1. Write a Shell Script to Check Whether a Particular User Has Logged in Or Not

Total Page:16

File Type:pdf, Size:1020Kb

1. Write a Shell Script to Check Whether a Particular User Has Logged in Or Not CSE ([email protected] II-Sem) EXP-13 1. Write a shell script to check whether a particular user has logged in or not. If he has logged in, also check whether he has eligibility to receive a message or not. [KRISHNASAI@localhost exp13]$ vi 1check.sh function checkuser { f=0; echo "----------------------------------" for u in `who | cut -f1 -d" " | sort | uniq` do who>userlist if [ $u = $1 ] then echo "$1 is available" echo "$1 is logged in " `grep -c $1 userlist` " terminals " echo "$1 is logged at" grep "$1" userlist|cut -d"(" -f2 f=`expr $f + 1` fi done if [ $f -lt 1 ] then echo "user not available" fi } if [ -z $1 ] then echo "Enter username: " read k checkuser $k echo "----------------------------------" exit 1 fi checkuser $1 exit 1 Output: [KRISHNASAI@exp13]$ sh 1check.sh [KRISHNASAI@exp13]$ sh 1check.sh Enter username: Enter username: KRISHNASAI krishna ---------------------------------- ---------------------------------- KRISHNASAI is available krishna is available KRISHNASAI is logged in 1 terminals krishna is logged in 2 terminals KRISHNASAI is logged at krishna is logged at 192.168.1.191) 192.168.1.166) ---------------------------------- 192.168.1.118) ---------------------------------- bphanikrishna.wordpress.com FOSSLAB Page 1 of 38 CSE ([email protected] II-Sem) EXP-13 2. Write a shell script to accept the name of the file from standard input and perform the following tests on it a) File executable b) File readable c) File writable d) Both readable & writable [krishnasai@exp13]$ vi 2fp.sh Output: echo enter a file name read file [krishnasai@exp13]$sh 2fp.sh if [ -e $file ] enter a file name then h1 echo "$file exists" h1 exists if [ -f $file ] h1 is an ordinary file then h1 does not have read access echo "$file is an ordinary file" h1 has write permission if [ -r $file ] h1 has execute permission then echo "$file has read access" else echo "$file does not have read access" fi if [ -w $file ] then echo "$file has write permission" else echo "$file does not have write permission" fi if [ -x $file ] then echo "$file has execute permission" else echo "$file does not have execute permission" fi if [ -r $file ] && [ -w $file ] then echo "$file has both read and write operations" fi elif [ -d $file ] then echo "$file is a directory" fi else echo "$file does not exist" fi bphanikrishna.wordpress.com FOSSLAB Page 2 of 38 CSE ([email protected] II-Sem) EXP-13 3. Write a shell script which will display the username and terminal name who login recently in to the unix system [KRISHNASAI@Host exp13]$ vi 3.ut.sh today=$(date +"%A") tday=$(date +"%d-%B-%Y") time=$(date +"%r ||%z ") echo "Today is :$today" echo "Today date is :$tday" echo "Time :$time" who>userlist i=0 for u in `who|cut -d" " -f1` do i=`expr $i + 1` done echo "Total number of users are : $i " echo "login user details in `date +"%D %H-%M-%S "`" echo "---------------------------------" echo "USER TERMINAL" echo "=================================" who|cut -d" " -f1>u who|cut -d"(" -f2>t paste u t echo "---------------------------------" Syntax Time only [KRISHNASAI@Host exp13]$ sh 3.ut.sh date +"%FORMAT" Today is :Tuesday Type the following Today date is :10-March-2015 $ date +"%m-%d- command: Time :05:58:18 PM ||+0530 %y" $ date +"%T" Total number of users are : 2 Sample output: login user details in 03/10/15 17-58-18 Outputs: --------------------------------- 02-27-07 USER TERMINAL 19:55:04 ================================= CSESTAFF 192.168.1.219) 149P1A0521 192.168.1.118) --------------------------------- bphanikrishna.wordpress.com FOSSLAB Page 3 of 38 CSE ([email protected] II-Sem) EXP-13 4. Write a shell script to find no. of files in a directory [KRISHNASAI@localhost exp13]$ vi 4.sh f=0 d=0 for i in `ls -l|cut -c 1` do if [ $i = "-" ] then f=`expr $f + 1` elif [ $i = "d" ] then d=`expr $d + 1` fi done echo no of ordinary files are $f echo no of directories are $d [KRISHNASAI@localhost exp13]$ ls 14palendrom.sh 17fact.sh 3data.sh 4.sh kkk [KRISHNASAI@localhost exp13]$ sh 4.sh no of ordinary files are 4 no of directories are 1 bphanikrishna.wordpress.com FOSSLAB Page 4 of 38 CSE ([email protected] II-Sem) EXP-13 5. Write a shell script to check whether a given number is perfect or not [KRISHNASAI@exp13]$ cat [KRISHNASAI@localhost exp13]$ cat 5perfect.sh 5perfecta.sh echo "Enter a number:" n=1 read n while [ $n -lt 500 ] i=1 do sum=0 i=1 while [ $i -lt $n ] sum=0 do while [ $i -lt $n ] if [ `expr $n % $i` -eq 0 ] do then if [ `expr $n % $i` -eq 0 ] sum=`expr $sum + $i` then fi sum=`expr $sum + $i` i=`expr $i + 1` fi done i=`expr $i + 1` if [ $sum -eq $n ] done then if [ $sum -eq $n ] echo "$n is a perfect number" then else echo "$n is a perfect number" echo "$n is not a perfect number" fi fi n=`expr $n + 1 ` done [KRISHNASAI@ exp13]$ sh [KRISHNASAI@exp13]$ sh 5perfecta.sh 5perfect.sh 6 is a perfect number Enter a number: 28 is a perfect number 6 496 is a perfect number 6 is a perfect number [KRISHNASAI@lexp13]$ sh 5perfect.sh Enter a number: 22 22 is not a perfect number Description: A perfect number: a number is perfect when the sum of its divisors (except the number itself) equals the given number. Examples of perfect numbers 6 : The divisors of 6 are 1,2,3 & 6. To show that this is a perfect number we could all the divisors except the number itself 1+2+3 = 6 28: 1 + 2 + 4 + 7 + 14 =28 496 and 8128 are also perfect number. bphanikrishna.wordpress.com FOSSLAB Page 5 of 38 CSE ([email protected] II-Sem) EXP-13 6. Write a menu driven shell script to copy, edit, rename and delete a file [KRISHNASAI@localhost exp13]$ vi 6fop.sh ch=0 while [ $ch -ne 9 ] do clear echo "1.Display current dir" echo "2.Listing the dir" echo "3.Make a dir" echo "4.Copy a file" echo "5.Rename file" echo "6.Delete file" echo "7.Edit file" echo "8.open or display file" echo "9.Exit" echo "Enter your choice" read ch case $ch in 1)echo "Current Dir is : " pwd;; 2)echo "Directories are" ls;; 3)echo "Enter dir name to create" read d mkdir $d echo $d" Dir is created";; 4)echo "Enter filename from copy" read f1 echo "Enter filenm2 to be copied" read f2 cp $f1 $f2 echo $f2" is copied from "$f1;; 5)echo "Enter file name to rename" read f1 echo "Enter new name of file" read f2 mv $f1 $f2 echo $f1" is renamed as "$f2;; 6)echo "Enter any filenm to be delete" read f1 rm $f1 echo $f1" is deleted";; 7)echo "Enter any file to be editing " read f1 vi $f1;; 8) echo "Enter the file name you want to open" read f1 cat $f1;; 9)echo "Have a nice time" exit;; *)echo "Invalid choice entered";; bphanikrishna.wordpress.com FOSSLAB Page 6 of 38 CSE ([email protected] II-Sem) EXP-13 esac echo "are you continue (1 for yes / 0 for No)" read temp if [ $temp -eq 0 ] then ch=9 fi done Output: [KRISHNASAI@localhost exp13]$sh 6fop.sh 1.Display current dir Enter your choice 2.Listing the dir 5 3.Make a dir Enter file name to rename 4.Copy a file kkkk 5.Rename file Enter new name of file 6.Delete file srisai 7.Edit file kkkk is renamed as srisai 8.open or display file 9.Exit Enter your choice Enter your choice 1 6 Current Dir is : Enter any filenm to be delete /home/KRISHNASAI/krishna/foss/exp13 h1 are you continue (1 for yes / 0 for No) h1 is deleted Enter your choice Enter your choice 2 7 Directories are Enter any file to be editing 13delz.sh 15amga.sh Krish Enter your choice Enter your choice 3 8 Enter dir name to create Enter the file name you want to open srisai krish srisai Dir is created alway say i don't have fear are you continue (1 for yes / 0 for No) be a hero bphanikrishna.wordpress.com FOSSLAB Page 7 of 38 CSE ([email protected] II-Sem) EXP-13 7. Write a shell script for concatenation of two strings Program: Output: [KRISHNASAI@exp13]$ cat 7concat.sh [KRISHNASAI@exp13]$ sh 7concat.sh echo Enter first string: Enter first string: read s1 krishna echo Enter second string: Enter second string: read s2 sai s3=$s1$s2 Concatinated string:- krishnasai len=${#s3} krishnasai length:- 10 echo Concatinated string:- $s3 echo $s3 length:- $len 8. Write a shell script which will display Fibonacci series up to a given number of argument. [KRISHNASAI@localhost exp13]$ cat [KRISHNASAI@localhost exp13]$ cat 8fib.sh 8fiba.sh echo enter the number of terms for n in $* read n do f1=0 f1=0 f2=1 f2=1 i=3 i=3 echo "fibonacci seroes up to $n numbers" echo "fibonacci seroes up to $n numbers" echo $f1 echo $f1 echo $f2 echo $f2 while [ $i -le $n ] while [ $i -le $n ] do do f3=`expr $f1 + $f2` f3=`expr $f1 + $f2` f1=$f2 f1=$f2 f2=$f3 f2=$f3 i=`expr $i + 1` i=`expr $i + 1` echo $f3 echo $f3 done done exit 0 done exit 0 [KRISHNASAI@localhost exp13]$ sh [KRISHNASAI@localhost exp13]$ sh 8fib.sh 8fiba.sh 4 enter the number of terms fibonacci seroes up to 4 numbers 9 0 fibonacci seroes up to 9 numbers 1 0 1 1 2 1 2 3 5 8 13 21 awk 'BEGIN {a=0;b=1; while(++x<=10){print a; t=a;a=a+b;b=t}; exit}' bphanikrishna.wordpress.com FOSSLAB Page 8 of 38 CSE ([email protected] II-Sem) EXP-13 9.
Recommended publications
  • Mac Os Serial Terminal App
    Mac Os Serial Terminal App Panting and acetous Alaa often scag some monoplegia largo or interdict legitimately. Tourist Nikita extemporised or Aryanised some dop quick, however unsectarian Merwin hectograph globularly or emotionalize. Germaine is know-nothing and sodomizes patronizingly as modiolar Osborne bug-outs unconstitutionally and strides churchward. Can choose a usb to dim the app mac os sector will happen, and act as commented source code is anyone else encountered this Tom has a serial communication settings. Advanced Serial Console on Mac and Linux Welcome to. Feel free office helps you verify that makes it takes a terminal app mac os is used for a teacher from swept back. Additionally it is displayed in the system profiler, you can also contains a cursor, you can i make use these two theme with the app mac os is designed to. Internet of Things Intel Developer Zone. Is based on the latest and fully updated RPiOS Buster w Desktop OS. Solved FAS2650 serial port MAC client NetApp Community. Mac Check Ports In four Terminal. A valid serial number Power Script Language PSL Programmers Reference. CoolTerm for Mac Free Download Review Latest Version. Serial Port Drivers and Firmware Upgrade EV West. Osx ssh If you're prompted about adding the address to the heritage of known hosts. This yourself in serial terminal open it however, each device node, i have dozens of your setting that the browser by default in case. 9 Alternatives for the Apple's Mac Terminal App The Mac. So that Terminal icon appears in the Dock under the recent apps do the.
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Administration Guide
    DSLMAX™ Administration Guide Part Number: 7820-0393-003 For software version 8.0 April 2000 Copyright© 2000 Lucent Technologies. All rights reserved. This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected]. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change. Safety, Compliance, and Warranty Information Before handling any Lucent Access Networks hardware product, read the Access Networks Safety and Compliance Guide included in your product package. See that guide also to determine how products comply with the electromagnetic interference (EMI) and network compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent Technologies provides for its products. Security Statement In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features. Trademarks 4ESS, 5ESS, A Network of Expertise, AnyMedia, AqueView, AUDIX, B-STDX 8000, B-STDX 9000, ...Beyond Compare, CaseView, Cajun, CajunDocs, CAJUNVIEW, Callmaster,
    [Show full text]
  • User Guide for Uplogix Local Managers
    User Guide for Uplogix Local Managers Version 4.7 July 2014 uplogix.com Information in this document is subject to change without notice. © 2014 Uplogix, Inc. All Rights Reserved. Uplogix, the Uplogix logo, and SurgicalRollback are trademarks of Uplogix, Inc. in the United States and other jurisdictions. All other marks referenced are those of their respective owners. Uplogix, Inc. 7600-B North Capital of Texas Highway Suite 220 Austin, Texas 78731 USA Contents About this guide ..................................................................................................... 1 Target audience .................................................................................................................... 1 Typographical conventions ..................................................................................................... 1 Safety summary ................................................................................................................... 2 Uplogix Glossary ................................................................................................................... 3 Introduction to the Uplogix Local Manager ............................................................ 4 Chassis views and indicator lights ........................................................................................... 4 Uplogix 5000 ..................................................................................................................... 4 Uplogix 500 ......................................................................................................................
    [Show full text]
  • USB to RS-232 Adapter Driver Installation Manual
    USB to RS-232 Adapter Driver Installation Manual For Win OS 98SE/ME/2000/XP/Vista/7/8/8.1/10; Win server OS 2008/2008R2/2012, Mac OS Contents Introduction Features & Specifications System Requirements Installing the Device Uninstalling the Device Disclaimer Introduction The USB to RS-232 adapter is your smart and convenient accessory for connecting RS-232 devices to your USB equipped Windows host computer. It provides a bridge connection with a standard DB-9 pin male RS-232 port connector in one end and a standard Type A USB plug connector on the other end. You simply attach the RS-232 device onto the RS-232 port of the cable and plug the USB connector into your PC USB port. It allows a simple and easy way of adding RS-232 connections to your PC without having to go thru inserting a RS-232 card and traditional port configuration. This USB to RS-232 adapter is ideal for connecting modems, cellular phones, PDAs, digital cameras, card readers and other RS-232 devices to your computer. It provides RS-232 connections up to 250Kbps of data transfer rate. And since USB does not require any IRQ resource, more devices can be attached to the system without the previous hassles of device and resource conflicts. Finally, the USB to RS-232 adapter is a fully USB Specification compliant device and therefore supports advanced power management such as suspend and resume operations as well as remote wakeup. The USB to RS-232 cable adapter is designed to work on Windows operating systems.
    [Show full text]
  • Mac Serial Terminal Program
    Mac Serial Terminal Program sprauchleWillard still illuminatingly. manhandled oviparously while inferrible Wynn paganised that bedstraw. Kelly matt tempestuously? Meniscoid Chase When a friends and will still worked under the serial terminal program the clients Serial port device events via Mac Applications CoolTerm Application from the creator simple serial-port terminal application no terminal emulation. Three Alternatives to Arduino's Serial Monitor Bald Engineer. Transform your mac program to the widgets where the features of new best serial consoles at the internet on. In excel window might be displayed the MAC addresses aka physical. Unix programs but we are doing anything that becomes a mac? Check which serial port is being used for the device. Open terminal program that you have their respective device is also be eol, terminal emulator that both have had terminals of airconsole ready for superior image. Your salesperson is working perfectly. I answer the 'serial' program though which is late most stable serial console interface I've pool for mac. The 32-bit builds are still available and table be downloaded here Mac Win. I saw have the USB-to-Serial adapter All I need until a program that instance can out to name up the com port I'm looking because the screen option built into the terminal. Run Python code to commence out serial output from Mac OX Lion. Com port for mac os x folder, if there is powered usb connected hardware serial port! If lan settings can choose from arduino information using a select your very well if you type emulation program is not worth creating a signed state.
    [Show full text]
  • Origin™ 200 and Origin 200 Gigachannel™ Owner's Guide
    Origin™ 200 and Origin 200 GIGAchannel™ Owner’s Guide Document Number 007-3708-002 CONTRIBUTORS Written by Kameran Kashani and Carolyn Curtis Illustrated by Francesca Angelesco, Cheri Brown, and Kameran Kashani Production by Carlos Miqueo Engineering contributions by Jim Gath, Jeffrey Heller, Dave Parry, Ken Hibbard, Eric Williams, Demick Boyden, Steve Smithson, Dilip Amin, Richard Wright, Brad Morrow, Matt Robinson, Tim Wong, Tom Jackman, and Carl Strasen St. Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © 1996-1999, Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94043-1389. Silicon Graphics, Indigo, CHALLENGE, and Onyx are registered trademarks and the Silicon Graphics logo, O2, Origin, Origin200, XFS, IRIS InSight, Personal IRIS, Onyx2, POWER Series, Indigo2, IRIX, and SGI are trademarks of Silicon Graphics, Inc. Indy is a registered trademark, used under license in the U.S. and owned by Silicon Graphics, Inc.
    [Show full text]
  • MAX™ Administration Guide
    MAX™ Administration Guide Part Number: 7820-0678-001 For software version 8.0.1 March 2000 Copyright© 2000 Lucent Technologies. All rights reserved. This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected]. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change. Safety, Compliance, and Warranty Information Before handling any Lucent Access Networks hardware product, read the Access Networks Safety and Compliance Guide included in your product package. See this guide also to determine how products comply with the electromagnetic interference (EMI) and network compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent Technologies provides for its products. Security Statement In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features. Trademarks 4ESS, 5ESS, A Network of Expertise, AnyMedia, AqueView, AUDIX, B-STDX 8000, B-STDX 9000, ...Beyond Compare, CaseView, Cajun, CajunDocs, CAJUNVIEW, Callmaster,
    [Show full text]
  • HOWTO Terminal Texte Pour Linux
    HOWTO Terminal Texte pour Linux David S. Lawyer <mailto:[email protected]> , traduit par Julien Garnault <mailto:judge@ club-internet.fr> v1.09, 28 Novembre 1999 Ce document explique ce que sont les terminaux en mode texte, comment ils fonctionnent, comment les installer et les configurer, et fournit des informations sur la mani`ere de les r´eparer. Cela peut ˆetre utile mˆeme si vous n’avez pas le manuel du terminal. Bien qu’il soit ´ecrit pour de vrais terminaux reli´es`aun syst`eme Linux, certaines informations de ce manuel sont applicables `al’´emulation de terminal et peuvent ˆetreutiles pour des syst`emes diff´erentsde Linux. Contents 1 Introduction 10 1.1 Copyright, marques d´epos´ees, avertissement et cr´edits ...................... 10 1.1.1 Copyright ........................................... 10 1.1.2 Avertissement ......................................... 11 1.1.3 Marques d´epos´ees ...................................... 11 1.1.4 Cr´edits ............................................ 11 1.2 Plans pour l’avenir : vous pouvez m’aider ............................. 11 1.3 Nouvelles versions de ce HOWTO .................................. 12 1.4 HOWTOs connexes .......................................... 12 1.5 Terminologie utilis´eedans ce document .............................. 12 1.6 Qu’est-ce qu’un terminal ? ...................................... 12 2 Types de terminaux 13 2.1 Terminaux passifs .......................................... 13 2.2 Terminaux texte ........................................... 13 2.3 Terminaux graphiques ........................................ 14 2.3.1 Terminaux graphiques sur ligne s´erie ............................ 14 2.3.2 Terminaux graphiques rapides (d’autres noms leur sont souvent donn´es) ........ 14 2.4 Network Computers (NC, ordinateurs de r´eseau) ......................... 15 2.5 Emulation´ sur un PC ......................................... 15 3 Installation rapide 15 4 Pourquoi utiliser un terminal ? 16 4.1 Introduction sur le fait d’utiliser un terminal ..........................
    [Show full text]
  • ANSI Escape Code - Wikipedia
    11/12/2017 ANSI escape code - Wikipedia ANSI escape code ANSI escape sequences are a standard for in-band signaling to control the cursor location, color, and other options on video text terminals. Certain sequences of bytes, most starting with Esc and '[', are embedded into the text, which the terminal looks for and interprets as commands, not as character codes. ANSI sequences were introduced in the 1970s to replace vendor-specific sequences and became widespread in the computer equipment market by the early 1980s. They were used by the nascent bulletin board systems to offer improved displays compared to earlier systems lacking cursor movement, a primary reasons they became a standard adopted by all manufacturers. Although hardware text terminals have become increasingly rare in the 21st century, the relevance of the ANSI standard persists because most terminal emulators interpret at least some of the ANSI escape sequences in output text. One notable exception was the Win32 console of Microsoft Windows before Windows 10 update TH2.[1] Contents 1 History 2 Platform support 2.1 Windows and DOS 3 Escape sequences 4 CSI sequences 5 SGR (Select Graphic Rendition) parameters 6 Colors 6.1 3/4 bit 6.2 8-bit 6.3 24-bit 7 Examples 7.1 Example of use in shell scripting 8 Invalid and ambiguous sequences in use 9 See also 10 Notes 11 References 12 External links History Almost all manufacturers of video terminals added vendor-specific escape sequences to perform operations such as placing the cursor at arbitrary positions on the screen. One example is the VT52 terminal, which allowed the cursor to be placed at an x,y location on the screen by sending the ESC character, a y character, and then two characters representing with numerical values equal to the x,y location plus 32 (thus starting at the ASCII space character and avoiding the control characters).
    [Show full text]
  • Giga-ROM 2.0 Index
    Giga-ROM Archives version 2.0 ASCII Text Index This listing file was generated by FileTree™, a ShareWare program written and copyright © 1986, 1987 by Jody S. Kravitz. Your financial support is encouraged. Thank you. Size File Name ------ -------------------- Giga-ROM™ 2.0: Giga-ROM™ 2.0:Art: Giga-ROM™ 2.0:Art:Applications: 27233 Giga-ROM™ 2.0:Art:Applications:3D-Edit 43676 Giga-ROM™ 2.0:Art:Applications:Buggli 71129 Giga-ROM™ 2.0:Art:Applications:DesignerDr 7224 Giga-ROM™ 2.0:Art:Applications:Drawpaint 17664 Giga-ROM™ 2.0:Art:Applications:EarthQuake! v1.0 52392 Giga-ROM™ 2.0:Art:Applications:EscherDraw 38640 Giga-ROM™ 2.0:Art:Applications:EZP 104364 Giga-ROM™ 2.0:Art:Applications:GreyV 8600 Giga-ROM™ 2.0:Art:Applications:JoyPa 49942 Giga-ROM™ 2.0:Art:Applications:MacBillboard 39493 Giga-ROM™ 2.0:Art:Applications:MandelZot 1.4.1 7731 Giga-ROM™ 2.0:Art:Applications:Microbe Swarm 7194 Giga-ROM™ 2.0:Art:Applications:Pet 7432 Giga-ROM™ 2.0:Art:Applications:ShowGIF 3644 Giga-ROM™ 2.0:Art:Applications:ThrowPaint™ 12139 Giga-ROM™ 2.0:Art:Applications:ViewPaint 68618 Giga-ROM™ 2.0:Art:Applications:XVT-D Giga-ROM™ 2.0:Art:Demos: 7786 Giga-ROM™ 2.0:Art:Demos:4-D Cube 6835 Giga-ROM™ 2.0:Art:Demos:AniR 4731 Giga-ROM™ 2.0:Art:Demos:Boxes 3307 Giga-ROM™ 2.0:Art:Demos:BrainDamag 1267 Giga-ROM™ 2.0:Art:Demos:Brownian Motion 4429 Giga-ROM™ 2.0:Art:Demos:Bubba 4789 Giga-ROM™ 2.0:Art:Demos:Chaos 1 53775 Giga-ROM™ 2.0:Art:Demos:Chaos v1.0 5550 Giga-ROM™ 2.0:Art:Demos:Christmas Wish 4292 Giga-ROM™ 2.0:Art:Demos:Circles 3526 Giga-ROM™ 2.0:Art:Demos:Convert
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]