04-23-2015
Not any good ones. All other options involve installing third-party utilities and opening up massive security holes.
Why can't you use keys? That's what they're there for.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
The Setup is like this. I'm connecting to Unix machine from my local machine. After connecting to Unix M/c, i need to connect FTP server. Am successful in connecting to FTP server, but am not able to download the file from the ftp server to my local machine. I have different user id's and... (1 Reply)
Discussion started by: ranjith_taurean
1 Replies
2. Shell Programming and Scripting
Hi,
I want to copy all the logs except current date logs from one server to another server every day, so i want to write a script for it and put it in crontab.
Can anyone help how to write the script.
Regards,
Srini (1 Reply)
Discussion started by: srinivasvandana
1 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I have this problem where sometimes my files would go missing when I schedule my crontab to run the SCP command to get file from the SFTP server.
My crontab will run the scripts at an interval of 3 minutes (between the two scripts) The following is the setting in my crontab.
... (1 Reply)
Discussion started by: gingervitus
1 Replies
4. Shell Programming and Scripting
hi
I tried reading some of the threads w.r.t scp/sftp file to another server in the same network without asking for password while copying files.....but couldnot succeed.
i have generated the public key for the system using "ssh-keygen -t " and kept it in the
.ssh/authorized_keys file.
... (8 Replies)
Discussion started by: aemunathan
8 Replies
5. Shell Programming and Scripting
Hi, I need a sample of a script that will check a specific directory multiple times throughout the day, and scp the newest file to another server.
Example: current file is misc_file.txt_02272011 (the last part is the date), once that has been secure copied, another one may come in later the... (1 Reply)
Discussion started by: richasmi
1 Replies
6. Solaris
Hello forum, I’m trying to get someone else’s log rotation & sync script working. The ksh script is sending daily compressed log files to a Windows RSA envision server. The name of the directory is
“CA SITEMINDER_<IP address of the sending server>”. The servers we are sending from are a mix of... (3 Replies)
Discussion started by: TKD
3 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I want to use scp to upload file to my unix server.
i am using this:
scp D:\testr.txt unixuser@unixhost:/path
it returns an error:
ssh: D: host/servname not known
i am not sure how to tell path of my D drive in the command and how will command understand it has to pick from my... (5 Replies)
Discussion started by: Kohli
5 Replies
8. UNIX for Dummies Questions & Answers
Hello,
Please assist me in using screen command in AIX to scp file to other server
Best regards,
Vishal (10 Replies)
Discussion started by: Vishal_dba
10 Replies
9. Shell Programming and Scripting
Can someone help in writing some script through which I can transfer file (scp) from root user in abc server to crt user in hfg server and can give the crt user password in script itself so that it doesn't prompt me every time for password (4 Replies)
Discussion started by: Moon1234
4 Replies
10. UNIX for Beginners Questions & Answers
Hi All,
Need some help regarding file transfer between server.
Suppose we have system-A and system-B. To transfer file from system-A to system-B we usually share the
public keys of system-A to system-B and do scp/sftp to transfer a file.
Is it possible that public key of system-B can be... (3 Replies)
Discussion started by: abhi_123
3 Replies
dbm(3C) dbm(3C)
NAME
dbminit, fetch, store, delete, firstkey, nextkey, dbmclose - database subroutines
SYNOPSIS
DESCRIPTION
These functions maintain key/content pairs in a database. They handle very large (a billion blocks (block = 1024 bytes)) databases and can
locate a keyed item in one or two file system accesses.
key and content parameters are described by the type. A specifies a string of dsize bytes pointed to by dptr. Arbitrary binary data, as
well as normal ASCII strings, are allowed. The database is stored in two files. One file is a directory containing a bit map of keys and
has as its suffix. The second file contains all data and has as its suffix.
Before a database can be accessed, it must be opened by At the time of this call, the files and must exist. (An empty database is created
by creating zero-length and files.)
Once open, data stored under a key is accessed by and data is placed under a key by Storing data on an existing key replaces the existing
data. A key (and its associated contents) is deleted by A linear pass through all keys in a database can be made, in (apparently) random
order by using and returns the first key in the database. With any key, returns the next key in the database. The following code can be
used to traverse the database:
A database can be closed by calling A currently open database must be closed before opening a new one.
DIAGNOSTICS
All functions that return an indicate errors with negative values and success with zero. Functions that return a indicate errors with a
null dptr.
WARNINGS
The dbm functions provided in this library should not be confused in any way with those of a general-purpose database management system
such as ALLBASE/HP-UX SQL. These functions provide for multiple search keys per entry, they protect against multi-user access (in other
words they do not lock records or files), and they provide the many other useful data base functions that are found in more robust database
management systems. Creating and updating databases by use of these functions is relatively slow because of data copies that occur upon
hash collisions. These functions for applications requiring fast lookup of relatively static information that is to be indexed by a single
key.
The file will contain holes so that its apparent size is about four times its actual content. Some older UNIX systems create real file
blocks for these holes when touched. These files cannot be copied by normal means (such as cp(1), cat(1), tar(1), or ar(1)) without expan-
sion.
dptr pointers returned by these subroutines point into static storage that is changed by subsequent calls.
The sum of the sizes of a key/content pair must not exceed the internal block size (currently 1024 bytes). Moreover, all key/content pairs
that hash together must fit on a single block. returns an error if a disk block fills with inseparable data.
does not physically reclaim file space, although it does make it available for reuse.
The order of keys presented by and depends on a hashing function, not on anything interesting.
A or during a pass through the keys by and may yield unexpected results.
AUTHOR
dbm(3C) was developed by the University of California, Berkeley.
SEE ALSO
ndbm(3X).
dbm(3C)