09-22-2016
find "$INBOUND_PATH" ! -name . lists me all the files and current directory.
/home/pganesan/crypt
/home/pganesan/crypt/file1.txt
/home/pganesan/crypt/file2.txt
/home/pganesan/crypt/file_file.txt
/home/pganesan/crypt/test_file_new.txt
But find "$INBOUND_PATH" ! -name . -prune gives me the current folder alone. Files are not displayed
/home/pganesan/crypt/
10 More Discussions You Might Find Interesting
1. Filesystems, Disks and Memory
I have a directory MYDIR
In which i have several directories 1,2,3,4....
Now, In each of these directories i have several files a.dat, b.dat, c.dat, d.dat.....
MYDIR
----1
---------a.dat
---------b.dat
---------c.dat
---------d.dat
----2
---------a.dat
---------b.dat
---------c.dat... (2 Replies)
Discussion started by: ramky79
2 Replies
2. Shell Programming and Scripting
how to remove all zero byte files in a particular directory and also files that are morew than 1GB. pLEASE let me know (3 Replies)
Discussion started by: dsravan
3 Replies
3. UNIX for Dummies Questions & Answers
Hi,
Is there any way to get count number of lines in all files which have more than o bytes in current directory
for example :
in /user/sri/ there are 3 files
abc 0 bytes
def 5 bytes
ghi 10 bytes
i need to get wc -l for all files which have > 0 bytes at a time ..is... (6 Replies)
Discussion started by: sri2005
6 Replies
4. Shell Programming and Scripting
Hi Gurus,
I have a directory A, which has some 0 byte files in it.
This directory also has a subdirectory B which also has some 0 byte files in it.
The problem:
I only need to find out the names of the 0 byte files in the directory A.
I'm using the following command
find . -name *.zip... (6 Replies)
Discussion started by: ramky79
6 Replies
5. Shell Programming and Scripting
In my server migration requirement, I need to compare if one file on old server is exactly the same as the corresponding file on the new server.
For diff and comm, the inputs need to be sorted. But I do not want to disturb the content of the file and need to find byte-to-byte match.
Please... (4 Replies)
Discussion started by: krishmaths
4 Replies
6. Shell Programming and Scripting
Hi All
Can anyone please suggest me how to remove the last byte from a falt file .This is from the last line's last BYTE.
Please suggest me something.
Thank's and regards
Vinay (1 Reply)
Discussion started by: vinayrao
1 Replies
7. Shell Programming and Scripting
we were asked to make a program that deletes all zero-byte files in a psecified directory. we need to use sysytem_calls like: scandir(),chdir(),stat() and remove(). (3 Replies)
Discussion started by: sogetsu009
3 Replies
8. Emergency UNIX and Linux Support
I were checking few processes running and check what at the files currently I have in my home directory by giving below commands
$ ps -ef|grep sleep
$ ls -lt | pg
after awhile the first column of my commands were created as files given below...
-rw-rw-rw- 1 prd 0 Mar 25 09:42 ls... (7 Replies)
Discussion started by: dateez
7 Replies
9. UNIX for Dummies Questions & Answers
Hi,
In a list of commands executed in a script, how do you make sure that the previous command worked fine?
I have a list of awk commands and I want to make sure that the script aborts if any command leaves a zero byte file. (1 Reply)
Discussion started by: genehunter
1 Replies
10. Shell Programming and Scripting
Hi Team,
I'm looking for a command which removes files having 0 byte of having only header line (1 line).
My ETL process generates these files. Few files are not having header, in that case if no data from source, it will be 0 byte and few files are having header, in that case if no data from... (7 Replies)
Discussion started by: ace_friends22
7 Replies
LEARN ABOUT HPUX
encrypt_r
crypt(3C) crypt(3C)
NAME
crypt - generate hashing encryption
SYNOPSIS
Obsolescent Interfaces
DESCRIPTION
crypt():
is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things)
to frustrate use of hardware implementations of a key search.
key is a user's typed password. salt is a two-character string chosen from the set this string is used to perturb the hashing algorithm in
one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a constant string. The returned value points
to the encrypted password. The first two characters are the salt itself.
Obsolescent Interfaces
generate hashing encryption.
WARNINGS
The return value for points to data whose content is overwritten by each call.
and are obsolescent interfaces supported only for compatibility with existing DCE applications. New multithreaded applications should use
SEE ALSO
crypt(1), login(1), passwd(1), getpass(3C), passwd(4), thread_safety(5).
STANDARDS CONFORMANCE
crypt(3C)