12-13-2016
In addition to what Corona already said/asked:
Quote:
Originally Posted by
sam0912
- If the file is not infected and passes the virus scan, the file gets further encrypted through 7 ZIP and gets copied to Folder 'B' on the same server.
- Mule gets configured to copy encrypted file only from Folder 'B' and decrypts it.
Really? What should that be good for? I can understand to compress data for transportation purposes to save bandwidth, but if you move around a file inside your own network this is simply not worth the effort.
Note that Lempel-Ziv is a
compression algorithm, not an
encryption. Everybody with a working copy of the
unzip utility (if i remember correctly there are few of these out there) can decode it. It you need encryption go for something the modern OpenSSL library offers. You will need to create and distribute keys for this to work, then.
I hope this helps.
bakunin
This User Gave Thanks to bakunin For This Post:
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
Please let us know how to create a multiple instances of a job in the shell script.
Thanks.
Gangegowda K.G (1 Reply)
Discussion started by: Gangegowda
1 Replies
2. Shell Programming and Scripting
Hey Guys,
i was trying out a shell script which has to remove a file for every 90 mins. this is the code i came up with .
$ crontab -e file1
file1 contains
30 1 * * * * rm -r /folder1/folder2/somefile.txt
Now i need the cron to run for every 90 mins. the problem with this is... (8 Replies)
Discussion started by: Irishboy24
8 Replies
3. Shell Programming and Scripting
Is it possible to add a job to crontab with a shell script? The existing jobs in the crontab should exist as it was. The new job should be appended.
Also, the crontab file is /var/spool/cron/root. (1 Reply)
Discussion started by: proactiveaditya
1 Replies
4. UNIX for Dummies Questions & Answers
Hello,
I am running a shell script whose execution often takes several hours to complete. Is there way I can get some kind of status update as the job is running? Something as simple as the start and the current time stamp.
Thanks,
Gussi (2 Replies)
Discussion started by: Gussifinknottle
2 Replies
5. Shell Programming and Scripting
I need to do a work to my job, but i m new in script shell, someone can help with this.. :confused:
Description
Bsafe The command creates a backup directory of each month at the command line (arguments of the script). The names of directories to copy will always be specified for the... (4 Replies)
Discussion started by: strshel
4 Replies
6. Solaris
Hi,
The following shell script runs without any problem when executed manulally.
USED=$(df -h /arch | tail -1 | awk '{print $5}' | cut -d '%' -f 1)
if
then
find /arch/AUBUAT/ -type f -mtime +0 | xargs rm
find /arch/AUBMIG/ -type f -mtime +0 | xargs rm
fi
But the same gives below... (6 Replies)
Discussion started by: ksadiq79
6 Replies
7. UNIX for Dummies Questions & Answers
Hi am newbie for unix shell..
how to create a cron job for my already created shell script.:confused:
Thanks! (1 Reply)
Discussion started by: vidhyaS
1 Replies
8. Shell Programming and Scripting
Hi all,
I am trying to exit a shell script (c shell) while invoking a job (service) that must run in the background:
......
/mydir/runservice &
exit
......
There are downstream jobs and scripts that need to be run, but they all 'wait' for the script to exit. The script 'hangs' and... (3 Replies)
Discussion started by: CKT_newbie88
3 Replies
9. UNIX for Dummies Questions & Answers
Hi,
There are 2000 jobs in the list and i need to draw their status. I put all the jobs in the list and trying to read one by one from the list and to find out the status.
Help me out in correcting the script.
#!/bin/csh
for a in $(cat Jobs_List.txt);
do
source <<path>>
autorep -j $a... (1 Reply)
Discussion started by: venkatesht
1 Replies
10. Shell Programming and Scripting
Hi..
I need to put multiple jobs on ON HOLD in Autosys.. please help me on this.
For Example:
1)ABCD_EFGH_IJKL
2)abcd_efgh_ijkl (2 Replies)
Discussion started by: Maanjesh
2 Replies
crypt(1) General Commands Manual crypt(1)
NAME
crypt - encode and decode files
SYNOPSIS
[password]
DESCRIPTION
reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no pass-
word is given, demands a key from the terminal and turns off printing while the key is being typed in. encrypts and decrypts with the same
key:
The latter command decrypts the file and prints the clear version.
Files encrypted by are compatible with those treated by the editor in encryption mode (see ed(1)).
Security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space must be
infeasible; "sneak paths" by which keys or clear text can become visible must be minimized.
implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on such
machines are widely known; thus provides minimal security.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive; that is, to take a substan-
tial fraction of a second to compute. However, if keys are restricted to, for example, three lowercase letters, then encrypted files can
be read by expending only a substantial fraction of five minutes of machine time.
Since the key is an argument to the command, it is potentially visible to users executing the or a derivative (see ps(1)). The choice of
keys and key security are the most vulnerable aspect of
EXAMPLES
The following example demonstrates the use of to edit a file that the user wants to keep strictly confidential:
...
...
...
Note that the option is the encryption mode of and prompts the user for the same key with which the file was encrypted.
WARNINGS
If output is piped to and the encryption key is given on the command line, can leave terminal modes in a strange state (see nroff(1) and
stty(1)).
If two or more files encrypted with the same key are concatenated and an attempt is made to decrypt the result, only the the first of the
original files is decrypted correctly.
FILES
for typed key
SEE ALSO
ed(1), makekey(1), stty(1).
crypt(1)