01-10-2020
Solved with Inotify tools.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Why would you need to use this in a script?
Why can't you just use print to print out what you want printed in the begining and print for what you want at the end.
So this:
nawk 'BEGIN {print "this is the first line"}
{print $1 $2 $3}
{print $5 $6}
END {print "this is the last line"}'
... (2 Replies)
Discussion started by: llsmr777
2 Replies
2. Shell Programming and Scripting
Hi all,
i am new to scripting. i need to write a code to detect begin and end of word that either begins or ends with t,th,d,dh,s,sh
i have a set of words in a file containg one word per line. let the filename be aaa.txt.
i have an another file bbb.txt which has two lines, just specifying the... (7 Replies)
Discussion started by: blkanth
7 Replies
3. Shell Programming and Scripting
Hi
I have written a script .The script runs properly if i write sql queries .But if i use PLSQL commands of BEGIN if end if , end ,then on running the script the comamds are getting printed on the prompt .
Ex :temp.sql
After connecting to the databse at the sql prompt i type... (1 Reply)
Discussion started by: isha_1
1 Replies
4. UNIX for Dummies Questions & Answers
Hi All ,
I am newbie to linux shell scripting , below are the contents of my log file ,
i want the lines between a begin pattern and a end pattern
for an instance , my begin Pattern is "Transaction Begins for Usr"
and end pattern is "Transaction Ends for Usr" into another file
Sample file... (1 Reply)
Discussion started by: SARAVANANE
1 Replies
5. Programming
Can any one help me out with following problem...
I want to search in a file which has two strings repeat each time(like start and end) i want to search between these two string in C programming.
please help me with the solution.
thanks in advance. (8 Replies)
Discussion started by: uday.sena.m
8 Replies
6. Shell Programming and Scripting
Hi All,
test file
Begin Script Run at Thu Mar 14 09:24:16 PDT 2013
tst_accounts: ws zip: WS_out_20130313.tar.gz dat: test_20130313.dat count: 63574 loaded: xx pre-merge: xx post-merge: xx timestamp: Thu Mar 14 09:30:42 PDT 2013
tst_accounts: ws zip: WS_out_20130313.tar.gz dat: s_20130313.dat... (6 Replies)
Discussion started by: bmk
6 Replies
7. Shell Programming and Scripting
I am trying to understand how to use the END block in awk without much success. I have this script that I found:
gawk '{count++; keyword = $1}
if (count == 3) keyword = "order this"
else print keyword " " k
}
}' << orderfile
Is that the way that the END block should be used? I am... (6 Replies)
Discussion started by: newbie2010
6 Replies
8. Shell Programming and Scripting
I'm new to awk, trying to understand the basics.
I'm trying to reset the counter everytime the program gets a new file to check.
I figured in the BEGIN part it would work, but it doesn't.
#!/bin/awk -f
BEGIN {counter=0}
{
sum=0
for ( i=1; i<=NF;... (1 Reply)
Discussion started by: guitarist684
1 Replies
9. Shell Programming and Scripting
Hello Friends ,
Please help to create script for compare and replace if not matches of set of lines .
* Primary*
Servername Server1
Location R201
Rack 4
*End Primary*
*Secondary*
Server Name Server1
IPAddress 10.24.30.10
Application Apache
*End of Secondary*
Above... (4 Replies)
Discussion started by: rnary
4 Replies
10. Shell Programming and Scripting
Can Someone please explain why BEGIN and END statement is used inside function? How does that help in scripting?
function fileformatting
{
CleanupMask="xXxX"
sed 's/^.//' < ${AllFile} > ${AllFile}.tmp
echo $(wc -l ${AllFile}.tmp)
`awk -v CleanupMask=${CleanupMask} '
BEGIN... (2 Replies)
Discussion started by: later_troy
2 Replies
LEARN ABOUT DEBIAN
checkpassword
checkpassword(8) System Manager's Manual checkpassword(8)
NAME
checkpassword - check a password
SYNOPSIS
checkpassword prog
DESCRIPTION
checkpassword reads descriptor 3 through end of file and then closes descriptor 3. There must be at most 512 bytes of data before end of
file.
The information supplied on descriptor 3 is a login name terminated by , a password terminated by , a timestamp terminated by , and
possibly more data. There are no other restrictions on the form of the login name, password, and timestamp.
If the password is unacceptable, checkpassword exits 1. If checkpassword is misused, it may instead exit 2. If there is a temporary prob-
lem checking the password, checkpassword exits 111.
If the password is acceptable, checkpassword runs prog. prog consists of one or more arguments.
COMPATIBLE TOOLS
There are other tools that offer the same interface as checkpassword. Applications that use checkpassword are encouraged to take the
checkpassword name as an argument, so that they can be used with different tools.
Note that these tools do not follow the getopt(3) interface. Optional features are controlled through (1) the tool name and (2) environ-
ment variables.
THE PASSWORD DATABASE
checkpassword checks the login name and password against /etc/passwd, using the operating system's getpwnam(3) and crypt(3) functions, sup-
plemented by getspnam. It rejects accounts with empty passwords. It ignores the timestamp.
Other checkpassword-compatible tools have different interpretations of login names, passwords, and timestamps. Both the login name and the
password should be treated as secrets by the application calling checkpassword; the only distinction is for administrative convenience.
The timestamp should include any other information that the password is based on; for example, the challenge in a challenge-response system
such as APOP.
WARNING: getpwnam is inherently unreliable. It fails to distinguish between temporary errors and nonexistent users. Future versions of
getpwnam(3) should return ETXTBSY to indicate temporary errors and ESRCH to indicate nonexistent users.
PROCESS-STATE CHANGES
Before invoking prog, checkpassword sets up $USER, $HOME, $SHELL, its supplementary groups, its gid, its uid, and its working directory.
Other checkpassword-compatible tools may make different changes to the process state. It is crucial for these effects to be documented;
different applications have different requirements.
SEE ALSO
getpwnam(3), crypt(3)
checkpassword(8)