05-27-2018
From the given relevant commands I think the teacher or the course makers want to just cut one item from the passwd, process it in a for-do-done loop, and in the loop grep the item in the passwd again in order to get the second item.
But this is less efficient compared to piping the pair of items to awk or a while read loop.
The latter can directly split into variables if the field separator IFS is set accordingly. You do not even need to run cut before.
This User Gave Thanks to MadeInGermany For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hello guys,
well as i mentioned first i have a serious problem, i need your help.
i have a hosting plan with linux, apache and php.
i have a script (that have my UID=32256) inside my web site (in the panel folder -see below-) that creates new scripts (in the pages folder) (the new scripts... (1 Reply)
Discussion started by: mehdi
1 Replies
2. UNIX for Advanced & Expert Users
I need a command that returns the usernames that have ran the 10 processes that have taken the most time to execute on a machine.
I also need a command that returns only those directories that have read/execute permissions for all the users. (4 Replies)
Discussion started by: anw68ster
4 Replies
3. HP-UX
Hi ,
I am using adduser in hp-ux to create users in Hp-ux.
i would like to know what are the valid values for uids and gids in hp-ux
what are the rannges for the valid uids .
How to check what are the used uids in Hp-ux .
Thanks
Narendra babu C (7 Replies)
Discussion started by: naren_chella
7 Replies
4. AIX
We have a problem where we delete a user and their associated UID gets dumped back in the UID pool. The if we immediately create a another (new) user, AIX reuses the last UID, the one that was just released. This is causing a problem when reports are being generated because the new users name is... (2 Replies)
Discussion started by: xsys2000
2 Replies
5. Post Here to Contact Site Administrators and Moderators
Under all users, there are some keynames. Some are obvious, like Moderator and Registered User. I have seen others too. What do they mean or signify?;) (2 Replies)
Discussion started by: joeyg
2 Replies
6. UNIX for Advanced & Expert Users
Hello everyone, I was just wondering if there was a way to make it so that usernames could be used across applications.
For instance, I have a server that has a bunch of users. I want these users to have ways of accessing my database as well as a variety of other programs, but I don't want them... (2 Replies)
Discussion started by: gonzofish
2 Replies
7. UNIX for Advanced & Expert Users
Hi,
What is the best ways to keep UIDs and GIDs consistent across unix and linux server. my company have a servers running on hpux, linux, aix and many of them have veritas cluster and hacmp running, many time user account have been created only on one of the cluster node and not the others... (4 Replies)
Discussion started by: robertngo
4 Replies
8. UNIX for Advanced & Expert Users
We have users that have a # in their username. Sudo is working on some servers and not others. I have narrowed it down to the # in their username. Any suggestions or ideas why it is working on 1 server but not another.
Server not working is - Solaris 10 patch level 138888-01
Server working is ... (1 Reply)
Discussion started by: Gibby13
1 Replies
9. Solaris
Hi all,
I am bit confused about UIDs on my server where LDAP athentication happens. UIDs are generally in the range of 0-65534 for any Solaris OS version(correct if i am wrong). My server is running on Solaris 9. Below are user accounts available on my server.
... (10 Replies)
Discussion started by: vvpotugunta
10 Replies
10. Red Hat
Hi,
I'm considering implementing pam_krb5 on RHEL 5.5 and Solaris 10, and I'm in an environment that has a number of legacy NIS domains. They've all been migrated into Active Directory, RFC2307, with the NIS maps that differed in each domain kept within its own container. However, users and... (0 Replies)
Discussion started by: cambridge
0 Replies
CUT(1) General Commands Manual CUT(1)
NAME
cut - select out columns of a file
SYNOPSIS
cut [ -b | -c] list [file...]
cut -f list [-d delim] [ -s]
OPTIONS
-b Cut specified bytes
-c Select out specific characters
-d Change the column delimiter to delim
-f Select out specific fields that are separated by the
-i Runs of delimiters count as one
-s Suppres lines with no delimiter characters, when used
EXAMPLES
cut -f 2 file # Extract field 2
cut -c 1-2,5 file # Extract character columns 1, 2, and 5
cut -c 1-5,7- file # Extract all columns except 6
DESCRIPTION
[file...]" delimiter character ( see delim)" with the -f option. Lines with no delimiters are passwd through untouched"
Cut extracts one or more fields or columns from a file and writes them on standard output. If the -f flag is used, the fields are sepa-
rated by a delimiter character, normally a tab, but can be changed using the -d flag. If the -c flag is used, specific columns can be
specified. The list can be comma or BLANK separated. The -f and -c flags are mutually exclusive. Note: The POSIX1003.2 standard requires
the option -b to cut out specific bytes in a file. It is intended for systems with multi byte characters (e.g. kanji), since MINIX uses
only one byte characters, this option is equivalent to -c. For the same reason, the option -n has no effect and is not listed in this man-
ual page.
SEE ALSO
sed(1), awk(9).
CUT(1)