01-02-2009
Also, you may want to use...
if [ "$chksum1" = "$chksum2" ]
for correctness and also to protect against embedded spaces in chksum1 and 2.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I am writing a script and need to goto the start of the script if an incorrect command is wrongly entered what can i do.
Andy (1 Reply)
Discussion started by: chapmana
1 Replies
2. Shell Programming and Scripting
Hi,
I would like to check if there's any sample of restart script for my AIX server.
I'm planning to restart it every month.
Thanks. (5 Replies)
Discussion started by: ademah
5 Replies
3. Shell Programming and Scripting
Hi all.
I do have a script "startApp.sh" (app result is a file /opt/extract/appextract.txt)
I have no problems with stopping app
var1=`ps -ef | grep -v grep | grep MyApp | awk '{print $2}'`
kill -9 $var1
What I want to achieve is:
I start app, app is doing some extraction, after... (11 Replies)
Discussion started by: e-l-diablo
11 Replies
4. Shell Programming and Scripting
Hello, I created a shell script in /etc/init.d and it already runs at boot. However I cannot figure out how to make it run just like typing "scrip_name start"
I can run it like this ./script_name but since I am doing remote log in whenever I log off the script stops and I also don't want to run... (8 Replies)
Discussion started by: kizofilax
8 Replies
5. Shell Programming and Scripting
Hi,
I currently have a shell script that takes an RPM and scp's it to a set of remote servers and installs it.
What I would like to be able to do is make the script get the md5sum of the RPM locally (so get the md5sum of the rpm from where im running the script) and then scp the rpm to the... (0 Replies)
Discussion started by: tb1986
0 Replies
6. Shell Programming and Scripting
I am trying to download a file and make the filename of the file be the md5sum of the URL. I know to use wgets to download the file but I do not know how to do the rest...any help would be appreciated. (2 Replies)
Discussion started by: The undertaker
2 Replies
7. Shell Programming and Scripting
Hello,
I need to download multiple files from an FTP server but occasionally they arrive in error so I need to perform an integrity check. I've been attempting to write a bash script that does the following:
Downloads all files including those in sub directories
Perform md5sum using... (4 Replies)
Discussion started by: shadyuk
4 Replies
8. Shell Programming and Scripting
Hello,
I would like to make a script that searches through a SRC folder and copies only files it's never seen before to a DEST folder.
SRC = /user/.phonesync/photos-backup
DST = /usr/.phonesync/photos-new
So basically, I'd start with a:
md5sum /user/.phonesync/photos-backup/* >... (29 Replies)
Discussion started by: nbsparks
29 Replies
9. Shell Programming and Scripting
I am using blow script :--
#!/bin/bash
FIND=$(ps -elf | grep "snmp_trap.sh" | grep -v grep) #check snmp_trap.sh is running or not
if
then
# echo "process found"
exit 0;
else
echo "process not found"
exec /home/Ketan_r /snmp_trap.sh 2>&1 & disown -h ... (1 Reply)
Discussion started by: ketanraut
1 Replies
10. Shell Programming and Scripting
I am getting No such file or directory if my variable contains white spaces... Is there a way to fix this?
This works
x="1.md5"
md5sum -c "$x"
This, does not
x="23\ 5\ 6\ 7\ 8\ 9\ 10.md5"
md5sum -c "$x"
md5sum: '23\ 5\ 6\ 7\ 8\ 9\ 10.md5': No such file or directory
How do I fix... (1 Reply)
Discussion started by: soichiro
1 Replies
LEARN ABOUT OSX
opieaccess
OPIEACCESS(5) File Formats Manual OPIEACCESS(5)
NAME
[/etc/]opieaccess - OPIE database of trusted networks
DESCRIPTION
The opieaccess file contains a list of networks that are considered trusted by the system as far as security against passive attacks is
concerned. Users from networks so trusted will be able to log in using OPIE responses, but not be required to do so, while users from net-
works that are not trusted will always be required to use OPIE responses (the default behavior). This trust allows a site to have a more
gentle migration to OPIE by allowing it to be non-mandatory for "inside" networks while allowing users to choose whether they with to use
OPIE to protect their passwords or not.
The entire notion of trust implemented in the opieaccess file is a major security hole because it opens your system back up to the same
passive attacks that the OPIE system is designed to protect you against. The opieaccess support in this version of OPIE exists solely
because we believe that it is better to have it so that users who don't want their accounts broken into can use OPIE than to have them pre-
vented from doing so by users who don't want to use OPIE. In any environment, it should be considered a transition tool and not a permanent
fixture. When it is not being used as a transition tool, a version of OPIE that has been built without support for the opieaccess file
should be built to prevent the possibility of an attacker using this file as a means to circumvent the OPIE software.
The opieaccess file consists of lines containing three fields separated by spaces (tabs are properly interpreted, but spaces should be used
instead) as follows:
Field Description
action "permit" or "deny" non-OPIE logins
address Address of the network to match
mask Mask of the network to match
Subnets can be controlled by using the appropriate address and mask. Individual hosts can be controlled by using the appropriate address
and a mask of 255.255.255.255. If no rules are matched, the default is to deny non-OPIE logins.
SEE ALSO
opie(4), opiekeys(5), opiepasswd(1), opieinfo(1), opiesu(1), opielogin(1), opieftpd(8)
AUTHOR
Bellcore's S/Key was written by Phil Karn, Neil M. Haller, and John S. Walden of Bellcore. OPIE was created at NRL by Randall Atkinson, Dan
McDonald, and Craig Metz.
S/Key is a trademark of Bell Communications Research (Bellcore).
CONTACT
OPIE is discussed on the Bellcore "S/Key Users" mailing list. To join, send an email request to:
skey-users-request@thumper.bellcore.com
7th Edition January 10, 1995 OPIEACCESS(5)