05-08-2013
This is not the correct forum for homework exercises.
9 More Discussions You Might Find Interesting
1. IP Networking
I've got a strange problem with a single mail sender (it is one of
those large free mail providers). My mail server works well with
thousands of senders but not this one, so we have made a connection
dump and it seems that the three way handshake is not completed
15:55:59.177431 IP... (0 Replies)
Discussion started by: 3wayTrouble
0 Replies
2. Shell Programming and Scripting
On Solaris & AIX, suppose there is a directory 'dir'.
Log files of size approx 1MB are continuously being
deposited here by scp command. I have a script that scans
this dir every 5 mins and moves away the log files that
have been deposited so far.
How do I design my script so that I pick up... (6 Replies)
Discussion started by: sentak
6 Replies
3. Solaris
On Solaris, suppose there is a directory 'dir'.
Log files of size approx 1MB are continuously being
deposited here by scp command. I have a script that scans
this dir every 5 mins and moves away the log files that
have been deposited so far.
How do I design my script so that I pick up *only*... (6 Replies)
Discussion started by: sentak
6 Replies
4. Shell Programming and Scripting
How do I find through script if a contains "incomplete last line".
If it does then only insert a new line character as::
echo "" >> filename.txt (4 Replies)
Discussion started by: PRKS
4 Replies
5. Shell Programming and Scripting
#!/bin/bash
DIR=/dir/$(date +%y%m)
|| mkdir "$DIR"
for D in $@ # obtem os argumentos
do
cp /usr/home/backup
if backup=null then
mkdir backup
done
How can I complete that script, that's not value, can someone help me complete this...
The point of the program is:
- If the... (1 Reply)
Discussion started by: strshel
1 Replies
6. Shell Programming and Scripting
I need help with appending the last line to the file only if the last line is incomplete.
I tried awk 1 filename > new_filename but it appends to every file and I only want to append to the file if the last line is incomplete (3 Replies)
Discussion started by: smee
3 Replies
7. UNIX for Dummies Questions & Answers
I am logged into AIX 6.1 as a root user. I tried copying about 190GB of data to a different folder.
cp -R /u01/data/scope /CY/backup
I got the message:
cp: Requested a write of 4096 bytes, but wrote only 3584.
When the copy operation completed, I checked the /CY/backup/scope folder and... (3 Replies)
Discussion started by: shoefiend
3 Replies
8. Shell Programming and Scripting
Hi folks,
I am scraping data from the Internet that has the format similar to what's on this page -- Trigger Notice Report
The code I've written for scraping and storing results works fine when the HTML code is well written, but not when there are mistakes. In particular, the code breaks when... (4 Replies)
Discussion started by: ksk
4 Replies
9. UNIX for Dummies Questions & Answers
Hi all,
Please help with the following example.
I want to keep all people in the data, who at least have Firstname or Lastname or both and at least 1 row of Details. So, Person4 lacking both Firstname and Lastname will be deleted, Person5 with no Details will be deleted.
Firstname,Lastname... (3 Replies)
Discussion started by: ritakadm
3 Replies
LEARN ABOUT DEBIAN
creepy
CREEPY(1) General Commands Manual CREEPY(1)
NAME
CREEPY - A geolocation information aggregator
DESCRIPTION
creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image
hosting services. The information is presented in a map inside the application where all the retrieved data is shown accompanied with rele-
vant information (i.e. what was posted from that specific location) to provide context to the presentation.
FEATURES
Map providers available :
Google Maps - Virtual Maps - Open Street Maps
Location information retieval from :
Twitter's tweet location:
Coordinates when tweet was posted from mobile device.
Place (geographical name) derived from users ip when posting on twitter's web interface. Place gets translated into coordinates
using geonames.com"
Bounding Box derived from users ip when posting on twitter's web interface.The less accurate source , a corner of the bounding box
is selected randomly.
Geolocation information accessible through image hosting services API
EXIF tags from the photos posted.
Social networking platforms currently supported:
Twitter
Foursquare (only checkins that are posted to twitter).
Image hosting services currently supported :
flickr - information retrieved from API
twitpic.com - information retrieved from API and photo exif tags
yfrog.com - information retrieved from photo exif tags
img.ly - information retrieved from photo exif tags
plixi.com - information retrieved from photo exif tags
twitrpix.com - information retrieved from photo exif tags
foleext.com - information retrieved from photo exif tags
shozu.com - information retrieved from photo exif tags
pickhur.com - information retrieved from photo exif tags
moby.to - information retrieved from API and photo exif tags
twitsnaps.com - information retrieved from photo exif tags
twitgoo.com - information retrieved from photo exif tags
NOTES
Automatic caching of retrieved information in order to reduce API calls and the possibility of hitting limit rates.
GUI with navigable map for better overview of the accumulated information
4 Maps providers (including Google Maps) to use.
Open locations in Google Maps in your browser
Export retrieved locations list as kmz (for Google Earth) or csv files.
Handling twitter authentication in an easy way using oAuth. User credentials are not shared with the application.
User/target search for twitter and flickr.
AUTHOR
creepy was written by Yiannis Kakavas <jkakavas@gmail.com>
This manual page was written by Daniel Echeverry for the Debian GNU/Linux system (but may be used by others).
SEE ALSO
The full documentation which includes the keys descriptions is in /usr/share/doc/creepy/README.
MAY 08, 2011 CREEPY(1)