8 More Discussions You Might Find Interesting
1. Programming
Using ECDSA, how do you verify integrity of Data (D), Given the value for the following:
Random number (r)
Signature (s)
ECpublic Key (K)
Thanks. (0 Replies)
Discussion started by: dragonpoint
0 Replies
2. Shell Programming and Scripting
Hello,
I have a file, in which line 40 is commented. It is basically a cron job,
#05,35,50 * * * * /usr/local/scripts/my.sh
how i can i verify the line 40 is commented, if not then give me message not commented, otherwise provide us message it is commented. (5 Replies)
Discussion started by: learnbash
5 Replies
3. Shell Programming and Scripting
hello i have writing a shell script to download and run some packages
the only way that i use to verify download pack is , limit users ip to download from main server, if wget can download file (verified) then script run by execute it sh pack76.sh
else show and error
(stupid solution ha?)
... (8 Replies)
Discussion started by: nimafire
8 Replies
4. Solaris
Guys,
I have a rusty question that I need help with. It has been a while since I supoprted Solaris boxes. I have several hundred solaris systems running Sol 8 and Sol 10. I built the original 250 but they have added several hundred more and I am seeing issues with these boxes that I need to... (2 Replies)
Discussion started by: scottzx7rr
2 Replies
5. Shell Programming and Scripting
Hi eveyone
I am planning to use crontab to delete all files in my donwloads directory that are older than one hour
I will be using crontab to run this script
find /home/kee/downloads/* -daystart -mmin +59 -type f -name -exec rm -r {}\;
could you please let me know if the above... (1 Reply)
Discussion started by: k33k00
1 Replies
6. AIX
Hi,
every midnight hacmp verification is run automatically.
clverify.log says there is no erro bu clutils.log says there is 1 error but when i look at the clverify.log no problem at all.
Below is the output of the clverify.log
what may be the cause of the error in the clutils.log file.
Thanks,... (1 Reply)
Discussion started by: mmersoylu
1 Replies
7. UNIX for Dummies Questions & Answers
I'm really new at this and wondering how I would go about adding code to my script to verify that all records loaded successfully? (I am loading a file into a table) i'm using the Korn shell.
I'm also having trouble verifying parts in the header as i do not really understand the header and... (3 Replies)
Discussion started by: sheranjem
3 Replies
8. Shell Programming and Scripting
I need a simple method to verify that an automated ftp script was successful. The ftp command can exit without error and the file may not have been successfully sent. It's rare, but it happens.
I could write a script that would use md5sum before and after sending the file. But, what I really... (7 Replies)
Discussion started by: gopat
7 Replies
HTABLE(8) System Manager's Manual HTABLE(8)
NAME
htable - convert NIC standard format host tables
SYNOPSIS
/etc/htable [ -c connected-nets ] [ -l local-nets ] file
DESCRIPTION
Htable is used to convert host files in the format specified in Internet RFC 810 to the format used by the network library routines. Three
files are created as a result of running htable: hosts, networks, and gateways. The hosts file may be used by the gethostbyname(3N) rou-
tines in mapping host names to addresses if the nameserver, named(8), is not used. The networks file is used by the getnetent(3N) routines
in mapping network names to numbers. The gateways file may be used by the routing daemon in identifying ``passive'' Internet gateways; see
routed(8C) for an explanation.
If any of the files localhosts, localnetworks, or localgateways are present in the current directory, the file's contents is prepended to
the output file. Of these, only the gateways file is interpreted. This allows sites to maintain local aliases and entries which are not
normally present in the master database. Only one gateway to each network will be placed in the gateways file; a gateway listed in the
localgateways file will override any in the input file.
If the gateways file is to be used, a list of networks to which the host is directly connected is specified with the -c flag. The net-
works, separated by commas, may be given by name or in Internet-standard dot notation, e.g. -c arpanet,128.32,local-ether-net. Htable
only includes gateways which are directly connected to one of the networks specified, or which can be reached from another gateway on a
connected net.
If the -l option is given with a list of networks (in the same format as for -c), these networks will be treated as ``local,'' and informa-
tion about hosts on local networks is taken only from the localhosts file. Entries for local hosts from the main database will be omitted.
This allows the localhosts file to completely override any entries in the input file.
Htable is best used in conjunction with the gettable(8C) program which retrieves the NIC database from a host.
SEE ALSO
intro(3N), gettable(8C), named(8)
BUGS
If the name-domain system provided network name mapping well as host name mapping, htable would no longer be needed.
4.2 Berkeley Distribution May 22, 1986 HTABLE(8)