10-13-2014
Thank you very much!! It's the easiest solution from those posted here, anyway thanks to everyone for answering and posting your solutions.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi , Whats the limit of characters PER LINE in a unix file , allowed for editing..sort , cut , sed , awk etc (5 Replies)
Discussion started by: mohapatra
5 Replies
2. AIX
Hi,
I'm using AIX version 5.3 currently. I'm trying to create a user id, e.g. andyleong, which the system prompted the length is too long.
1. I would like to know is that the length of user id is limited to maximum 8 characters for AIX.
2. Is it apply to all versions of AIX?
If no... (2 Replies)
Discussion started by: meihua_t
2 Replies
3. UNIX for Dummies Questions & Answers
Hi
Hi! I'm currently using AIX 5.2 and would like to know where can i find to see that there's a restriction on the number of login times a user can have. Example, I want give a 2 login per user but some one to give 3 login and some one have to give unlit login time (without logging off the... (2 Replies)
Discussion started by: herath
2 Replies
4. Solaris
Is there a way that I can limit number of commands that one user can run during period of time. For example Max 10 commands per senconds.:) (3 Replies)
Discussion started by: winger0608
3 Replies
5. HP-UX
Hello everyone.
I am trying to set up a monitor based on a "top" command statistic as follows:
top -bc -n1 > output.txt
I've put this command into a small script which is called by a cron... but there is something strange happening: the cron is limiting the output to output.txt to 80... (3 Replies)
Discussion started by: MartinF
3 Replies
6. Shell Programming and Scripting
In the vi editor, there seems to be some limit on the number of characters could be allowed in single line. I tried a line with characters up to 1880. It worked. But when i tried with something of 5000 characters, it doesnt work. Any suggestions.
Thanks in advance! (2 Replies)
Discussion started by: nram_krishna@ya
2 Replies
7. UNIX for Dummies Questions & Answers
I have a script that outputs the weather on two lines.
If possibly I would like to set a character limit on them
Currently it outputs something like
but I would like to limit the lines so appends an ellipsis if nescessary:
This is the script
#! /bin/bash
curl -s --connect-timeout... (2 Replies)
Discussion started by: Light_
2 Replies
8. UNIX for Dummies Questions & Answers
Hey guys and gals,
Working on a script to limit the reoccurrance of characters in a line.
sed "/\(.\).*\1/d" -i file.txt
sed "/\(.\).*\1.*\1/d" -i file.txt
sed "/\(.\).*\1.*\1.*1/d" -i file.txt
..
To limit character reoccurance with 1x, 2x, 3x etc.
However I would like to be able to... (2 Replies)
Discussion started by: TAPE
2 Replies
9. UNIX for Dummies Questions & Answers
hi guys
how can i limit number of files in a disk or partition ?
or how can i make a limit to inode number for a disk or partition ?
ext3 or ext4 file system (1 Reply)
Discussion started by: mhs
1 Replies
10. Shell Programming and Scripting
I want count number of characters / find the length of the 'wc -l' output
This is the command
bash-3.2$ gzcat /home/sid/file1.dat |wc -l
830752
So final out I want is 6 i.e lenght of 830752
I tried with awk
bash-3.2$ gzcat /home/sid/file1.dat |wc -l | awk '{print length ($0)... (3 Replies)
Discussion started by: sidnow
3 Replies
LEARN ABOUT DEBIAN
creepy
CREEPY(1) General Commands Manual CREEPY(1)
NAME
CREEPY - A geolocation information aggregator
DESCRIPTION
creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image
hosting services. The information is presented in a map inside the application where all the retrieved data is shown accompanied with rele-
vant information (i.e. what was posted from that specific location) to provide context to the presentation.
FEATURES
Map providers available :
Google Maps - Virtual Maps - Open Street Maps
Location information retieval from :
Twitter's tweet location:
Coordinates when tweet was posted from mobile device.
Place (geographical name) derived from users ip when posting on twitter's web interface. Place gets translated into coordinates
using geonames.com"
Bounding Box derived from users ip when posting on twitter's web interface.The less accurate source , a corner of the bounding box
is selected randomly.
Geolocation information accessible through image hosting services API
EXIF tags from the photos posted.
Social networking platforms currently supported:
Twitter
Foursquare (only checkins that are posted to twitter).
Image hosting services currently supported :
flickr - information retrieved from API
twitpic.com - information retrieved from API and photo exif tags
yfrog.com - information retrieved from photo exif tags
img.ly - information retrieved from photo exif tags
plixi.com - information retrieved from photo exif tags
twitrpix.com - information retrieved from photo exif tags
foleext.com - information retrieved from photo exif tags
shozu.com - information retrieved from photo exif tags
pickhur.com - information retrieved from photo exif tags
moby.to - information retrieved from API and photo exif tags
twitsnaps.com - information retrieved from photo exif tags
twitgoo.com - information retrieved from photo exif tags
NOTES
Automatic caching of retrieved information in order to reduce API calls and the possibility of hitting limit rates.
GUI with navigable map for better overview of the accumulated information
4 Maps providers (including Google Maps) to use.
Open locations in Google Maps in your browser
Export retrieved locations list as kmz (for Google Earth) or csv files.
Handling twitter authentication in an easy way using oAuth. User credentials are not shared with the application.
User/target search for twitter and flickr.
AUTHOR
creepy was written by Yiannis Kakavas <jkakavas@gmail.com>
This manual page was written by Daniel Echeverry for the Debian GNU/Linux system (but may be used by others).
SEE ALSO
The full documentation which includes the keys descriptions is in /usr/share/doc/creepy/README.
MAY 08, 2011 CREEPY(1)