05-27-2014
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
2. Shell Programming and Scripting
I want to automatically download a CSV file daily which can be found here:
http://www.londonstockexchange.com/en-gb/pricesnews/prices/coveredwarrants/search.htm
and the link is named "Click to download covered warrants (100Kb)" onthe right hand side.
What commands can I use to invoke clicking... (1 Reply)
Discussion started by: figaro
1 Replies
3. Shell Programming and Scripting
Dear All,
I want to execute a shell script,whlie system is booting.
I was try using /etc/rc.d/rc.local file but its not working. (1 Reply)
Discussion started by: rajamohan
1 Replies
4. Shell Programming and Scripting
hi guys,
I need a shell script to send mail automatically to my personal mail id like xxxx@hotmail.com but while experimenting with "mail" command I faced following problems.
cat text1.txt | mail -s 'test mail' xxxx@hotmail.com
command successfully executed
but while
checking for... (4 Replies)
Discussion started by: rrd1986
4 Replies
5. Shell Programming and Scripting
Hi,
I have this problem of merging 2 shell scripts and run it one after the other. For eg: script A runs to give OutputA. This OutputA should become the input of script B which will run to give OuputB. Now this has to happen automatically i.e, script A and script B should run consecutively one... (1 Reply)
Discussion started by: Vindhyaauri
1 Replies
6. Shell Programming and Scripting
I am trying to write a shell script which will use a text file as an argument to produce pgp encryted file.
Shell script name: encryptext.sh
This is the code of encryptext.sh
#!/usb/bin/ksh
file=$1
cd /home/project/source
gpg --verbose --armour --encrypt --recipient "IMS_L2" --output... (2 Replies)
Discussion started by: shanbalao
2 Replies
7. Shell Programming and Scripting
Hi,
Please help me,its urgent.
I have a tool that i want to run from a shell script. When we run the tool it will ask the user choice to add or delete. When user enter the choice it will then ask how many units he want to delete or add and will add or delete accordingly.
Now I want to... (1 Reply)
Discussion started by: saket18@ymail.c
1 Replies
8. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
9. Shell Programming and Scripting
Hi All,
I need a favour.
I have a file called "redhat_servers.txt" containing some server names line by line.
When I try to ssh to each server, and I have already done with ssh key-gen stuff. Now, for first time if I do ssh .. I need to type yes I have more than 400 servers...it will take... (4 Replies)
Discussion started by: kumar85shiv
4 Replies
LEARN ABOUT DEBIAN
clmmeet
clm meet(1) USER COMMANDS clm meet(1)
NAME
clm meet - compute the intersection of a set of clusterings.
clmmeet is not in actual fact a program. This manual page documents the behaviour and options of the clm program when invoked in mode meet.
The options -h, --apropos, --version, -set, --nop are accessible in all clm modes. They are described in the clm manual page.
SYNOPSIS
clm meet [-o fname (output file name)] [-h (print synopsis, exit)] [--apropos (print synopsis, exit)] [--version (print version, exit)]
<file name>+
DESCRIPTION
clm meet computes the intersection of a set of clusterings, that is, the largest clustering that is a subclustering of all the clusterings
in the set. It stores the intersection (or meet) in the argument to the -o flag, which must be the first option given. All remaining argu-
ments are interpreted as names of files containing clusterings in mcl format (see mcxio(5)), which must all pertain to a set of the same
cardinality.
This utility can be useful in measuring (in conjunction with clm dist) the consistency of a set of clusterings at different levels of granu-
larity - if the meet of all those clusterings is close to being a subclustering of each of them, consistency is good. See clm dist for an
example.
OPTIONS
-o fname (output file name)
AUTHOR
Stijn van Dongen.
SEE ALSO
mclfamily(7) for an overview of all the documentation and the utilities in the mcl family.
clm meet 12-068 8 Mar 2012 clm meet(1)