07-10-2011
Apparently this didn't fix it. For reference I have "alias mv='mv -i'" in my .bashrc so I've change the mv to mv -f and am hoping that'll sort it out tonight.
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I have data in the following format:
data1
data2 data3 data4
data5 data6
data7 data8 data9
data10
I require the final output to be:
data1
data1
data1
data1
i only require the 1st line but I need to replicate it in n rows where n is the number of rows where data... (4 Replies)
Discussion started by: ReV
4 Replies
2. Post Here to Contact Site Administrators and Moderators
SORRY FOR DUPLICATING POSTS, COULD U JUST REMOVE THE FIRST ONE.
Thank u. (1 Reply)
Discussion started by: vrguha
1 Replies
3. HP-UX
I have a B180L controller running HP-UX 10.2 with an internal DDS2 tape drive and an external Surestore DDS (24gb) tape drive. I want to make duplicate copies of ignite tapes from one tape drive to another. What is the best way to do this? (1 Reply)
Discussion started by: garyb
1 Replies
4. UNIX for Dummies Questions & Answers
Hi,
i have a webserver logfile and want to count how many page views there have been.
I was thinking about removing lines that begin with the same user and same date&time, because it indicates they were just looking at one page and multiple hits were counted.
My question is how do I do this?... (6 Replies)
Discussion started by: JudithBorg
6 Replies
5. Red Hat
Hi guys,
Suppose you have a server with two ethernet cards (1GB each) and each cards are connecting to two different switches cisco 3750. My question is:
How can I setup my server's network interfaces to increase the throughput up to 2GB? is it possible? If not, do you know another way to up... (3 Replies)
Discussion started by: iga3725
3 Replies
6. UNIX for Dummies Questions & Answers
hi guys
I have a IBM eServer BladeCenter HS12 with Linux Red Hat 5.4 installed on it, it is using Bonding.
ifcfg-bond0
DEVICE=bond0
BOOTPROTO=none
ONBOOT=yes
TYPE=Ethernet
IPADDR=x.x.x.x
NETMASK=x.x.x.x
GATEWAY=x.x.x.x
USERCTL=no
IPV6INIT=no
PEERDNS=no
BONDING_OPTS="miimon=80... (1 Reply)
Discussion started by: karlochacon
1 Replies
7. UNIX for Dummies Questions & Answers
I have a text file which is the results of running a tests hundreds of times. For simplicity let's say that each test consists of 5 lines of text numbered 1-5 e.g.
1 aaa aaa aaa
2 bbb bbb bbb
3 ccc ccc ccc
4 ddd ddd ddd
5 eee eee eee
1 aaa aaa aaa
2 bbb bbb bbb
3 ccc... (4 Replies)
Discussion started by: millsy5
4 Replies
8. Shell Programming and Scripting
Hello,
I have a file named file_1.sh that I want to duplicate into file_2.sh, file_3.sh,..., etc.
I also need to change the text within each file so that it would fit the file name. For example, in file_1.sh there is a command to save some output as 'output_1.txt', and also there is an input... (3 Replies)
Discussion started by: haguyw
3 Replies
cron(8) System Manager's Manual cron(8)
NAME
cron - The system clock daemon
SYNOPSIS
/usr/sbin/cron
DESCRIPTION
The cron daemon runs shell commands at specified dates and times. Commands that are to run according to a regular or periodic schedule are
found within the crontab files. Commands that are to run once only are found within the at files. You submit crontab and at file entries
by using the crontab and at commands. Because the cron process exits only when killed or when the system stops, only one cron daemon
should exist on the system at any given time. Normally, you start the cron daemon from within a run command file.
During process initialization and when cron detects a change, it examines the crontab and at files. This strategy reduces the overhead of
checking for new or changed files at regularly scheduled intervals. The cron command creates a log of its activities. The cron daemon
must be started from the system startup scripts because it must begin execution without a login user ID set. The cron daemon starts each
job with the following process attributes stored with the job by the invoking process: Login user ID Effective and real user IDs Effective
and real group IDs Supplementary groups
It also establishes the following attributes from the authentication profile of the account associated with the login user ID of the invok-
ing process: Audit control and disposition masks Kernel authorizations
DIAGNOSTICS
The at and batch programs will refuse to accept jobs submitted from processes whose login user ID is different from the real user ID.
FILES
Specifies the command path. Main cron directory Directory containing the crontab files. List of allowed users. List of denied users His-
tory information for cron Queue description file for at, batch, and cron
RELATED INFORMATION
Commands: at(1), crontab(1), rc0(8), rc2(8), rc3(8)
Files: queuedefs(4) delim off
cron(8)