Halo Linux Services

» Unix Shell Scripting

  • About Samba and the smbclient Command
  • Acknowledgments
  • Add Logging of Unreachable Machines
  • Adding Exceptions Capability to Monitoring
  • Adding Groups to the Basic Code
  • Adding the Ability to Specify Destinations Individually
  • Aix - 2
  • AIX Isps Command 3
  • AIX Logical Volume Manager LVM
  • AIX Paging Monitor
  • Allin One Paging and Swap Space Monitor
  • Application APIs and SNMP Traps
  • Arrays - 2
  • Automated Event Notification
  • Automated Execution
  • Automated Execution Using a Cron Table Entry
  • Automated FTP Stuff
  • Automated Host Pinging
  • Automated Hosts Pinging with Notification
  • Automating File Transfers and Remote Directory Listings
  • Base 10 Decimal to Base 16 Hexadecimal Shell Script
  • Base 2 Binary to Base 16 Hexadecimal Shell Script
  • Basics of Automating Event Notification
  • Beginning of Main
  • Building a Math Statement for the bc Command
  • Building a Math Statement String for bc
  • Building a New Pseudo Random Password
  • Building the hgrepksh Shell Script
  • Capturing a List of Files Larger than MEG
  • Capturing a Users Keystrokes
  • Chapter - 2 3
  • 1 4 5 6 7 8
  • Checking for Active Oracle Databases
  • Checking for Stale Disk Partitions in AIX
  • Checking for the Keyboard File
  • Checking If the HTTP Server Application Is Working
  • Command Syntax
  • Common Uses
  • Compiling Installing Configuring and Using sudo
  • Compiling sudo
  • Compression
  • Configuring sudo
  • Contents
  • Continuing with the Script
  • Control Functions
  • Create a Bounce Account with a forward File
  • Create a Menu with the select Command
  • Create More Functions
  • Creating a Countdown Indicator
  • Creating a Large File to Use in the Timing Test
  • Creating a Trap
  • Creating Pseudo Random Passwords
  • Creating the floataddksh Shell Script
  • Creating the floatdivideksh Shell Script
  • Creating the floatmultiplyksh Shell Script
  • Creating the floatsubtractksh Shell Script
  • Creating the Menu
  • Creating the Script
  • Creating the Shell Script - 2
  • Creating the Shell Scripts
  • Creating Unique Filenames
  • Define Functions
  • Define the Variables
  • Define Variables
  • Dial Out Modem Software
  • Disk Subsystem Commands
  • Downloading and Compiling sudo
  • Downloading and Installing Samba
  • Emailing the Audit Logs
  • Event Notification - 2
  • Example 231 Converting from Base 10 to Base
  • Example 232 Converting from Base 8 to Base
  • Exceptions Capability
  • File System Monitoring
  • Finding Large Files
  • Floating Point Math and the bc Utility
  • From the
  • Getting One or More Files from a Remote System
  • Here Document and Presenting the Result
  • Hgrep Highlighted grep Script
  • Highlighting Specific Text in a File
  • Hpux - 2
  • HPUX Print Control Commands 3
  • HPUX Swap Space Monitor
  • HPUX swapinfo Command 4
  • Identifying an SSA Disk
  • In This Chapter
  • Indicating Progress with a Rotating Line
  • Indicating Progress with a Series of Dots
  • Info
  • Inform the Users
  • Introduction
  • Linux - 2 3
  • Linux free Command
  • Linux Print Control Commands 4
  • Linux Swap Space Monitor
  • Loading an Array - 2
  • Loading the KEYS Array
  • Log Files
  • Logging - 2
  • Logging root Activity
  • Logging User Activity
  • Mastering Unix Shell Scripting
  • Menu Program Suitable for Operations Staff
  • Method 1 Creating Numbers between 0 and 32767
  • Method 1 Monitoring for Stale PPs at the LV Level
  • Method 10 while LINEline Using File Descriptors
  • Method 11 while LINEline Using File Descriptors
  • Method 12 while line LINE Using File Descriptors
  • Method 2 Creating Numbers between 1 and a User Defined Maximum
  • Method 2 Monitoring for Stale PPs at the PV Level
  • Method 2 while read Filename from Bottom
  • Method 3 Fixed Length Numbers between 1 and a User Defined Maximum
  • Method 3 VG LV and PV Monitoring with a resync
  • Method 3 whileJineLINEBottom
  • Method 6 while LINEline from the Bottom
  • Method 7 cat Filename while LINEline
  • Method 8 while LINEline from the Bottom
  • Method 9 while read LINE Using File Descriptors
  • Modifications to Consider
  • Modify the egrep Statement
  • Modifying Our FTP Scripts to Use Password Variables
  • Monitor and Log as a Process Starts and Stops
  • Monitor for Stale Disk Partitions
  • Monitoring and Auditing User Key Strokes
  • Monitoring for a Process to
  • Monitoring for a Process to Start
  • Monitoring Local Processes
  • Monitoring Other Administration Users
  • Monitoring Paging and Swap Space
  • Monitoring Processes and Applications
  • Monitoring System Load
  • Need Better Security
  • Notification Method
  • Other Options to Consider - 2 3 4 5 6
  • Other Things to Consider
  • Parsing the Command Line for Valid Numbers
  • Passwords
  • Percentage UsedMB Free and Large Filesystems
  • Ping the etchosts File Instead of a List File
  • Pinglist Variable Length Limit Problem
  • Print Queue Hell Keeping the Printers Printing
  • Printing the Managers Password Report for Safe Keeping
  • Problems with Outbound Mail
  • Process Monitoring and Enabling Preprocess Startup and Postprocess Events
  • Progress Indicator Using a Series of Dots a Rotating Line or a Countdown to Zero
  • Pseudo Random Number Generation
  • Putting It All Together - 2
  • Putting One or More Files to a Remote System
  • Randomness
  • Remote Monitoring with Secure Shell
  • Remove the Columns Heading in a Command Output
  • Removing Repeated Lines in a File
  • Replacing Hard Coded Passwords with Variables
  • Reverse Video Control
  • Reverse Video Syntax
  • Root Access and sudo
  • Running on AIX Linux HPUX and Solaris
  • Scheduled Monitoring
  • Script to Create a Software Key Based on the Hexadecimal Representation of an IP Address
  • Script to Translate between Any Number Base
  • Scripting an Uptime Field Test Solution
  • Scripting the Solution - 2
  • Scripting the Solutions
  • Scripting with the iostat Command
  • Scripting with the sar Command
  • Scripting with the uptime Command
  • Scripting with the vmstat Command
  • Scripts for Number Base Conversions
  • Sending a Message to All Users
  • Sending PopUp Messages from Unix to Windows
  • Sending PopUp Messages to Windows
  • Sending the Message
  • Setting a Trap
  • Shell Script to Create Pseudo Random Numbers
  • Show the User the Top CPU Hogs
  • SNMP Traps
  • Software Key Shell Script
  • Solaris - 2 3
  • Solaris Print Control Commands
  • Solaris swap Command
  • Solaris Swap Space Monitor 4
  • Starting the Monitoring Session
  • Stop Chasing the Floating uptime Field
  • Sudoers File
  • Summary - 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
  • Syntax - 2 3 4 5
  • Syntax for iostat
  • Syntax for uptime
  • Syntax for vmstat 6 7 8 9 10 11 12
  • System V versus BSD Printer Subsystems
  • Taking a System Snapshot
  • Testing a String
  • Testing and Parsing Command Line Arguments
  • Testing for a Null Variable
  • Testing for Integers and Floating Point Numbers
  • Testing the smbclient Program the First Time
  • Testing User Input
  • The Exceptions File
  • The Full Shell Script
  • The Methods
  • The Need for sudo
  • The Scripting Process
  • The Scripts
  • The sudo Log File
  • The Whole Shell Script
  • Timed Execution for Process Monitoring Showing each PID and Time Stamp with Event and Timing Capability
  • Timing Command Substitution Methods
  • Timing Each Method
  • Timing Script
  • Translating an hdisk to a pdisk
  • Try to Detect Any Possible Problems for the User
  • Twelve Methods to Parse a File Line by Line
  • Twelve Ways to Process a File Line by Line
  • Usage and User Feedback Functions
  • Using a Here Document
  • Using File Descriptors
  • Using FTP for Directory Listings on a Remote Machine
  • Using getopts to Parse the Command Line - 2
  • Using MB of Free Space with Exceptions
  • Using sar to Measure the System Load
  • Using sudo
  • Using sudo in a Shell Script
  • Using the bc Utility for Floating Point Math
  • Using the Length Variable to Build a Loop List
  • Using the mail and mailx Commands
  • Using the MB of Free Space Method
  • Using the sendmail Command to Send Outbound Mail
  • Using uptime to Measure the System Load
  • What Is the Common Denominator - 2 3 4
  • What Makes a Random Number
  • Where Is the Repository
  • Wiley
  • Landscape Blender

  • Reviews

    • Recover Lost Files Folders
    • Automatic Content Generation with
    • Business Plan Templates
    • Casino Destroyer System
    • World Warcraft Ultimate Guides
    • Increase Traffic to Your Website
    • Direct Mail Strategies
    • Learn Photo Editing
    • Computer Repair Mastery Course
    • Advanced Registry Cleaner PC
  • Popular Articles

    • Kernel Control Paths Linux Kernel
    • The ftpaccess File Linux Network
    • Creating Reverse Mapping Linux
    • The portmap Service Ubuntu Server
    • Discovering Common Features
    • Address 192168664 netmask
    • Demand Allocation Paging Linux
    • Figure 121 TCPIP Isoosi reference
    • The Virtual Clock Linux Kernel
    • Sending Packets to Network Card
    • Doubly linked lists Linux Kernel
    • Memory Barriers Linux Kernel
    • Paging in Linux Linux Kernel
    • The u Area Linux Communications
    • Firewall Log Messages What Do They
  • Categories

    • Ubuntu 8.10 Reference
    • Fedora Linux Secrets
    • Linux Hardware
    • Red Hat Enterprise Linux
    • SUSE Linux Enterprise Server Guide
    • Ubuntu Server Administration
    • Fedora Basics
    • Suse Linux 10 Guide
    • Linux Network Servers
    • SUSE Linux 9 Guide
    • Linux Firewalls
    • Oracle Dba on Linux
    • Upgrading Ubuntu
    • Migrating from RedHat to SUSE
    • Linux Communications
    • Smart Home Automation
    • Linux Security
    • Lotus Domino 6 for Linux
    • SUSE Linux Learning
    • Linux Power Tools
    • Linux Web and FTP Server
    • VirtualBox How To
    • Ubuntu Linux Secrets
    • Fedora 7 Red Hat Enterprise
    • Amazon EC2
    • Linux Installation
    • Debian System Concepts
    • Linux Plus
    • Linux Device Drivers
    • Ubuntu 8.04 Reference
    • Ubuntu Study
    • Solaris to Linux Migration
    • Linux Cluster Computing
    • Firewalls Attack Detection
    • Red Hat Enterprise Linux
    • Snort
    • SUSE Linux Administration
    • SUSE Linux Desktop

About | Contact | Write For Us | Shop | Privacy Policy | Resources