9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Am new to this scripting stuff so bear with me.
I got a script made now that reads in a properties file. The properties file is in the following format:
256= Bos, Sea, FRa
I want to be able to read in each line of the file and split out the letter fields by the numbered field. This... (2 Replies)
Discussion started by: vsekvsek
2. Shell Programming and Scripting
A bash script, after some operations, return with an array.
My goal is to calculate some statistical properties (hopefully still in bash) of that array, (like mean, variance, max_value and min_value).
For the max, mean and the min it seems work, but for the variance the notation is... (1 Reply)
Discussion started by: Dedalus
3. UNIX for Dummies Questions & Answers
I do have a line in my code as follows:
if ] ; then
What does the -z does ? Similarly there is -s in some other part of the code. I guess there are many options like this.. Can anybody please tell what all options are available and what do they mean ? (2 Replies)
Discussion started by: risshanth
How can we identify the informations like Author, meta data, dependency and other information from a depot file? (1 Reply)
Discussion started by: sethumadhavan
5. Shell Programming and Scripting
I have a code below but i have problems trying to execute "cat $jpg". Can anybody give me any advise? Is there something wrong with my syntax ?
set qqq = 123
set www = 456
set jpg = ( $qqq $www )
Output: (2 Replies)
Discussion started by: Raynon
6. Shell Programming and Scripting
How can I get heigth and width of an image file?
It's possible to do without ImageMagick or other third libraries??
Thank you very much (3 Replies)
Discussion started by: victorin
7. UNIX for Dummies Questions & Answers
I have noticed that rm -if will perform completely different to rm -fi. Whats the pattern of how I put my options to the script in relation to how it will act.
rm -fi treat the remove as interative but
rm -if treats it as forced
Thansk, Chris. (1 Reply)
Discussion started by: Chiefos
Here are some desirable properties for cryptographic hash functions:
These properties below are generally considered prerequisites:
* Preimage resistant: given h it should be hard to find any m such that h = hash(m).
* Second preimage resistant: given an input m1, it should be hard... (1 Reply)
Discussion started by: newkidintown
9. UNIX for Dummies Questions & Answers
I have set up php shop and it required command line access which i have I executed the install.pl script and everything went OK but when I tried to access the admin foler via the www @ www.helloni.co.uk/shophtml/admin/ i get a forbidden error.
I know I have to change the attribs of the folder... (8 Replies)
Discussion started by: trekker