01-11-2006
Hi there,
this is what I'm running from the command line
sed -e s/\\/ / TalkTalk5.txt > bob.slash
but I'm still getting a garbed error message. Any ideas ?????
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi!!..
I would like to know what is maximum character size for a command in the "sh" or "bourne" shell?
Thanks in advance..
Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies
2. UNIX for Advanced & Expert Users
Hi!!..
I would like to know what is maximum character size for a command in the "sh" or "bourne" shell?
Thanks in advance..
Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies
3. Shell Programming and Scripting
Hi!!..
I would like to know what is maximum character size for a command in the "sh" or "bourne" shell?
Thanks in advance..
Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies
4. Shell Programming and Scripting
Hi,
I have line in input file as below:
3G_CENTRAL;INDONESIA_(M)_TELKOMSEL;SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL
My expected output for line in the file must be :
"1-Radon1-cMOC_deg"|"LDIndex"|"3G_CENTRAL|INDONESIA_(M)_TELKOMSEL"|LAST|"SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL"
Can someone... (7 Replies)
Discussion started by: shis100
7 Replies
5. Shell Programming and Scripting
Hello everyone
Sorry I have to add another sed question. I am searching a log file and need only the first 2 occurances of text which comes after (note the space) "string " and before a ",". I have tried
sed -n 's/.*string \(*\),.*/\1/p' filewith some, but limited success. This gives out all... (10 Replies)
Discussion started by: haggismn
10 Replies
6. Shell Programming and Scripting
Hi
I am having file :
1|2443094 |FUNG SIU TO |CLEMENT
2|2443095 |FUNG KIL FO |REMENT
This file contains only 3 fields delimeted by "|". Last field is a decsription filed and it contains character "|". Due to this my output if breaking in 4 fields. I... (7 Replies)
Discussion started by: krsnadasa
7 Replies
7. UNIX for Dummies Questions & Answers
How to use "mailx" command to do e-mail reading the input file containing email address, where column 1 has name and column 2 containing “To” e-mail address
and column 3 contains “cc” e-mail address to include with same email.
Sample input file, email.txt
Below is an sample code where... (2 Replies)
Discussion started by: asjaiswal
2 Replies
8. UNIX for Dummies Questions & Answers
Hi, all, I have a file that looks like:
## XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
## YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
#AA AB AC AD AE AF AG AH AI AJ AK AL
20 60039 60039 ... (5 Replies)
Discussion started by: kush
5 Replies
9. UNIX for Dummies Questions & Answers
Hi All
It's me again with another huge txt files. :confused:
What I have:
- I have 33 huge txt files in a folder.
- I have thousands of line in this txt file which contain many the letter "x" in them.
- Some of them have more than one "x" character in the line.
What I want to achieve:... (8 Replies)
Discussion started by: Nexeu
8 Replies
10. Shell Programming and Scripting
Hello.
System : opensuse leap 42.3
I have a bash script that build a text file.
I would like the last command doing :
print_cmd -o page-left=43 -o page-right=22 -o page-top=28 -o page-bottom=43 -o font=LatinModernMono12:regular:9 some_file.txt
where :
print_cmd ::= some printing... (1 Reply)
Discussion started by: jcdole
1 Replies
LEARN ABOUT DEBIAN
k5login
.K5LOGIN(5) File Formats Manual .K5LOGIN(5)
NAME
.k5login - Kerberos V5 acl file for host access.
DESCRIPTION
The .k5login file, which resides in a user's home directory, contains a list of the Kerberos principals. Anyone with valid tickets for a
principal in the file is allowed host access with the UID of the user in whose home directory the file resides. One common use is to place
a .k5login file in root's home directory, thereby granting system administrators remote root access to the host via Kerberos.
EXAMPLES
Suppose the user "alice" had a .k5login file in her home directory containing the following line:
bob@FUBAR.ORG
This would allow "bob" to use any of the Kerberos network applications, such as telnet(1), rlogin(1), rsh(1), and rcp(1), to access alice's
account, using bob's Kerberos tickets.
Let us further suppose that "alice" is a system administrator. Alice and the other system administrators would have their principals in
root's .k5login file on each host:
alice@BLEEP.COM
joeadmin/root@BLEEP.COM
This would allow either system administrator to log in to these hosts using their Kerberos tickets instead of having to type the root pass-
word. Note that because "bob" retains the Kerberos tickets for his own principal, "bob@FUBAR.ORG", he would not have any of the privileges
that require alice's tickets, such as root access to any of the site's hosts, or the ability to change alice's password.
SEE ALSO
telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)
.K5LOGIN(5)