05-27-2012
it just doesnt work even if the mesagge printed is "Data deleted", anyway thanx for the replay
9 More Discussions You Might Find Interesting
1. AIX
I am about to retire several servers and need to delete the company confidential data from the internal disks under LVM control. Is there a proven and easy way to accomplish this ?
Thanks for all the help in advance. (4 Replies)
Discussion started by: thenomad
4 Replies
2. Shell Programming and Scripting
This is probably archaic, but I'm new to unix and this is my first shell script. I'm writing this script to use in another script. All I am trying to do is make the parts of the output from date usable in my other script. I was wondering if you could stand looking at this and see if you notice... (8 Replies)
Discussion started by: Dalcron
8 Replies
3. Shell Programming and Scripting
Hello Everyone,
I have a perl script that reads two types of data files (txt and XML). These data files are huge and large in number. I am using something like this :
foreach my $t (@text)
{
open TEXT, $t or die "Cannot open $t for reading: $!\n";
while(my $line=<TEXT>){
... (4 Replies)
Discussion started by: ad23
4 Replies
4. Shell Programming and Scripting
Hello,
I have the following data file structure:
1234 text
2345 text
3456 text text text
4567 text text text
5678 text text text
6789 text text text
I simply want to delete all of the lines that only have one text column (i.e. the first two lines in this case). The output would be:... (1 Reply)
Discussion started by: palex
1 Replies
5. Shell Programming and Scripting
Hello,
I want to add a new row to a file to insert data without deleting the previous data there.
Example:
file
a
b
c
d
Output
a
b
newtext
c (6 Replies)
Discussion started by: joseamck
6 Replies
6. Shell Programming and Scripting
Hi,
I have come across a little strange problem in my script. i tried the same logic in some other script where its working fine. but in other script its not behaving as expected.
Here is the code:
#!/bin/bash
run_count="2"
catalog_name="demo"
cd... (3 Replies)
Discussion started by: sukhdip
3 Replies
7. Shell Programming and Scripting
Hi, I'm new to programming in shell and I wanted to make a simple database on shell script but I'm having trouble in deleting data. I would apreciate any kind of help. Thank you in adavanced. (7 Replies)
Discussion started by: Lina_14
7 Replies
8. UNIX for Dummies Questions & Answers
hi
i have my input data like this
aaa bbb ccc
asa dff nmj
mnj saa dff
oik
aax cdx saa
oik
asq sdf dssi want my output file to be like this
mnj saa dff oik
aax cdx saa oiki want to retain only those lines which will have oik just below them and i want oik to be as next column to those... (1 Reply)
Discussion started by: anurupa777
1 Replies
9. Shell Programming and Scripting
Need Assistance in a script to delete date for Below example
There are four period(.) line . I wanted to delete 2 period(.) from below .
5 .TODAY...MOSTLY SUNNY. HIGHS 58 TO 63. LIGHT WINDS IN THE MORNING
6 BECOMING NORTH 10 TO 15 MPH IN THE AFTERNOON.
7 .TONIGHT...MOSTLY CLEAR.... (5 Replies)
Discussion started by: ajayram_arya
5 Replies
LEARN ABOUT NETBSD
ipsecah
ipsecah(7P) Protocols ipsecah(7P)
NAME
ipsecah, AH - IPsec Authentication Header
SYNOPSIS
drv/ipsecah
DESCRIPTION
The ipsecah module (AH) provides strong integrity, authentication, and partial sequence integrity (replay protection) to IP datagrams. AH
protects the parts of the IP datagram that can be predicted by the sender as it will be received by the receiver. For example, the IP TTL
field is not a predictable field, and is not protected by AH.
AH is inserted between the IP header and the transport header. The transport header can be TCP, UDP, ICMP, or another IP header, if tun-
nels are being used. See tun(7M).
AH Device
AH is implemented as a module that is auto-pushed on top of IP. The entry /dev/ipsecah is used for tuning AH with ndd(1M).
Authentication Algorithms
Current authentication algorithms supported include HMAC-MD5 and HMAC-SHA-1. Each authentication algorithm has its own key size and key
format properties. You can obtain a list of authentication algorithms and their properties by using the ipsecalgs(1M) command. You can also
use the functions described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms.
Security Considerations
Without replay protection enabled, AH is vulnerable to replay attacks. AH does not protect against eavesdropping. Data protected with AH
can still be seen by an adversary.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsr |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
ipsecalgs(1M), ipsecconf(1M), ndd(1M), attributes(5), getipsecalgbyname(3NSL), tun(7M), ip(7P), ipsec(7P), ipsecesp(7P)
Kent, S. and Atkinson, R.RFC 2402, IP Authentication Header, The Internet Society, 1998.
SunOS 5.10 20 May2003 ipsecah(7P)