05-11-2013
It would help if you tell what file systems are used on the source and destination machines, what Unix OS is used, and what method you plan to use to perform the copy.
In any case, "du" is the wrong tool to check the proper copy.
If you really want to make sure all the files are copied without any corruption, create a hash/checksum of every file on the source side and use it to check it is correct on the destination one for each file.
You would also need to make sure all (empty) directories are created and possibly decide what to do with files taht are neither plain files nor directories.
Finally, you might also want to check the permissions, owner/group, extended attributes and ACLs if any.
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
How do I send a file as an attachment (gzip file) on a Unix system ? Using sendmail.
Please help me.
:confused: (3 Replies)
Discussion started by: lacca
3 Replies
2. UNIX for Dummies Questions & Answers
Hi friends,
In my case, there are serveral PCs running Linux in a LAN.
I would like to to mount the directory /A_river of machine-A to the file system of another machine machine-B so that I can access files in that directory.
I do not know how to do this. The situation is complicated by... (2 Replies)
Discussion started by: cy163
2 Replies
3. Programming
Before i start doing something, I wanted to know whether the approach to compare XML file with UNIX file system structure. I have a pre-configured file(contains a list of paths to executables) and i need to check against the UNIX directory structure. what are the various approches should i use ? I... (6 Replies)
Discussion started by: shafi2all
6 Replies
4. SCO
After System power get failed
File system is not getting mounted in read- write mode (1 Reply)
Discussion started by: gtkpmbpl
1 Replies
5. Programming
I have a basic knowledge of the various structures like file, dentry, inode, superblocks of linux virtual file systems.
I want to get a more deep insight as to how these structures are utilized in reality. I mean I want to get an understanding of how and where these structure come up in picture... (4 Replies)
Discussion started by: rupeshkp728
4 Replies
6. Infrastructure Monitoring
hi 2 all
i installed nagios in my linux srvr . check_ftp file is in format of system format .
i wants to see the syntax for that script
how can i read that file .. ???
please help me ! (4 Replies)
Discussion started by: ponmuthu
4 Replies
7. Shell Programming and Scripting
Hi, One of the customer wants to receive the file with name //CEC821.K003GUK.DOMD(+1) on their linux system. I am using Java application to send the file to remote system, but I am not able to send the file with that name ane even i am not able to create the file with that name on linux system.
... (6 Replies)
Discussion started by: Satyak
6 Replies
8. HP-UX
Hi all
I wonder if its possible to mount on a hp-ux server a file system that was previously mounted on a solaris 10 server. The LUN is on NetApp stoarge.
The problem on hp-ux I cannot do pvcreate on the lun (disk) because contains data.
Any help will be appreciated
FR (2 Replies)
Discussion started by: fretagi
2 Replies
LEARN ABOUT DEBIAN
installit
INSTALLIT(1) General Commands Manual INSTALLIT(1)
NAME
installit - file/directory installation tool
SYNOPSIS
installit [ -o owner ] [ -g group ] [ -O owner ] [ -G group ] [ -m mode ] [ -b backup ] [ -s ] [ -t ] source destination
DESCRIPTION
Installit puts a copy of source into the specified destination.
If source is a period, then destination is taken to be the name of a directory that should be created. Otherwise, source is taken to name
an existing file and destination may be either a file or directory; it is interpreted according to the same rules as cp(1).
Installit uses no special privileges to copy files from one place to another.
OPTIONS
-b If destination names a pre-existing file, it will be removed before the copy is done. To make a backup copy, use the ``-b'' flag;
the existing file will be renamed to have the specified extension. If source and destination are the same string, or if the two
files are identical, then no copying is done, and only the ``-o'', ``-g'', ``-m'', and ``-s'' flags (see below) are processed. In
this case, the modification time on the destination will be updated using touch(1).
-n Do not update the modification time on the destination.
-o -g -m
Once the destination has been created, it is possible to set the owner, group, and mode that it should have. This is done by using
the ``-o'', ``-g'', and ``-m'' flags, respectively.
-O -G The ``-O'' and ``-G'' flags set the owner and group only if installit is being run by root, as determined by whoami(1).
-s To strip(1) an installed executable, use the ``-s'' flag.
BUGS AND LIMITATIONS
Flags cannot be combined.
The chown(8) command must exist in either the /etc or /usr/etc directory or the user's PATH.
The whoami command must exist in the /usr/ucb directory or the user's PATH.
HISTORY
Written by Rich $alz <rsalz@uunet.uu.net> for InterNetNews. This is revision 1.9, dated 1996/10/29.
INSTALLIT(1)