CVTBATCH(8) System Manager's Manual CVTBATCH(8)NAME
cvtbatch - convert Usenet batch file to INN format
SYNOPSIS
cvtbatch [ -w items ]
DESCRIPTION
Cvtbatch reads standard input as a series of lines, converts each line, and writes it to standard output. It is used to convert simple
batchfiles that contain just the article name to INN batchfiles that contain additional information about each article.
Each line is taken as the pathname to a Usenet article. If it is not an absolute pathname, it is taken relative to the spool directory,
<patharticles in inn.conf>. (Only the first word of each line is parsed; anything following whitespace is ignored.)
OPTIONS -w The ``-w'' flag specifies how each output line should be written. The items for this flag should be chosen from the ``W'' flag
items as specified in newsfeeds(5). They may be chosen from the following set:
b Size of article in bytes
f full pathname of article
m article message-id
n relative pathname of article
If the input file consists of a series of Message-ID's, then use grephistory(1) with the ``-s'' flag piped into cvtbatch.
HISTORY
Written by Rich $alz <rsalz@uunet.uu.net> for InterNetNews. This is revision 1.5, dated 1998/04/09.
SEE ALSO grephistory(1), inn.conf(5), newsfeeds(5).
CVTBATCH(8)
Check Out this Related Man Page
GREPHISTORY(1) General Commands Manual GREPHISTORY(1)NAME
grephistory - display file names from Usenet history file
SYNOPSIS
grephistory [ -f filename ] [ -e ] [ -n ] [ -q ] [ -l ] [ -t ] [ -i ] [ -s ] [ messageid ]
DESCRIPTION
Grephistory queries the dbz(3) index into the history(5) file for an article having a specified Message-ID.
If messageid cannot be found in the database, the program prints ``Not found'' and exits with a non-zero status. If messageid is in the
database, the program prints the pathname and exits successfully.
OPTIONS -n If no pathname exists, the program will print ``/dev/null'' and exit successfully. This can happen when an article has been can-
celled, or if it has been expired but its history is still retained. This is default behaviour, which can be obtained by using the
``-n'' flag.
-q If the ``-q'' flag is used, then no message is displayed. The program will still exit with the appropriate exit status.
-t If the ``-t'' flag is used, then only the offset into the history text file is printed.
-e If the ``-e'' flag is used, then grephistory will only print the filename of an existing article.
-l If the ``-l'' flag is used then the entire line from the history file will be displayed.
-i If the ``-i'' flag is used, then grephistory will read a list of Message-ID's on standard input, one per line. Leading and trailing
whitespace is ignored, as are any malformed lines. It will print on standard output those Message-ID's which are not found in the
history database. This flag is used in processsing ``ihave'' control messages.
-s If the ``-s'' flag is used, then grephistory will read a similar list from its standard input. It will print on standard output a
list of filenames for each article that is still available. This flag is used in processsing ``sendme'' control messages.
-f To specify a different value for the history file and database, use the ``-f'' flag.
HISTORY
Written by Rich $alz <rsalz@uunet.uu.net> for InterNetNews. This is revision 1.7, dated 1996/11/08.
SEE ALSO dbz(3), history(5).
GREPHISTORY(1)
Here is a very interesting article on not only hiding data on filesystems (the article deals mainly with the ext2 filesystem, which should also work with etx3), but also recovering, including from slack space on raw blocks, and even deleted data!
... (0 Replies)
Hy,
I wrote new article on Numerical Systems and Transformations yesterday evening (on my C Lessons Project webpage) and would like to share it with you. If someone can help me format my text for this forum, I would appreciate it, so I culd post full article here..
Here's intro:
"Our... (0 Replies)
this is a pretty good article that is a little dated, but still very informative at freeos.com.
since this is Network Security for Dummies Q&A, maybe this should be the first step for unix.com users to check for general and more specific info on how to 'harden' their linux box.
some of this... (8 Replies)
As seen on Digg.com, here is my ip addressing article in full...
Original Subnetting in 11 Steps article
Subnetting in 11 Steps
There are a few things that you will need to know first. I personally use 11 rules that I learned from Mike Vana. Below you will find the 11 rules as well as... (1 Reply)
Following is input:
<P
align="justify"
><FONT size="+1" color="#221E1F">the tiny bundles of hairs that protrude from them. Waves in the fluid of the inner ear stimulate the hair cells. Like the rods and cones in the eye, the hair cells convert this physical stimulation into neural im<FONT... (1 Reply)
Hi,
I recently found this article in computerworld and I think it is very true - at least in my company ... what do you guys think - is the author right? Is it ignorant management that makes us IT people seem to be anti-social and weird?
Please share your thoughts
Kind regards
zxmaus (5 Replies)
Hello,
if I try this (in bash):
#!/bin/bash
cat leercaracter.sh | while read linea
do
# read character by character
echo $linea | while read -n 1 caracter
do
echo $caracter
done
done
New lines, spaces, tabs aren't showed by echo.
How can I 'echo' those characters?... (7 Replies)
I'm trying to find a good keylogger that doesn't come with any viruses. It happens to me several times that my browser crashes when I am in article writing or some other thing, very annoying. Thus, I need a keylogger to keep all my keystroke recorded. I 'v tried some, like the Aobo Mac Keylogger,... (1 Reply)
Dear Concern,
Please go through the article
https://www.unix.com/hp-ux/134072-typing-sign-creates-new-line.html
As per the article, we need to initiate below commands. But after creating new session, we face same problem. Please advise.
stty intr "^c"
stty kill "^u"
Please find below... (6 Replies)
Not sure if this is the right forum but......
This is an article about the difficulties in the engineering of 14nM fabs and lower production techniques.
Semiconductor Engineering .:. Battling Fab Cycle Times
Enjoy... (1 Reply)