10-18-2010
How to analyze file hashing
What command should I use to analyze file hashing of fixed flat files.
How much work does it take for multiple flat files.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
how can one find that which encryption algorithm the system is using for keeping the user password in the /etc/passwd or /etc/shadow file.
Is it
1: Hashing ( which considers only first 5 letters of password)
2: MD5 (Which allows arbitry length passwords)
Thanks,
~amit (0 Replies)
Discussion started by: amit4g
0 Replies
2. Shell Programming and Scripting
Hi guys,
I have multiple files (>5000) which I have in a folder. I read every file name and put it in a tmp variable "i" so that i can use it in the following task.
I have a large .txt file (>50 MB) in which I want to find the variable "i" and the lines after this variable, so that I can use... (4 Replies)
Discussion started by: Ashitaka007
4 Replies
3. UNIX for Dummies Questions & Answers
I am looking for a utility that does file hashing in unix. ...Please let me know of any good easy to use utility (3 Replies)
Discussion started by: jbjoat
3 Replies
4. Programming
Hi,
I'm looking for linear hashing implementation in C language. Please help.
PS: I have implement this on Ubuntu 10.04 Linux on 64 bit machine. (1 Reply)
Discussion started by: sajjar
1 Replies
5. UNIX for Advanced & Expert Users
I'm collecting some info on the password hashing algorithms in use on various Unix systems. So far I have:
no $ legacy unix crypt
$1$ MD5
$2$ Blowfish on BSD
$2a$ alternate Blowfish on BSD
$md5$ Sun's alternate MD5
$3$ a Microsoft hash
$4$ not used?
$5$ RedHat proposed Sha-256... (2 Replies)
Discussion started by: Perderabo
2 Replies
6. Programming
Hi, I have two files:
Input_file1.txt
124
235
152
178
156
142
178
163
159
Input_file2.txt
124|5623
452|6698
178|9995
235|7542
159|8852 (1 Reply)
Discussion started by: cpp_beginner
1 Replies
7. UNIX for Dummies Questions & Answers
Hi Dears,
I use the below code to analyze lines in a file:
for line in `cat ucsv`
do
echo $line
//analyze statements
donehowever, if line contains space char, it will be broken. for example, if file content is:
#login,full name,email,project,role,action
gmwen,Bruce... (3 Replies)
Discussion started by: crest.boy
3 Replies
8. Solaris
Hello,
I'm having an issue with my password hashing. In /etc/shadow all the passwords hashes start with $1$. The security people want me to change it so the password hash starts with $5$ or $6$. So this is what I did to fix this.
I changed CRYPT_DEFAULT for 1 to 6
CRYPT_DEFAULT=6When I create a... (0 Replies)
Discussion started by: bitlord
0 Replies
9. Shell Programming and Scripting
So, I am writing a script that will read output from Bulk Extractor (which gathers data based on regular expressions). My script then reads the column that has the URL found, hashes it with MD5, then outputs the URL and hash to a file.
Where I am stuck on is that I want to read the bulk... (7 Replies)
Discussion started by: twjolson
7 Replies
10. UNIX for Advanced & Expert Users
Hello Team,
Could You give me some hints how I should review the sosreport that I generated? I know how to analysis the SAR files however sosreport is my last hope - python script has hunged and I would like to know the root cause - for this is not performance issue.
Thanks in advance!
... (3 Replies)
Discussion started by: nsmcny
3 Replies
LEARN ABOUT CENTOS
abrt-action-analyze-backtrace
ABRT-ACTION-ANALYZ(1) ABRT Manual ABRT-ACTION-ANALYZ(1)
NAME
abrt-action-analyze-backtrace - Analyzes C/C++ backtrace, generates duplication hash, backtrace rating, and identifies crash function in
problem directory DIR.
SYNOPSIS
abrt-action-analyze-backtrace [-v] [-d DIR]
DESCRIPTION
The tool reads a file named backtrace from problem directory, generates duplication hash, backtrace rating, and identifies crash function.
Then it saves this data as new elements duphash, rating, crash_function in this problem directory.
Integration with libreport events
abrt-action-analyze-backtrace can be used as a secondary analyzer, after backtrace has been generated. The data generated by
abrt-action-analyze-backtrace is useful for reporting the crash to bug databases: rating makes it possible to prevent reporting of bugs
with low quality (non-informative) backtraces, duplication hash is used to find already filed bugs about similar crashes.
Example usage in report_event.conf:
EVENT=analyze analyzer=CCpp
abrt-action-generate-backtrace || exit $?
abrt-action-analyze-backtrace
OPTIONS
-d DIR
Path to problem directory.
-v
Be more verbose. Can be given multiple times.
AUTHORS
o ABRT team
SEE ALSO
abrt-action-generate-backtrace
abrt 2.1.11 06/18/2014 ABRT-ACTION-ANALYZ(1)