02-20-2009
Try setting the transport mode to bin. Binary.
If this is a dialup line there may be noise causing problems. It may also be that your source file has holes in it - if you know what those are.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All,
I have posted this issue in the forum, but i did not get any answer. If someone knows about it, could you please let me know hoiw to do it?
i am FTP the file from one server to another. The code in FTP should first check the indicator file is available or not? For example, for the data... (1 Reply)
Discussion started by: Amit.Sagpariya
1 Replies
2. Web Development
hi,
I'm connecting to a web server with ftp protocol and I would like to change some folders and files owner. I tried chown but it is not available.
I typed "help" and this is the list I got. Is possible that the chown command is not installed on the server ? Or I don't have permissions ?... (8 Replies)
Discussion started by: aneuryzma
8 Replies
3. UNIX for Dummies Questions & Answers
Hello everyoane
I folow step by step (i' new in unix) this video tutorial YouTube - rogriff's Channel to instal unix in a personal laptop, but when he go in C -> data -> downloads -> resume020807 in mi pc not exist
I attach the filles to see, thank you in advance (3 Replies)
Discussion started by: ___
3 Replies
4. Shell Programming and Scripting
Hi,
I have thousands of data in 1 file that need to be sorted out. My file is like below:-
File1.txt
condition 1
scaf_27 CDS 48317 48517 "e_gww2.27.12.1" Id 35277
scaf_27 stop_cod 48317 48319 "e_gww2.27.12.1"
scaf_27 CDS 48518 49107 "e_gww2.27.12.1" ... (4 Replies)
Discussion started by: redse171
4 Replies
5. Shell Programming and Scripting
hello everyone,
I have a task to input missing data into a file. example of my data below:
Wed Feb 01 09:00:02 EST 2012,,,0.4,0.3,,0.3,,0.3,,0.5,,0.3,,,0.4,0.3,
Wed Feb 01 09:00:11 EST 2012,,,,,,,0.2,,,,,,,,,,
Wed Feb 01 09:00:22 EST... (23 Replies)
Discussion started by: Nolph
23 Replies
6. Shell Programming and Scripting
Let me start off by saying I am a self taught sometimes scripter so what you will see below won't be pretty.
I have created a script to parse through a file with a large amount of data and simply pull out what I need. In doing this I create several files and then paste them together in order to... (2 Replies)
Discussion started by: fsanchez
2 Replies
7. UNIX for Dummies Questions & Answers
Hello masters,
I am filtering data based on completeness. A (Name , Group) combination in File2 is only complete when it has data for all subgroups specified in File1.
All incomplete (Name , Group) combinations do not appear in the output.
So for example , Name1 Group 1 in File2 is... (6 Replies)
Discussion started by: senhia83
6 Replies
8. UNIX for Dummies Questions & Answers
I was asked if I can create an FTP only user on a UNIX system I've inherited at work. (Solaris).
I've worked on UNIX systems for a long time, but never really as an admin.
I searched the web, and on this forum, for information on exactly how to do this.
(The new user will also need to be... (4 Replies)
Discussion started by: HeyMoe
4 Replies
9. UNIX for Dummies Questions & Answers
Gents,
Using the following code.
awk -F: 'BEGIN {
print "Time,FFID,Swath,Line,Point";
}
/(SCI TB Timestamp Local : |File # :|Swath Name :|Tape # :|Line Name :|Point Number :|Type_Of_Dump|Type_Of_Test|Tape_Nb|Tape_Label|Date|Hist)/{
sub("^*","",$2);sub("*$","",$2); if($1 ~ /Hist/) { printf... (2 Replies)
Discussion started by: jiam912
2 Replies
10. Shell Programming and Scripting
I am learning AWK by trying out examples whenever I need a specific conversion. I would like to edit the 'before.txt' so that all the missing data points between 140-150 are added and shown as 0.
before.txt
145 2
148 13
149 17
to below,
140 0
141 0
142 0
143 0
144 0
145 2
146 0... (5 Replies)
Discussion started by: numareica
5 Replies
LEARN ABOUT HPUX
d_passwd
dialups(4) Kernel Interfaces Manual dialups(4)
NAME
dialups, d_passwd - dialup security control
DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the
name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a
line found in dialup security is invoked. Anything after a space or tab is ignored.
When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro-
gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons.
The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users
logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null
password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from
FILES
dial-in tty lines
passwords
SEE ALSO
login(1), passwd(4).
dialups(4)