12-20-2016
PLEASE copy AS IS - do not interfere without knowing EXACTLY WHAT you are doing. DON'T concatenate the statements from multiple lines into one line without additional measures (e.g. adding a semicolon).
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Can anyone tell me how to remove a portion of a large file to smaller ones? What I have is a large file that was created becasue several similar files were joined together. Each individual file starts with MSG_HEAD. I want to take everything from MSG_HEAD up to were it says MSG_HEAD again and... (13 Replies)
Discussion started by: methos
13 Replies
2. Shell Programming and Scripting
Hi,
I have my input as follows :
I have given two entries-
From system Mon Aug 1 23:52:47 2005
Source !100000006!:
Impact !100000005!: High
Status ! 7!: New
Last Name+!100000001!:
First Name+ !100000003!:
... (4 Replies)
Discussion started by: srikanth_ksv
4 Replies
3. Programming
hi i would like to know whether i can delete a part of a file in C
for eg. if my file contained
1234567890
and i want to delete
456
so that it becomes
1237890
is there a way i can do this.
well, one way i can achieve this is by creating a new file, copy whatever i want, then delete the... (2 Replies)
Discussion started by: sameersbn
2 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I have a little problem. I am having a file with pattern like :
asdf;ffgg;dfjfj;djdfjf;nnjj;djd;ssj;
I just want to print the portion from last ";" upto the immediate previous ";". There are several ";" in my line.
Please help me out...
Thnx in advance (8 Replies)
Discussion started by: vanand420
8 Replies
5. Shell Programming and Scripting
Dear Friends,
Here I am with another difficulty. I have a flat file from which I wanna grep following pattern.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Statement Date : Blah blah
Blah blah
Blah blah
Blah blah... (1 Reply)
Discussion started by: anushree.a
1 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I need to devide one file into 3 files based on column numbers and put a string (FILE1, FILE2, FILE3) in the last.....
Input file:
Column1,Column2,Column3,Column4,Column5,Column6,Column7,Column8,Column9,Column10
Output1:
Column1,Column3,Column6,Column4,Column5,FILE1
Output2:... (6 Replies)
Discussion started by: yale_work
6 Replies
7. Shell Programming and Scripting
Hello,
I've been searching and reading, but I can't figure out how to solve this problem with my newbie skills.
In my directory, I have a list of files (see dirlist.txt attachment) that I need to merge and rename. I have part of the code of the code figured out (see below). However, I... (3 Replies)
Discussion started by: anjulka
3 Replies
8. UNIX for Advanced & Expert Users
Hi ,
I am getting file name like
ABC_DATA_CUSTIOMERS_20120617.dat
ABC_DATA_PRODUCTS_20120617.dat
Need to convert
CUSTIOMERS.dat
PRODUCTS.dat
Help me how to do this. (7 Replies)
Discussion started by: reach_malu
7 Replies
9. Shell Programming and Scripting
Need to sort a portion of a file in a Alphabetical Order.
Example : The user adam is not sorted and the user should get sorted. I don't want the complete file to get sorted.
Currently All_users.txt contains the following lines.
##############
# ARS USERS
##############
mike, Mike... (6 Replies)
Discussion started by: evrurs
6 Replies
10. UNIX for Dummies Questions & Answers
Hi ladies and gentleman.. I have two text file with me. I need to replace one of the file content to another file if one both files have a matching pattern.
Example:
text1.txt:
ABCD 1234567,HELLO_WORLDA,HELLO_WORLDB
DCBA 3456789,HELLO_WORLDE,HELLO_WORLDF
text2.txt:
XXXX,ABCD... (25 Replies)
Discussion started by: bananamen
25 Replies
LEARN ABOUT HPUX
rndc.conf
rndc.conf(4) Kernel Interfaces Manual rndc.conf(4)
NAME
rndc.conf - rndc configuration file
DESCRIPTION
is the configuration file for the BIND 9 name server control utility. This file has a structure and syntax similar to the configuration
file,
The standard (default) configuration file is located at The standard (default) configuration file is located at
Syntax
The syntax of the file is much simpler than that of the configuration file. It includes three statements and optional comments. Statement
blocks are enclosed in braces and terminated with a semicolon. Clauses in the statements are also semicolon-terminated.
A servername or keyname must be quoted using double quotes if it matches a keyword, such as having a key named .
The options Statement
The statement specifies the default server and key definition for the configuration.
The clause specifies the default server on which runs, if the server is not specified with the option in the command. defserver is the
name or IP address of a name server that is specified in a statement.
The clause specifies the default key that will authenticate the server's commands and responses if a key is not specified with the option
in the command. defkey is the name of a key that is specified in a statement.
The server Statement
The statement specifies the servername of a name server, as a host name or an IP address.
The clause specifies a keyname that matches a keyname in a statement.
Multiple statements are permitted.
The key Statement
The statement specifies the name, keyname, and definition of a key.
The clause identifies the encryption algorithm, algoname. Currently only is supported.
The clause contains the random key, secretvalue, that will be used for authentication. It is base-64-encoded, using the algorithm speci-
fied in the clause. secretvalue is enclosed in double quotes.
The BIND 9 program can be used to generate the secretvalue.
Multiple statements are permitted.
Comments
The following comment styles are supported:
C:
C++:
UNIX:
Name Server Configuration
The name server must be configured to accept connections and to recognize the key specified in the file, using the statement in
WARNINGS
Currently, there is no way to specify the port on which must run.
EXAMPLES
Example 1
Here is a sample file:
In this example, will, by default, use the server at (127.0.0.1) and the key named Commands directed to the server will use the key. The
statement indicates that uses the HMAC-MD5 algorithm and its clause contains the base-64 encoding of the HMAC-MD5 secret enclosed in double
quotes.
Example 2
To generate a random secretvalue with the command (see rndc-confgen(1)):
A complete file, including the randomly generated key, is written to standard output. Commented-out and statements for are also written.
Example 3
To generate the secretvalue with the command (see dnssec-keygen(1)):
The base-64 secretvalue will appear in two files, and After you copy the secretvalue into statements in the and files, you can delete the
and files.
AUTHOR
was developed by the Internet Systems Consortium (ISC).
SEE ALSO
dnssec-keygen(1), rndc(1), rndc-confgen(1), named(1M).
available online at
available from the Internet Systems Consortium at
BIND 9.3 rndc.conf(4)