03-24-2004
genius.....don't know what it all means but it works.
Cheers and beers,
Neil
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have one file of numbers
4
5
2
...
And another file of strings
aaaaa bbbbb
ccccc ddddd
eeeee ffffff
...
I'd like to print the stings from each line in reverse order with some decoration the number of times listed in the first file
such as:
Yeah bbbbb aaaaa
Yeah bbbbb aaaaa (5 Replies)
Discussion started by: dcfargo
5 Replies
2. Shell Programming and Scripting
I've created an awk script that handles a varying number of search strings handed to it as command line parameters ($1 $2 etc). There may be 1, or 2 or 3 or more. A simplified version of the script is:
awk -v TYP="$1 $2 $3 $4 $5 $6" '
BEGIN {
CTYP = split (TYP,TYPP," ")
}
... (2 Replies)
Discussion started by: CarlosNC
2 Replies
3. Shell Programming and Scripting
Hi all
I have a variable called "variable" and is of the form
variable ="AAA BBB CCC DDD" {basically it has values separated by spaces}
What is the simplest way to check if "variable" has more that one value in its list?
Thanks. (9 Replies)
Discussion started by: felixmat1
9 Replies
4. Shell Programming and Scripting
Hello,
I wrote a script that does lot of things, and I would like to change the format of a number but without printing it now (so I don't want to use printf as it will print the value immediately).
Schematically here is what I have:
awk 'BEGIN{number=0.01234567}
$1==$2{$3=number}... (5 Replies)
Discussion started by: jolecanard
5 Replies
5. UNIX for Dummies Questions & Answers
People, I need your help with making a script which will
1. take as an input the number of lines, smth like this:
((RUBROBACTER_1_PE1288
(((SALINISPORA_1_PE1863
SALINISPORA_1_PE1828)100
((NOCARDIOIDES_2_PE2419
PROPIONIBACTERIUM_1_PE1395)96
((((((((CORYNEBACTERIUM_1_PE1119... (3 Replies)
Discussion started by: roussine
3 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I have the following text in a file:
ISA*00* *00* *ZZ*ENS_EDI *ZZ*GATE0215 *110106*2244*U*00401*006224402*1*P*>~
GS*HP*ENS_EDI*GATE0215*20110106*2244*6224402*X*004010X091A1~
ST*835*00006~... (2 Replies)
Discussion started by: donisback
2 Replies
7. Shell Programming and Scripting
I have a list of strings stored in $Lst
Example
set Lst = "John Fred Kate Paul"
I want to return 4 in this case. (1 Reply)
Discussion started by: kristinu
1 Replies
8. Shell Programming and Scripting
Hello all,
I have a file with column header which looks like this.
C1 C2 C3
A A G
T T A
G C CI want to make columnwise (and bitwise) comparison of strings and calculate the number of matches.
So the number of matches between C1 and C2 will be comparing ATG and ATC.
Here there are... (5 Replies)
Discussion started by: newbie83
5 Replies
9. Shell Programming and Scripting
Hi,
I have a text file as shown below. I would like to count the unique number of connections of each person in the first and second column. Third column is the ID numbers of first column persons and fourth column is the ID numbers of second column persons.
susan ali 156 294... (7 Replies)
Discussion started by: mohamad
7 Replies
10. Shell Programming and Scripting
I have 500 text files in a folder. The data of the text files are shown below.
USA Germany 23-12
USA Germany 23-12
USA Germany 23-12
France Germany 15-12
France Germany 15-12
France Italy 25-50
China China 30-32
China China 30-32
I would... (1 Reply)
Discussion started by: sahith
1 Replies
LEARN ABOUT LINUX
opieaccess
OPIEACCESS(5) File Formats Manual OPIEACCESS(5)
NAME
[/etc/]opieaccess - OPIE database of trusted networks
DESCRIPTION
The opieaccess file contains a list of networks that are considered trusted by the system as far as security against passive attacks is
concerned. Users from networks so trusted will be able to log in using OPIE responses, but not be required to do so, while users from net-
works that are not trusted will always be required to use OPIE responses (the default behavior). This trust allows a site to have a more
gentle migration to OPIE by allowing it to be non-mandatory for "inside" networks while allowing users to choose whether they with to use
OPIE to protect their passwords or not.
The entire notion of trust implemented in the opieaccess file is a major security hole because it opens your system back up to the same
passive attacks that the OPIE system is designed to protect you against. The opieaccess support in this version of OPIE exists solely
because we believe that it is better to have it so that users who don't want their accounts broken into can use OPIE than to have them pre-
vented from doing so by users who don't want to use OPIE. In any environment, it should be considered a transition tool and not a permanent
fixture. When it is not being used as a transition tool, a version of OPIE that has been built without support for the opieaccess file
should be built to prevent the possibility of an attacker using this file as a means to circumvent the OPIE software.
The opieaccess file consists of lines containing three fields separated by spaces (tabs are properly interpreted, but spaces should be used
instead) as follows:
Field Description
action "permit" or "deny" non-OPIE logins
address Address of the network to match
mask Mask of the network to match
Subnets can be controlled by using the appropriate address and mask. Individual hosts can be controlled by using the appropriate address
and a mask of 255.255.255.255. If no rules are matched, the default is to deny non-OPIE logins.
SEE ALSO
opie(4), opiekeys(5), opiepasswd(1), opieinfo(1), opiesu(1), opielogin(1), opieftpd(8)
AUTHOR
Bellcore's S/Key was written by Phil Karn, Neil M. Haller, and John S. Walden of Bellcore. OPIE was created at NRL by Randall Atkinson, Dan
McDonald, and Craig Metz.
S/Key is a trademark of Bell Communications Research (Bellcore).
CONTACT
OPIE is discussed on the Bellcore "S/Key Users" mailing list. To join, send an email request to:
skey-users-request@thumper.bellcore.com
7th Edition January 10, 1995 OPIEACCESS(5)