11-02-2012
That's why it is good to get use to use YYYYMMDD_HHMMSS notation so that they get ordered by name naturally
This User Gave Thanks to ctsgnb For This Post:
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All,
I want to find a specific pattern from approximately 400000 files on solaris platform. Its very heavy for me to grep that pattern to each file individually.
Can anybody suggest me some way to search for specific pattern (alpha numeric) from these forty thousand files. Please note that... (6 Replies)
Discussion started by: aarora_98
6 Replies
2. Shell Programming and Scripting
Hi,
I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern.
Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies
3. Shell Programming and Scripting
Hi Gurus,
I have a directory A, which has some 0 byte files in it.
This directory also has a subdirectory B which also has some 0 byte files in it.
The problem:
I only need to find out the names of the 0 byte files in the directory A.
I'm using the following command
find . -name *.zip... (6 Replies)
Discussion started by: ramky79
6 Replies
4. Shell Programming and Scripting
Hi,
I have a very urgent requirement here. I have to find all files in the specified directory but not in the sub directories(The directory name is stored in a variable) which are older than the current date as well as current time and rename it as filename_yyyymmddhhmmss.ext and move it into a... (7 Replies)
Discussion started by: ragavhere
7 Replies
5. Shell Programming and Scripting
Hi All
I was wondering what is the most efficient way to find files in the current directory(that may contain 100,000's files), that meets a certain specified file type and of a certain age.
I have experimented with the find command in unix but it also searches all sub directories. I have... (2 Replies)
Discussion started by: kewong007
2 Replies
6. Red Hat
Hello,
Please help me with this!! Thanks in advance!!
I have a file named file.gc with the content:
1-- Mon Sep 10 08:53:09 CDT 2012
2revoke connect from FR2261;
3delete from mkt_allow where grantee = 'FR2261';
4grant connect to FR2261 with '******';
5alter user FR2261 comment... (0 Replies)
Discussion started by: raosr020
0 Replies
7. Shell Programming and Scripting
I have unix file like below
>newuser
newuser
<hello
hello
newone
I want to find the unique values in the file(excluding <,>),so that the out put should be
>newuser
<hello
newone
can any body tell me what is command to get this new file. (7 Replies)
Discussion started by: shiva2985
7 Replies
8. Shell Programming and Scripting
I need assistance with following requirement, I am new to Unix.
I want to do the following task but stuck with file creation date(sysdate)
Following is the requirement
I need to create a script that will read the abc/xyz/klm folder and look for *.err files for that day’s date and then send an... (4 Replies)
Discussion started by: PreetArul
4 Replies
9. Shell Programming and Scripting
Hi
This is my first post and I'm just a beginner. So please be nice to me.
I have a couple of html files where a pattern beginning with "http://www.site.com" and ending with "/resource.dat" is present on every 241st line. How do I extract this to a new text file?
I have tried sed -n 241,241p... (13 Replies)
Discussion started by: dejavo
13 Replies
LEARN ABOUT HPUX
inet_makead
inet(3N) inet(3N)
NAME
inet: inet_addr(), inet_lnaof(), inet_makeaddr(), inet_netof(), inet_network(), inet_ntoa(), inet_ntoa_r() - Internet address manipulation
routines
SYNOPSIS
Remarks
The routine is described in the section below.
DESCRIPTION
Interpret character strings representing numbers
expressed in the Internet standard "dot" notation.
returns numbers suitable for use as Internet addresses.
returns numbers suitable for use as Internet network numbers.
Return values can be assigned to a (defined in by using a technique similar to the following:
Take an Internet address and return an
ASCII string representing the address in dot notation.
Take an Internet network number and a local network address
and construct an Internet address from it.
Break apart Internet host addresses,
returning the network number part.
Break apart Internet host addresses,
returning the local network address part.
All Internet addresses are returned in network order (bytes ordered from left to right). All network numbers and local address parts are
returned as machine-format integer values. Bytes in HP-UX systems are ordered from left to right.
Internet Addresses
Values specified using dot notation take one of the following forms:
When four parts are specified, each is interpreted as a byte of data and assigned, from left to right, to the four bytes of an Internet
address.
When a three-part address is specified, the last part is interpreted as a 16-bit quantity and placed in the right-most two bytes of the
network address. This makes the three-part address format convenient for specifying Class B network addresses, as in
When a two-part address is supplied, the last part is interpreted as a 24-bit quantity and placed in the right-most three bytes of the net-
work address. This makes the two-part address format convenient for specifying Class A network addresses as in
When only one part is given, the value is stored directly in the network address without any byte rearrangement.
All numbers supplied as parts in dot notation can be decimal, octal, or hexadecimal, as specified in the C language (i.e., a leading 0x or
0X implies hexadecimal; a leading 0 implies octal; otherwise, the number is interpreted as decimal).
In a multithreaded application, uses thread-specific storage that is re-used in each call. The return value, the character string, should
be unique for each thread and should be saved, if desired, before the thread makes the next call.
Obsolescent Interfaces
The following reentrant interface has been moved from to
It is included to support existing applications and may be removed in a future release. New multithreaded applications should use the reg-
ular API (those without the suffix.)
The reentrant interface functions the same as the regular interface without the suffix. However, expects to be passed the address of a
character buffer and will store the result at the supplied location. If the buffer is of insufficient length, is returned. If the opera-
tion is successful, the length of the result string (not including the terminating null character) is returned.
RETURN VALUE
The routines return values as described in the section. and return for malformed requests.
WARNINGS
The return value from the function cannot distinguish between a failure (and a local broadcast address (255.255.255.255). This can be han-
dled by using the function instead of the function.
AUTHOR
The routines were developed by the University of California, Berkeley.
SEE ALSO
gethostent(3N), getnetent(3N), inet6(3N), hosts(4), networks(4), thread_safety(5).
inet(3N)