02-13-2013
Thanks for your support. Its just an idea
Can't it be done with and array (like hashing)
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I am brand new to unix and am hoping someone can start me in the right direction.
I want to be able to put the results of a file command such as wc -l filename into a variable which I can then use to test against another variable...i.e. I need to show the nth line of a file, but need to... (3 Replies)
Discussion started by: nmullane
3 Replies
2. UNIX for Dummies Questions & Answers
Dear All,
Need your help.
In my day to day activities I have to validate/search Excel Sheet data (eg.say Application No. 0066782345) data into the Unix environment file whether the same data is present in that file or not.
There are hundreds of records coming in excel file and I am doing grep... (1 Reply)
Discussion started by: ravijunghare
1 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I have a table (e.g.):
a 1 e 4 5 6
b 2 r 4 4 2
c 5 r 3 7 1
d 9 t 4 4 9
.
.
What I need to do is to set the values of some values in column 2 to negative values. For example, the values 2 and 9 should become -2 and -9 in the modified file. How should I go about... (2 Replies)
Discussion started by: pc2001
2 Replies
4. Shell Programming and Scripting
HI all
i have a file consisting of following numbers
0000
0000
0000
0000
0000
1010
0000
0100
0000
0000
0000
1111
0000
1010
0000
0100 (3 Replies)
Discussion started by: vaibhavkorde
3 Replies
5. Shell Programming and Scripting
i have a file in follwing format
0110
1020
1011
1032
1020
2005
2003
1050
i want the output in such a way that all non zero numbers will be converted into 1
like this
0110
1010
1011
1011
1010
1001
1001
1010 (3 Replies)
Discussion started by: vaibhavkorde
3 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I have two, double column data files (file1 and file2). I want to add the second column of file2 to as 3rd column of file1. But, the 3rd column values corresponds to the values of the 2nd column.
example:
file1:
X Y
=========
x1 y2
x3 y4
x2 y4
x5 y3
=========
file2:
Y ... (7 Replies)
Discussion started by: gaurab
7 Replies
7. AIX
I need a script that will raname the following file names that beging with 08078* in unix as follows:
Rename 08078-08201103-H00044-CA.835
as follows:
08078-110820-H000440CA.835
Bascially it will do this:
1) Keep the first 6 positons.
2) Move the yr from the file name to be the... (4 Replies)
Discussion started by: mrn6430
4 Replies
8. Shell Programming and Scripting
Hi,
I am confused how to proceed firther please find the problem below:
Input Files:
DCIA_GEOG_DATA_OCEAN.TXT
DCIA_GEOG_DATA_MCRO.TXT
DCIA_GEOG_DATA_CVAS.TXT
DCIA_GEOG_DATA_MCR.TXT
Output File Name: MMA_RFC_GEOG_NAM_DIM_LOD.txt
Sample Record(DCIA_GEOG_DATA_OCEAN.TXT):(Layout same for... (4 Replies)
Discussion started by: Arun Mishra
4 Replies
9. Shell Programming and Scripting
Hallo Friends,
I need you help. My file has 5000 or so lines and currently looks like below(sample).
Service Type,Origin,Destination,Rate Per Minute,Minimum Charge,Time Based Rate,Time Based From Day,Time Based To Day,Time Based From Time,Time Based To Time,Destination Prefix List,,
VoIS... (3 Replies)
Discussion started by: kekanap
3 Replies
10. Shell Programming and Scripting
Hi,
I have a file about 100 lines. Each line is about 2000 characters (each line is fixed length). In middle of each line is following constant value
0000040029892586
Now, I want to go through each line and increment by 1.
So, line 1 will have 586
line 2 will have 587, line 3 will have... (4 Replies)
Discussion started by: jakSun8
4 Replies
LEARN ABOUT HPUX
encrypt_r
crypt(3C) crypt(3C)
NAME
crypt - generate hashing encryption
SYNOPSIS
Obsolescent Interfaces
DESCRIPTION
crypt():
is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things)
to frustrate use of hardware implementations of a key search.
key is a user's typed password. salt is a two-character string chosen from the set this string is used to perturb the hashing algorithm in
one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a constant string. The returned value points
to the encrypted password. The first two characters are the salt itself.
Obsolescent Interfaces
generate hashing encryption.
WARNINGS
The return value for points to data whose content is overwritten by each call.
and are obsolescent interfaces supported only for compatibility with existing DCE applications. New multithreaded applications should use
SEE ALSO
crypt(1), login(1), passwd(1), getpass(3C), passwd(4), thread_safety(5).
STANDARDS CONFORMANCE
crypt(3C)