06-21-2010
Thank you for your reply.
Hi Scott,
Thank you for the reply..
It realy helped me a lot.
Thank you
G. Ravi Chandran
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
2. UNIX for Dummies Questions & Answers
I'm having one doubt about the VIM ENCRYPTION key. I having a text file, I encrypted that file using :X vim -x filename Now, where the encrypted key is stored (path). Whether it stored in a separate file or the text file itself. If I open a the file it asked Encryption key. How it compare... (1 Reply)
Discussion started by: ungalnanban
1 Replies
3. Shell Programming and Scripting
For every specific keys i.e. 1st and 4th columns (a1 and ABC_001144992) remove 1st and last value (bold ones - 87942437 and 87952030 ) and print remaining
input
a1 87942437 87943147 1E ABC_001144992
a1 87945162 87945276 2E ABC_001144992
a1 87949524 87952030 3E ABC_001144992
a1... (3 Replies)
Discussion started by: repinementer
3 Replies
4. Shell Programming and Scripting
Hi All,
I needs to fetch unique records based on a keycolumn(ie., first column1) and also I needs to get the records which are having max value on column2 in sorted manner... and duplicates have to store in another output file.
Input :
Input.txt
1234,0,x
1234,1,y
5678,10,z
9999,10,k... (7 Replies)
Discussion started by: kmsekhar
7 Replies
5. Linux
Hi All,
In linux server some encryption keys were imported using gpg command.
I want to know when those keys was imported.
Is there any way to get when the encryption keys were imported?
Thanks in advance..
:rolleyes: (1 Reply)
Discussion started by: latika
1 Replies
6. Shell Programming and Scripting
Hi Experts ,
we have a CDC file where we need to get the latest record of the Key columns
Key Columns will be CDC_FLAG and SRC_PMTN_I
and fetch the latest record from the CDC_PRCS_TS
Can we do it with a single awk command.
Please help.... (3 Replies)
Discussion started by: vijaykodukula
3 Replies
7. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
8. UNIX for Advanced & Expert Users
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
9. Shell Programming and Scripting
Hi All,
I need to get rid of initial meta key from json files with enclosed parenthesis from start and end of the lines which has total 4000 lines.
here is the sample Json records :
{"start": true, "meta": {"name": "xyz", "creation": "2017-07-14T16:20:06.000+02:00"}}
I need to remove... (7 Replies)
Discussion started by: Cloud_Ninja
7 Replies
makekey(1) General Commands Manual makekey(1)
NAME
makekey - generate encryption key
SYNOPSIS
DESCRIPTION
improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It
reads 10 bytes from its standard input and writes 13 bytes on its standard output. The output depends on the input in a way intended to be
difficult to compute (i.e., to require a substantial fraction of a second).
The first eight input bytes (the input key) can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of
digits, and uppercase and lowercase letters. The salt characters are repeated as the first two characters of the output. The remaining 11
output characters are chosen from the same set as the salt and constitute the output key.
The transformation performed is essentially the following: the salt is used to select one of 4,096 cryptographic machines all based on the
National Bureau of Standards DES algorithm, but broken in 4,096 different ways. Using the input key as key, a constant string is fed into
the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 output key bits in the result.
is intended for programs that perform encryption (e.g., ed(1) and crypt(1)). Usually, its input and output will be pipes.
SEE ALSO
crypt(1), ed(1), passwd(4).
makekey(1)