awk often errors with too long string message hence would appreciate non seek solution. Also if the solution is on the lines of the code i shared it would be really great.
Last edited by mohtashims; 01-13-2020 at 07:12 AM..
So, I will be working with someone and basically we are trying to build a form that is submitted most likely via the web and the data is just a string of numbers.
like:
19383882872201110929282821818182827349190102837364718191001932873711
Now, each number is part of a numerical value of... (4 Replies)
Hello,
I have a big data file (160 MB) full of records with pipe(|) delimited those fields. I`m sorting the file on the first field.
I'm trying to sort with "sort" command and it brings me 6 minutes.
I have tried with some transformation methods in perl but it results "Out of memory". I was... (2 Replies)
Hi,
So I'm kinda new to shell scripts and the like. I've picked up quite a bit of use from browsing the forums here but ran into a new one that I can't seem to find an answer for.
I'm looking to parse/find a string AND the next 15 or so charachters that follow the string within a text file... (1 Reply)
It is for HP-Unix B.11.31.
Requirement:
1. List the directories, which directories name has given particular string.
Example: Directories with name "Build"
2. On the output of 1. list the directories by creation date as sort order.
I tried with; find . -type d -name "Build*"
... (3 Replies)
Hi,
I am confused how to proceed firther please find the problem below:
Input Files:
DCIA_GEOG_DATA_OCEAN.TXT
DCIA_GEOG_DATA_MCRO.TXT
DCIA_GEOG_DATA_CVAS.TXT
DCIA_GEOG_DATA_MCR.TXT
Output File Name: MMA_RFC_GEOG_NAM_DIM_LOD.txt
Sample Record(DCIA_GEOG_DATA_OCEAN.TXT):(Layout same for... (4 Replies)
Hi Experts,
I have a filelist collected from another server , now want to sort the output using date/time stamp filed.
- Filed 6, 7,8 are showing the date/time/stamp.
Here is the input:
#----------------------------------------------------------------------
-rw------- 1 root ... (3 Replies)
Hello all,
How do I achieve this? I have A, B and A/B in different variables in a file in col2.
I want them to sort in such a way, that the variables appear together, and within a variable, the data is sorted in the order A,B and then A/B. If I sort on the second column, the order becomes A,... (6 Replies)
Hello,
I'm trying to sort a large data file by the 3rd column so that all of the first words in the 3rd column that are in all uppercase appear before (or after) the non uppercase words. For example,
Data file:
xxx 12345 Rat in the house
xxx 12345 CAT in the hat
xxx 12345 Dog in the... (4 Replies)
Hi,
I am using SUN SOLARIS (SunOS sun4v sparc SUNW, T5240).
I have a huge data file with header and trailer. This file gets used into an ETL process. ETL skips the header record (which is the first record of the file) and loads the rest of the record. The file can be delimited (comma,... (5 Replies)
VERIEXEC(8) BSD System Manager's Manual VERIEXEC(8)NAME
veriexec -- file integrity subsystem
DESCRIPTION
Veriexec is an in-kernel, real-time, file-system independent, file integrity subsystem. It can be used for a variety of purposes, including
defense against trojaned binaries, indirect attacks via third-party remote file-systems, and malicious configuration file corruption.
CONFIGURATION
Signatures Database
Veriexec requires a signatures database -- a list of monitored files, along with their digital fingerprint and (optionally) access modes.
The format of this file is described by veriexec(5).
NetBSD provides a tool, veriexecgen(8), for generating the signatures database. Example usage:
# veriexecgen
Although it should be loaded on system boot (see ``RC Configuration'' below), this list can be loaded manually using veriexecctl(8):
# veriexecctl load
Kernel Configuration
Veriexec requires a pseudo-device to run:
pseudo-device veriexec 1
Additionally, one or more options for digital fingerprint algorithm support:
options VERIFIED_EXEC_FP_SHA256
options VERIFIED_EXEC_FP_SHA512
Some kernels already enable Veriexec by default. See your kernel's config file for more information.
RC Configuration
Veriexec also allows loading signatures and setting the strict level (see below) during the boot process using the following variables set in
rc.conf(5):
veriexec=YES
veriexec_strict=1 # IDS mode
STRICT LEVELS
Veriexec can operate in four modes, also referred to as strict levels:
Learning mode (strict level 0)
The only level at which the fingerprint tables can be modified, this level is used to help fine-tune the signature database. No
enforcement is made, and verbose information is provided (fingerprint matches and mismatches, file removals, incorrect access, etc.).
IDS mode (strict level 1)
IDS (intrusion detection system) mode provides an adequate level of integrity for the files it monitors. Implications:
- Monitored files cannot be removed
- If raw disk access is granted to a disk with monitored files on it, all monitored files' fingerprints will be invalidated
- Access to files with mismatched fingerprints is denied
- Write access to monitored files is allowed
- Access type is not enforced
IPS mode (strict level 2)
IPS (intrusion prevention system) mode provides a high level of integrity for the files it monitors. Implications:
- All implications of IDS mode
- Write access to monitored files is denied
- Access type is enforced
- Raw disk access to disk devices with monitored files on them is denied
- Execution of non-monitored files is denied
- Write access to kernel memory via /dev/mem and /dev/kmem is denied
Lockdown mode (strict level 3)
Lockdown mode provides high assurance integrity for the entire system. Implications:
- All implications of IPS mode
- Access to non-monitored files is denied
- Write access to files is allowed only if the file was opened before the strict level was raised to this mode
- Creation of new files is denied
- Raw access to system disks is denied
RUNTIME INFORMATION
Veriexec exports runtime information that may be useful for various purposes.
It reports the currently supported fingerprinting algorithms, for example:
# /sbin/sysctl kern.veriexec.algorithms
kern.veriexec.algorithms = RMD160 SHA256 SHA384 SHA512 SHA1 MD5
It reports the current verbosity and strict levels, for example:
# /sbin/sysctl kern.veriexec.{verbose,strict}
kern.veriexec.verbose = 0
kern.veriexec.strict = 1
It reports a summary of currently loaded files and the mount-points they're on, for example:
# /sbin/sysctl kern.veriexec.count
kern.veriexec.count.table0.mntpt = /
kern.veriexec.count.table0.fstype = ffs
kern.veriexec.count.table0.nentries = 33
Other information may be retrieved using veriexecctl(8).
SEE ALSO options(4), veriexec(5), sysctl(7), sysctl(8), veriexecctl(8), veriexecgen(8)AUTHORS
Elad Efrat <elad@NetBSD.org>
BSD February 18, 2008 BSD