9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I am thinking to increase my knowledge towards shell scripting and tcl scripting.
The thing is, please suggest me a script which i can code is useful in learning as well as to project it to my team mates and it is helpful to all my office team mates.
I'll give you an idea of what we... (4 Replies)
Discussion started by: Syed Imran
4 Replies
2. Shell Programming and Scripting
Hi there, I'm pretty new to scripting and wondering if anyone had any idea's, scripts or snippets on how I can do the following.
I basically want a shell script that will look at all the files in a directory and find all the names and addresses in them then output them to the screen nicely... (12 Replies)
Discussion started by: mrpugster
12 Replies
3. UNIX for Advanced & Expert Users
Hi friends..
I am using the below command to search few files from many folders which is under one folder..
i mean let say the path is A/B/C...and inside C...i have 1-10 folder...
the below command is working fine....
find /A/B/C -name "*.txt" -o -name "*.csv" -o -name "*.TXT" -o -name... (1 Reply)
Discussion started by: sapan123
1 Replies
4. Shell Programming and Scripting
my issue now is i have a txt file containing a list like below
i want to create a script that will add a constant text "Find this name" at the start and "at your directory" at the end. every line should be added by phrase at the start and end.
Each line of the file should look like "Find... (4 Replies)
Discussion started by: dakid
4 Replies
5. Shell Programming and Scripting
I'm new to the script programming and I have this piece of code (repeatedly used) in my program:
while :
do
................
ans=`ckyorn -p "Do you want to continue?"`
if || || || ; then
break
elif || ; then
echo "Aborting..."
exit... (2 Replies)
Discussion started by: bluemoon1
2 Replies
6. Shell Programming and Scripting
Does anyone know how to test if an ethernet interface is alive, or accepting connections? Here is the scenario - I have rsc and sc console interfaces on some Suns. There are some sporadic vulnerability scans that send them out to lunch when they run the scans. I have to login to the host and reset... (0 Replies)
Discussion started by: lm_admin_dh
0 Replies
7. Shell Programming and Scripting
txt file like this,
1 2 3 4456
a bb c d 3 f e
1 k 32 d m f e
123 m 2 k
every line contains 3 or more columns, all the columns are separated by space, and every column includes 1 to 3 character.
what I wanna do is deleting the first three columns, and keep the rest no matter how long... (7 Replies)
Discussion started by: fedora
7 Replies
8. Shell Programming and Scripting
Keeping in mind that I'm relatively comfortable with programming in general but very new to unix and korn/bourne shell scripts..
I'm using awk on a CSV file, and then performing calculations and operations on specific fields within specific records. The CSV file I'm working with has about 600... (2 Replies)
Discussion started by: yongho
2 Replies
9. Shell Programming and Scripting
One of the monitoring tools in Java is called `jps`, and it monitors all Java processes that are run by the user, an example output would be like this:
3459 Jps
2348 test
2311 Util
where the first column represents Process IDs and the second column represents Java processes names.... (8 Replies)
Discussion started by: neked
8 Replies
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)