12-19-2013
leaves you using -C option of vi... or learn to use crypt
You would have to write a new script that decrypt the encrypted script for it to be executed...
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am new to UNIX , Can any one let me know how to execute shell script (i.e which command I have to use for the same).
Any help would be appreciated.
Thanks
siva
mymvs999@yahoo.com (3 Replies)
Discussion started by: siva
3 Replies
2. Solaris
Hi.
I want to execute a script when it's encrypted with "crypt".
I tried with "sh <script_crypted>", but it's incorrect because the commands into "script" can not be executed because they are encrypted.
:confused: (1 Reply)
Discussion started by: hilsie
1 Replies
3. UNIX for Dummies Questions & Answers
Hi all,
I am begginer of UNIX . I dont know if i have a script written in korn shell with .ksh extention . If i want to execute that how can i do that? Can anybody suggest the best book to learn korn shell scripting.
Thanks
sam71 (1 Reply)
Discussion started by: sam71
1 Replies
4. Shell Programming and Scripting
HI,
bash-2.05# more mysqlstoporaclestart.sh
#!/bin/sh
mysqladmin -u root -pengineer shutdown
su - oracle -c "bash /export/home/oracle/oracle.sh"
bash-2.05# more /export/home/oracle/oracle.sh
/oracle/bin/sqlplus "/as sysdba"<< EOF
startup nomount... (2 Replies)
Discussion started by: prakash.gr
2 Replies
5. Shell Programming and Scripting
Hi all,
I am beginner in UNIX...I want to use unix shell script to create text.file...I know how to use using by command...can anybody tell me for the script?
Thanks
i changed the threads title from "tex file" to "text file", because "tex" would probably be misunderstood as reference to... (4 Replies)
Discussion started by: mastercar
4 Replies
6. Shell Programming and Scripting
i want use ssh on the host01 to execute autoexec.sh on the host02 like following :
host01> ssh host02 autoexec.sh
autoexec.sh include nohup command like follwing :
nohup /home/jack/deletedata.sh &
after i execute ssh host02 autoexec.sh one the host01. i can't found deletedata.sh... (1 Reply)
Discussion started by: orablue
1 Replies
7. UNIX for Dummies Questions & Answers
Hi all,
As i want to know how the shell command "nohup" worked.I logged in as the user named vincent through Gnome.Then i press ctrl+atl+F1 changed into a console and logged in as another user named kinsley.The user "kinsley" is added by me with "useradd",and now there's no HOME directory for... (6 Replies)
Discussion started by: homeboy
6 Replies
8. Shell Programming and Scripting
Can anyone help me with a dos batch script to execute a shell script residing in an unix server. I am not able to use ssh.
Thanks in advance (2 Replies)
Discussion started by: Shri123
2 Replies
9. Shell Programming and Scripting
Hello Everyone,
How do we run vi/vim encrypted shell script without decryption on multiple servers. It is a simple bash script and vim -nx <filename> has been used to encrypt with desired password. Now I have few errors, the syntax is absolutely fine as I have run that script multiple times on... (0 Replies)
Discussion started by: lovesaikrishna
0 Replies
10. Shell Programming and Scripting
Hi team,
My requirement is to transfer pdf files from windows machine to unix server and then from that unix server we should sftp to another server.
I have completed the first part i.e From windows to using to unix server with the help of psftp.exe
code:
psftp user@host -pw password <... (1 Reply)
Discussion started by: bhupeshchavan
1 Replies
crypt(1) General Commands Manual crypt(1)
Name
crypt - encode/decode (available only if the Encryption layered product is installed)
Syntax
crypt key < input.File > output.File
Description
This reference page describes software that is available only if the Encryption layered product is installed.
The command reads from the standard input and writes on the standard output. You must supply a key which selects a particular transforma-
tion. If no password is given, demands a key from the terminal and turns off printing while the key is being typed in. The command
encrypts and decrypts with the same key.
Files encrypted by are compatible with those treated by the ed, ex and vi editors in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve, direct search of the key space must
be infeasible, and sneak paths by which keys or clear text can become visible must be minimized.
The command implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack
on such machines are known, but not widely; moreover the amount of work required is likely to be large.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, for example, to take a sub-
stantial fraction of a second to compute. However, if keys are restricted to three lowercase letters, then encrypted files can be read by
expending only a substantial fraction of five minutes of machine time.
Since the key you choose is an argument to the command, it is potentially visible to users executing ps(1) or a derivative. To minimize
this possibility, destroys any record of the key immediately upon entry. The most vulnerable aspect of is the choice of keys and key secu-
rity.
Examples
The following examples use KEY as the key to encrypt and decrypt files. The first example encrypts the file naming the resulting encrypted
file The second example decrypts the file naming the resulting decrypted file The third example prints the encrypted file in clear text.
crypt KEY < plain.File > crypt.File
crypt KEY < crypt.File > decrypt.File
crypt KEY < crypt.File | pr
Files
for typed key
See Also
ed(1), ex(1), vi(1), xsend(1), crypt(3), makekey(8)
crypt(1)