Sponsored Content
Full Discussion: Masking data
Top Forums UNIX for Dummies Questions & Answers Masking data Post 302952750 by featheredfrog on Friday 21st of August 2015 11:17:43 AM
Old 08-21-2015
How about uuencoding and rot13ing the sensitive data?
 

10 More Discussions You Might Find Interesting

1. IP Networking

IP Masking

Is it possible for a internal LAN to mask a IP e.g. i have a server ip running the intranet ip being 192.168.0.8 and i want to make that like www.intranet.com is this possible on a internal network ? (1 Reply)
Discussion started by: perleo
1 Replies

2. Shell Programming and Scripting

Masking Content of a String

Hello, I need to know that whether a content of a string can be hidden or masked inside a shell script. My Sample Code is given below <Code> #!/usr/bin/ksh Userid=test DB=temp Passwd=`java Decryption test` # The Above command will get the encryped password for "test" user id and store... (2 Replies)
Discussion started by: maxmave
2 Replies

3. Shell Programming and Scripting

Data Masking

I have a pipe delimited file that I need to 'mask' to before loading to keep some data confidential. I need to maintain the first 4 bytes of certain columns and replace the remaining bytes with an 'x'. I would like to maintain spaces but it's not a requirement. Example, need to mask columns 2... (2 Replies)
Discussion started by: 1superdork
2 Replies

4. Emergency UNIX and Linux Support

Masking of number

BAT:0310:2009-08-0:Y4 :H:D:00003721:03103721.IFH:00138770:05767:00000000001279' EXR:CLP:912.570000' STA:A:9071559:2009-08-10::Wer::Mrs' DEF::531.97:531.97:310221661617::+ABC:BAL:1:N::::5:40.00:0.00:2009-08-10:CN:1111111111109962::3:N:missc :N:PH:00010833:... (5 Replies)
Discussion started by: mad_man12
5 Replies

5. Shell Programming and Scripting

masking issue

Hi I am facing an issue with the below script which has the below line each field being separated with a tab. I need to mask the 8 and 7th field based on following conditions 1. 8th field is 16 in length and is numerics i will mask the middle 6 digits except the first 6 and last 4. input... (2 Replies)
Discussion started by: mad_man12
2 Replies

6. UNIX for Advanced & Expert Users

.htaccess redirect with masking

I am looking to forward the following with masking via my .htaccess file: www.mywebsite.com/origpage www.mywebsite.com/newpage I do not want to forward the entire site, just this one page with masking. Neither page has an extension. I am able to forward with .htaccess - but it does not mask the... (1 Reply)
Discussion started by: globalnerds
1 Replies

7. Programming

Masking Password with *'s

So I've been working on this for some time now and can't seem to find the solution that works for me. I'm working in C/Unix. Basically, I want to take a user input and output something different. For example, I want to take a password and output *'s. In another instance, I want to take inputed... (35 Replies)
Discussion started by: bigdrock44
35 Replies

8. Shell Programming and Scripting

Masking off data for different kind of files

Hi everyone, I am required to mask off the date data for 3 kinds of files. Please help me to find a most generic way to handle the files. Example of the content of each kind(the dates are in red): 1. (1-line files). Possible solution: Date needed to be masked off start with DTM+, end with :203 ... (1 Reply)
Discussion started by: Alvin123
1 Replies

9. Shell Programming and Scripting

Masking data for different file format

Hi, I have 3 kind of files that contains date data needed to be masked. The file is like this: File 1 (all contents in 1 line): input:DTM+7:201103281411:203'LOC+175+SGSIN:139:6+TERMINATOR......'DTM+132:201103281413:203'LOC.... output:... (4 Replies)
Discussion started by: Alvin123
4 Replies

10. Shell Programming and Scripting

Masking algorithm

I have a requirement of masking few specific fields in the UNIX file. The details are as following- File is fixed length file with each record of 250 charater length. 2 fields needs to be masked – the positions are 21:30 and 110:120 The character by character making needs to be done which... (5 Replies)
Discussion started by: n78298
5 Replies
KTR(4)							   BSD Kernel Interfaces Manual 						    KTR(4)

NAME
ktr -- kernel tracing facility SYNOPSIS
options KTR options ALQ options KTR_ALQ options KTR_COMPILE=(KTR_LOCK|KTR_INTR|KTR_PROC) options KTR_CPUMASK=0x3 options KTR_ENTRIES=8192 options KTR_MASK=(KTR_INTR|KTR_PROC) options KTR_VERBOSE DESCRIPTION
The ktr facility allows kernel events to be logged while the kernel executes so that they can be examined later when debugging. The only mandatory option to enable ktr is ``options KTR''. The KTR_ENTRIES option sets the size of the buffer of events. It must be a power of two. The size of the buffer in the currently running kernel can be found via the read-only sysctl debug.ktr.entries. By default the buffer contains 1024 entries. Event Masking Event levels can be enabled or disabled to trim excessive and overly verbose logging. First, a mask of events is specified at compile time via the KTR_COMPILE option to limit which events are actually compiled into the kernel. The default value for this option is for all events to be enabled. Secondly, the actual events logged while the kernel runs can be further masked via the run time event mask. The KTR_MASK option sets the default value of the run time event mask. The runtime event mask can also be set by the loader(8) via the debug.ktr.mask environment vari- able. It can also be examined and set after booting via the debug.ktr.mask sysctl. By default the run time mask is set to log only KTR_GEN events. The definitions of the event mask bits can be found in <sys/ktr.h>. Furthermore, there is a CPU event mask whose default value can be changed via the KTR_CPUMASK option. A CPU must have the bit corresponding to its logical id set in this bitmask for events that occur on it to be logged. This mask can be set by the loader(8) via the debug.ktr.cpumask environment variable. It can also be examined and set after booting via the debug.ktr.cpumask sysctl. By default events on all CPUs are enabled. Verbose Mode By default, events are only logged to the internal buffer for examination later, but if the verbose flag is set then they are dumped to the kernel console as well. This flag can also be set from the loader via the debug.ktr.verbose environment variable, or it can be examined and set after booting via the debug.ktr.verbose sysctl. If the flag is set to zero, which is the default, then verbose output is disabled. If the flag is set to one, then the contents of the log message and the CPU number are printed to the kernel console. If the flag is greater than one, then the filename and line number of the event are output to the console in addition to the log message and the CPU number. The KTR_VERBOSE option sets the flag to one. Examining the Events The KTR buffer can be examined from within ddb(4) via the show ktr [/v] command. This command displays the contents of the trace buffer one page at a time. At the ``--more--'' prompt, the Enter key displays one more entry and prompts again. The spacebar displays another page of entries. Any other key quits. By default the timestamp, filename, and line number are not displayed with each log entry. If the /v modi- fier is specified, then they are displayed in addition to the normal output. Note that the events are displayed in reverse chronological order. That is, the most recent events are displayed first. Logging ktr to Disk The KTR_ALQ option can be used to log ktr entries to disk for post analysis using the ktrdump(8) utility. This option depends on the ALQ option. Due to the potentially high volume of trace messages the trace mask should be selected carefully. This feature is configured through a group of sysctls. debug.ktr.alq_file displays or sets the file that ktr will log to. By default its value is /tmp/ktr.out. If the file name is changed while ktr is enabled it will not take effect until the next invocation. debug.ktr.alq_enable enables logging of ktr entries to disk if it is set to one. Setting this to 0 will terminate logging. debug.ktr.alq_max is the maximum number of entries that will be recorded to disk, or 0 for infinite. This is helpful for limiting the number of particularly high frequency entries that are recorded. debug.ktr.alq_depth determines the number of entries in the write buffer. This is the buffer that holds entries before they are written to disk and defaults to the value of the KTR_ENTRIES option. debug.ktr.alq_failed records the number of times we failed to write an entry due to overflowing the write buffer. This may happen if the frequency of the logged ktr messages outpaces the depth of the queue. debug.ktr.alq_cnt records the number of entries that have currently been written to disk. SEE ALSO
ktrdump(8), alq(9), ktr(9) HISTORY
The KTR kernel tracing facility first appeared in BSD/OS 3.0 and was imported into FreeBSD 5.0. BSD
January 25, 2005 BSD
All times are GMT -4. The time now is 01:14 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy