04-15-2011
really Thank you....can u explain the command.
another thing i need to update the output report file itself.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi All,
I have a file named pattern.dat which contains pattern like
A1000090 250.00 250.00
i have one more file named test.dat in which this pattern is present.
What i should do is, in test.dat after this pattern i should append comments.
i used... (4 Replies)
Discussion started by: Sona
4 Replies
2. Shell Programming and Scripting
Hello friends,
I have a C source code containing sql statements. I use the following sed command to print all the sql blocks in the source code....
sed -n "/exec sql/,/;/p" Sample.cpp
The above sed command will print the sql blocks based on the pattern "exec sql" & ";"... (2 Replies)
Discussion started by: frozensmilz
2 Replies
3. Shell Programming and Scripting
Hi,
Please take a look at the below eg. I would like to search for abc() pattern first and then search for (xyz) in the next line. If I can find the pattern, then I should delete the 3 lines.
I can only find the pattern and delete but I am unable to find two patterns and delete. Any... (8 Replies)
Discussion started by: sreedevi
8 Replies
4. Shell Programming and Scripting
Hello friends,
Only very recently i started learning sed command...an i found that sed is faster in finding the patterns than some of my scripts that uses grep to check the patten inside a file using line by line search method which is time consuming.
The below script... (4 Replies)
Discussion started by: frozensmilz
4 Replies
5. Shell Programming and Scripting
Hi All,
Please can someone assist in the script I have made that searches a pattern in a file and delete the whole line containing the pattern.
#!bin/sh
# The pattern that user want to add to the files
echo "Enter the pattern of the redirect"
read value
# check if the user has... (1 Reply)
Discussion started by: Shazin
1 Replies
6. Shell Programming and Scripting
Hi ,
how to add the single digit to front of the word and front of the lines in the one file with compare pattern file and get digit. like example
pattern file pattern.txt
pattern num
bala 2
raja 3
muthu 4
File Name: chennai.dat
muthu is good boy
raja is bad boy
selvam in super... (6 Replies)
Discussion started by: krbala1985
6 Replies
7. Shell Programming and Scripting
Hi,
I am trying to create a csv from a existing flat file.I am using the same data to create the csv file. But I have issues \10 columns onwards..
sed... (5 Replies)
Discussion started by: babom
5 Replies
8. Shell Programming and Scripting
here is what i want to achieve.. i have a file with below contents
cat fileName
blah blah blah
.
.DROP this
REJECT that
.
--sport 7800 -j REJECT --reject-with icmp-port-unreachable
--dport 7800 -j REJECT --reject-with icmp-port-unreachable
.
.
.
more blah blah blah
--dport 3306... (14 Replies)
Discussion started by: vivek d r
14 Replies
9. Shell Programming and Scripting
I have written a script to parse data from some files on a Solaris 10 system and send the output to a CSV formatted file. The code snipped i am using to pull the data is as follows....
src_line=$(sed -n "/^search_pattern$/{=;}" $file)
for i in $src_line
do
start_line1=$(( i + 9 ))
nawk -v... (4 Replies)
Discussion started by: electricheadx
4 Replies
10. UNIX for Dummies Questions & Answers
Hello!
My final exam in my Linux class is tomorrow, and I was just reviewing the grep and sed commands. I came across an example, by which I got stumped: it asks to provide a sed command that deletes all lines that contain exactly 3 to 5 digit strings, from a file.
In this case, I created a... (3 Replies)
Discussion started by: kalpcalp
3 Replies
LEARN ABOUT DEBIAN
tigexp
TIGEXP(8) Administrator Commands TIGEXP(8)
NAME
tigexp - UNIX Security Checker Explanation Generator
SYNOPSIS
tigexp msgid [msgid[msgid...]]
tigexp [-f|-F] [security_report]
DESCRIPTION
Tigexp is used to generate explanations of the output from the Tiger security checking package. In the first form, tigexp will generate an
explanation of each of the message ids listed. In the second form, the security report specified will be scanned and explanations gener-
ated. The -f option will generate one explanation for each unique message id in the security report, whereas the -F option will output the
security report with explanations inserted after each entry in the report.
There are five different message levels produced by Tiger. Each of the message levels is the last letter of the message id. The levels are:
ALERT A message of this level indicates that Tiger has detected a possible intrusion attempt or troublesome misconfiguration which can
expose the whole system to attacks.
FAIL Messages of this level indicate a violation of a generic security policy or a possible intrusion. Appropriate action should be taken
to fix this security issue.
WARN Messages of this level indicate a security issue which should be checked further and might indicate a probable vulnerability or
exposure. Most Tiger messages appear in this category.
INFO These includes information messages which are not necessarily a security violation but might be useful for the administrator. Note
that the tigerrc configuration file through the Tiger_Show_INFO_Msgs option determines whether or not Tiger shows these items. The
default behaviour is to not show them.
ERROR These messages are errors in the execution of Tiger (or any of its scripts), this is probably due to a misconfiguration in the pro-
gram, because of a problem in the installation or because a file needed for the test is missing. The script who outputs this error
should be investigated further.
CONFIG Messages with this level inform of stages in the configuration process of Tiger. They are not errors (otherwise ERROR would be used)
but notices for the user running the program explaining, for example, which configuration might be used.
OPTIONS
-f Scan the indicated security report and generate explanations of it. One explanation will be generated for each unique message id in
the security report. If the name of a security report is not given, then the report is read from stdin.
-F Output the indicated security report with explanations inserted after each entry in the report. If the name of a security report is
not given, then the report is read from stdin.
FILES
$TIGERHOMEDIR/doc/explain.idx
SEE ALSO
tiger(8)
BUGS
If the explanation index is out of date, it doesn't recognize it and generates junk.
Security 12 August 2003 TIGEXP(8)