12-14-2010
If u want to catch only some number of characters (i.e. only 2 or only 5 characters need to be entered and than your standard input should be disabled) than I have perl code if u have perl installed in your machine.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have a job that runs for an unspecified amount of time. I want to run this as a cron job for a specified amount of time, say 2 hours. Once the time is up, the program should be killed in the middle of execution. How can I do this?
Thanks. (5 Replies)
Discussion started by: cooldude
5 Replies
2. Shell Programming and Scripting
Hi,
how can i do to show when i do with scrip list entris, or list specific entry, it show 2 lines when i specify the entry to search...¿?
i paste the script:
# Global variables
film=/opt/etc/film/film.txt
export film
confirm()
{
echo -en "$@"
read ans
ans=`echo $ans | tr... (0 Replies)
Discussion started by: dorek
0 Replies
3. Shell Programming and Scripting
Hi all,
now i am writting one bash script. in that my requirement is
i need to create one directory and that the directory details to be stored in one file Ex. date/time and all in one file.
after that i need to delete the folder automatically exactly after 3months.
between these time... (5 Replies)
Discussion started by: anishkumarv
5 Replies
4. UNIX for Dummies Questions & Answers
Hi,
Below is my OS details.
uname -an
SunOS mymachine 5.10 Generic_144488-07 sun4v sparc SUNW,SPARC-Enterprise-T5220
I need to know when was my Apache server last started. Whats is the best and most reliable way to find out not just for Apache but for any PID per say?
I am... (16 Replies)
Discussion started by: mohtashims
16 Replies
5. Shell Programming and Scripting
Hi
I am new to writing script and want to use a Bash Piped while-read and read from user input.
if something happens on server.log then do while loop or if something happend on user input then do while loop.
Pseudocode something like:
tail -n 3 -f server.log | while read serverline || read... (8 Replies)
Discussion started by: MyMorris
8 Replies
6. HP-UX
Hi,
Can some one please tell me how do I generate a report of the Memory Consumption over a time period:
HP-UX B.11.31 U ia64 0440531406 unlimited-user license
I normally use glance to monitor memory in run time.
Note: I do not have root privileges.
Thanks
Danish
... (5 Replies)
Discussion started by: danish0909
5 Replies
7. Shell Programming and Scripting
Hi,
can some one help me how to encrypt and decrypt a file.
AIM: reade user input, encrypt it and save it to file.
while decryption read the encrypted file decrypt it and save the output in some variable.
Example: consider we have Credentials.txt file with content username: password... (5 Replies)
Discussion started by: saichand1985
5 Replies
8. Shell Programming and Scripting
I used this script to get the connection to a domain in two specific minutes. I need to extend to give result over a range of minutes.
The below gives total number of connections in the minutes 00:40 and 01:13 on 22nd March.
egrep "22/Mar/2013:00:40|22/Mar/2013:01:13"... (1 Reply)
Discussion started by: anil510
1 Replies
9. Shell Programming and Scripting
All,
How to get the list of files through a unix command which exists / created / updated between 8 PM to 11:59 PM from a particular location.
Regards
Oracle User (3 Replies)
Discussion started by: Oracle_User
3 Replies
10. Shell Programming and Scripting
i have written my shell script in notepad however i am struggling to pass the data file to be read to the script the data file is of .txt format. My target is to run the shell script from the terminal and pass 3 arguments e.g. polg@DESKTOP-BVPDC5C:~/CS1420/coursework$ bash valsplit.sh input.txt... (11 Replies)
Discussion started by: Gurdza32
11 Replies
MAKEKEY(8) System Manager's Manual MAKEKEY(8)
NAME
makekey - generate encryption key
SYNOPSIS
/usr/lib/makekey
DESCRIPTION
Makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space.
It reads 10 bytes from its standard input, and writes 13 bytes on its standard output. The output depends on the input in a way intended
to be difficult to compute (i.e. to require a substantial fraction of a second).
The first eight input bytes (the input key) can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of
digits, upper- and lower-case letters, and `.' and `/'. The salt characters are repeated as the first two characters of the output. The
remaining 11 output characters are chosen from the same set as the salt and constitute the output key.
The transformation performed is essentially the following: the salt is used to select one of 4096 cryptographic machines all based on the
National Bureau of Standards DES algorithm, but modified in 4096 different ways. Using the input key as key, a constant string is fed into
the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 useful key bits in the result.
Makekey is intended for programs that perform encryption (e.g. ed and crypt(1)). Usually its input and output will be pipes.
SEE ALSO
crypt(1), ed(1)
MAKEKEY(8)