9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am trying to perform linear interpolation on three columns in a CSV file.
When I run this code, I do not get any changes in the output (see Expected Output).
What am I doing wrong here?
Awk Code
'
function interpolate(lat1, lon1, t1, lat2, lon2, t2, i) {
for (i = 1; i... (2 Replies)
Discussion started by: hrrruser
2 Replies
2. Shell Programming and Scripting
So, I am writing a script that will read output from Bulk Extractor (which gathers data based on regular expressions). My script then reads the column that has the URL found, hashes it with MD5, then outputs the URL and hash to a file.
Where I am stuck on is that I want to read the bulk... (7 Replies)
Discussion started by: twjolson
7 Replies
3. Solaris
Hello,
I'm having an issue with my password hashing. In /etc/shadow all the passwords hashes start with $1$. The security people want me to change it so the password hash starts with $5$ or $6$. So this is what I did to fix this.
I changed CRYPT_DEFAULT for 1 to 6
CRYPT_DEFAULT=6When I create a... (0 Replies)
Discussion started by: bitlord
0 Replies
4. UNIX for Advanced & Expert Users
I'm collecting some info on the password hashing algorithms in use on various Unix systems. So far I have:
no $ legacy unix crypt
$1$ MD5
$2$ Blowfish on BSD
$2a$ alternate Blowfish on BSD
$md5$ Sun's alternate MD5
$3$ a Microsoft hash
$4$ not used?
$5$ RedHat proposed Sha-256... (2 Replies)
Discussion started by: Perderabo
2 Replies
5. UNIX for Dummies Questions & Answers
What command should I use to analyze file hashing of fixed flat files.
How much work does it take for multiple flat files. (3 Replies)
Discussion started by: jbjoat
3 Replies
6. Programming
Given an in-between(any node not at the start and end of the linked list) node within a singly linear linked list, how to delete that node, when head pointer of list is not given? (13 Replies)
Discussion started by: rupeshkp728
13 Replies
7. Programming
Hi all,
Even after reading many explanation the question still haunting me what's the difference between physical and linear addresses.Can we directly access physical addresses .If not then paging circuitry would have ensure contiguous physical addresses regardless of any linear addresses but this... (2 Replies)
Discussion started by: joshighanshyam
2 Replies
8. UNIX for Dummies Questions & Answers
Hi,
how can one find that which encryption algorithm the system is using for keeping the user password in the /etc/passwd or /etc/shadow file.
Is it
1: Hashing ( which considers only first 5 letters of password)
2: MD5 (Which allows arbitry length passwords)
Thanks,
~amit (0 Replies)
Discussion started by: amit4g
0 Replies
9. UNIX for Dummies Questions & Answers
Dear all
i search a linear RAID Howto for the solaris os. Wiht the help of google and docs.sunc.com i found nothing...
can you share your knowlage wiht me?
thanx
adme (1 Reply)
Discussion started by: adme
1 Replies