model path_delay -atpg_effectiveness -fault_coverage add_delay_paths P1 set_atpg -abort_limit 1000 run_atpg -ndetects 1000 I would like... (6 Replies)
Discussion started by: jypark22
6 Replies

10. UNIX for Beginners Questions & Answers

How to search for a word in column header that fully matches the word not partially in awk?

I have a multicolumn text file with header in the first row like this The headers are stored in an array called . which contains I want to search for each elements of this array from that multicolumn text file. And I am using this awk approach for ii in ${hdr} do gawk -vcol="$ii" -F... (1 Reply)
Discussion started by: Atta
1 Replies
su(1)							      General Commands Manual							     su(1)

NAME
su - switch user SYNOPSIS
[username [arguments]] [username] DESCRIPTION
The (set user or superuser) command allows one user to become another user without logging out. username is the name of a user defined in the file (see passwd(4)). The default name is (that is, superuser). To use the appropriate password must be supplied unless the current user is superuser and is not using the option. If a valid password is entered, executes a new shell with the real and effective user ID, real and effective group ID, and group access list set to that of the specified user. The new shell is the one specified in the shell field of the new user's entry in the password file, The arguments are passed along to the new shell for execution, permitting the user to run shell procedures with the new user's privileges. When exiting from the new shell, the previous username and environment are restored. All attempts to become another user are logged in including failures. Successful attempts are flagged with failures, with They are also logged with (see syslog(3C)). Options recognizes the following options: If the option is specified, the new shell starts up as if the new user had initiated a new login session. If the option is omit- ted, the new shell starts as if a subshell was invoked. See more details below. If DCE (Distributed Computing Environment) is being used as the authentication mechanism, the option must be specified. With this option, even superuser will be prompted for the user's password. The reason for this is because DCE credentials for a user cannot be obtained without that user's pass- word. This option cannot be used with shell arguments. If the option is specified, the new shell starts up as if the new user had initiated a new login session. Exceptions are as follows: o The variable is reset to the new user's home directory. o If the new user name is the path and prompt variables are reset: For other user names: o The variable is retained. o The rest of the environment is deleted and reset to the login state. However, the login files are normally executed anyway, usually restoring the expected value of and other variables. If the option is omitted, the new shell starts as if a subshell was invoked. Exceptions are as follows: o If the new user name is the path and prompt variables are reset: o The previously defined and environment variables are removed. o The rest of the environment is retained. If the shell specified in is sets the value of parameter in the new shell (referenced as to If the option of the command is specified, sets parameter to If the shell specified in is not sets the value of parameter in the new shell to shellname. If the option of the command is specified, sets parameter to For example, if the Korn shell is invoked, the value of shellname will be either or By comparison, the command always sets parameter to HP-UX Smart Card Login If the user account is configured to use a Smart Card, the user password is stored in the card. This password has characteristics identi- cal to a normal password stored on the system. In order to using a Smart Card account, the Smart Card from the destination user account must be inserted into the Smart Card reader. The user is prompted for a PIN instead of a password during authentication. The password is retrieved automatically from the Smart Card when a valid PIN is entered. Therefore, it is not necessary to know the pass- word, only the PIN. The card is locked if an incorrect PIN is entered three consecutive times. It may be unlocked only by the card issuer. SECURITY FEATURES
Except for user users cannot use to change to an account that has been locked because of expired passwords or other access restrictions. Refer to the file in the security(4) manual page for detailed information on configurable parameters that affect the behavior of this com- mand. Currently, the supported parameters for the command are: EXTERNAL INFLUENCES
Environment Variables User's home directory The language in which messages are displayed. If is not specified or is null, it defaults to (see lang(5)). If any internationalization variable contains an invalid set- ting, all internationalization variables default to (see environ(5)). User's login name Command name search path Default prompt Name of the user's shell International Code Set Support Characters in the 7-bit US-ASCII code sets are supported in login names (see ascii(5)). EXAMPLES
Become user while retaining the previously exported environment: Become user but change the environment to what would be expected if had originally logged in: Execute the command, using the temporary environment and permissions of user In this example, user bin's shell is invoked with the argu- ments Become user in the DCE environment: WARNINGS
After a valid password is supplied, uses information from and to determine the user's group ID and group access list. If is linked to and group membership for the user trying to log in is managed by the Network Information Service (NIS), and no NIS server is able to respond, waits until a server does respond. DEPENDENCIES
Pluggable Authentication Modules (PAM) PAM is an Open Group standard for user authentication, password modification, and account validation. In particular, is invoked to perform all functions related to This includes password retrieval, account validation, and error message displays. FILES
User's profile System's default group access list file System's password file System's profile Log of all attempts Security defaults configuration file SEE ALSO
env(1), login(1), sh(1), initgroups(3C), syslog(3C), group(4), passwd(4), profile(4), security(4), environ(5). Pluggable Authentication Modules (PAM) pam_acct_mgmt(3), pam_authenticate(3). HP-UX Smart Card Login scpin(1). STANDARDS CONFORMANCE
su(1)
All times are GMT -4. The time now is 08:27 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy