03-15-2013
Permissions on server2 are mostly independent from whatever method you used to transfer the files.
There are several factors that could affect the access: ACLs, umasks, user configuration, groups, sticky bits, GUIDs, mountpoint options, etc.
Maybe if you tell us more details on the exact issue you're having we could provide better suggestions.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
hi all
i have a view in the database with columns
prod_no,prod_nm, prod_code
using a shell script i should query this view and dump the data in a delimited flat file and send to another ftp server....
i also have to schedule this periodically using cron tab.
can you... (2 Replies)
Discussion started by: rajesh_tns
2 Replies
2. Shell Programming and Scripting
#!/usr/bin/ksh
Archive_Dir='/apps/SrcFiles/MTCHG_GFTS/BRGR/Archive'
Source_Dir='/apps/SrcFiles/MTCHG_GFTS/BRGR'
cd $Source_Dir
HOST='xyz.abc.com'
USER='abcOUT'
PSW='xyzOUT'
file="Request*.pgp"
for i in 1 2 3 4 5 6
do
sftp $USER@$HOST <<END_SCRIPT
$PSW
bin
if ] ; then
... (3 Replies)
Discussion started by: alfredo123
3 Replies
3. Shell Programming and Scripting
Given the scenario like this, if at all if have to use IFS on the below given example, how it should be used.
IFS=/
eg:
/xyz/123/348/file1
I want to use the last slash /file1 . So can anyone, suggest me how to pick the last "/" as a IFS. (4 Replies)
Discussion started by: raghunsi
4 Replies
4. Shell Programming and Scripting
hi all,
i have to schedule an email containing the information about some orphan connections existing on the server depending upon the system date. the format of the info to be sent in email is :
Process id username servername time when connection... (0 Replies)
Discussion started by: Priyanka S
0 Replies
5. Shell Programming and Scripting
hi,
i am having three files which is having following data
file1:
field1 field2 field3
1 A B
2 C D
3 E F
file2:
4 G H
1 I J
5 K L
file3:
4 M N (3 Replies)
Discussion started by: angel12345
3 Replies
6. Shell Programming and Scripting
Hi,
My input file contains
1,2
2,4
3,6
4,9
9,10
My expected output is
1,10
2,10
3,6
4,1
9,10 (6 Replies)
Discussion started by: pandeesh
6 Replies
7. Emergency UNIX and Linux Support
Hi,
my file has the data like below:
11,231,ABCVAV
22,AAHJHAj22,hdsjkhdls
22,dhskjhdkshd
22,gdgkdkadh
11,232,dgsjgdjh
22,ghdskahdkja
22,shdkajshs
11,233,ddjs
22,dhjkahkd
22,hsajhaah
11,231,sjkjsjj
22,ahkh
22,hsakh
From the above i need only the records which starts as 11,231... (5 Replies)
Discussion started by: pandeesh
5 Replies
8. Shell Programming and Scripting
Hello Folks
I am looking for logic help for below scenerio with respect to AIX n unix script
1) We need to get the date of all the saturday in yr
2) L_o left over days is weeks left over days for previous month for eg.
first sat of feb is 4th of feb in that week we have 29 - 30 - 31 from Jan... (2 Replies)
Discussion started by: joshiamit
2 Replies
9. Shell Programming and Scripting
Hi Gurus
the below FTP code works fine, but the issue is from past 1 week couldn't able to send the files to external system.
#--------------------------------------------------------------------#
#Start the ftp session
#--------------------------------------------------------------------#... (3 Replies)
Discussion started by: SeenuGuddu
3 Replies
10. Cybersecurity
Hi, I am learning IPTables have this question.
My server is behind a firewall that does a PAT & NAT to the LAN address.
Internet IP: 68.1.1.23
Port: 10022
Server LAN IP: 10.1.1.23
port: 22
Allowed Internet IPs: 131.1.1.23, 132.1.1.23
I want to allow a set of IPs are to be able to... (1 Reply)
Discussion started by: capri_guy84
1 Replies
send(n) Tk Built-In Commands send(n)
__________________________________________________________________________________________________________________________________________________
NAME
send - Execute a command in a different application
SYNOPSIS
send ?options? app cmd ?arg arg ...?
_________________________________________________________________
DESCRIPTION
This command arranges for cmd (and args) to be executed in the application named by app. It returns the result or error from that command
execution. App may be the name of any application whose main window is on the display containing the sender's main window; it need not be
within the same process. If no arg arguments are present, then the command to be executed is contained entirely within the cmd argument.
If one or more args are present, they are concatenated to form the command to be executed, just as for the eval command.
If the initial arguments of the command begin with ``-'' they are treated as options. The following options are currently defined:
-async Requests asynchronous invocation. In this case the send command will complete immediately without waiting for cmd to complete in
the target application; no result will be available and errors in the sent command will be ignored. If the target application is
in the same process as the sending application then the -async option is ignored.
-displayof pathName
Specifies that the target application's main window is on the display of the window given by pathName, instead of the display con-
taining the application's main window.
-- Serves no purpose except to terminate the list of options. This option is needed only if app could contain a leading ``-'' charac-
ter.
APPLICATION NAMES
The name of an application is set initially from the name of the program or script that created the application. You can query and change
the name of an application with the tk appname command.
DISABLING SENDS
If the send command is removed from an application (e.g. with the command rename send {}) then the application will not respond to incom-
ing send requests anymore, nor will it be able to issue outgoing requests. Communication can be reenabled by invoking the tk appname com-
mand.
SECURITY
The send command is potentially a serious security loophole. On Unix, any application that can connect to your X server can send scripts to
your applications. These incoming scripts can use Tcl to read and write your files and invoke subprocesses under your name. Host-based
access control such as that provided by xhost is particularly insecure, since it allows anyone with an account on particular hosts to con-
nect to your server, and if disabled it allows anyone anywhere to connect to your server. In order to provide at least a small amount of
security, Tk checks the access control being used by the server and rejects incoming sends unless (a) xhost-style access control is enabled
(i.e. only certain hosts can establish connections) and (b) the list of enabled hosts is empty. This means that applications cannot con-
nect to your server unless they use some other form of authorization such as that provide by xauth. Under Windows, send is currently dis- |
abled. Most of the functionality is provided by the dde command instead.
KEYWORDS
application, dde, name, remote execution, security, send |
Tk 4.0 send(n)