GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
PLEASE NOTE: All LQ Rules apply to the General forum. Flame wars, personal attacks, hostility, insults and behavior of that nature will not be tolerated. Differing opinions are one of the things that make this site great, but to benefit from differing opinions the discourse must happen respectfully and thoughtfully... without insult or personal attack. Members who are unable or unwilling to participate in General under those parameters will not be permitted to do so. If you see behavior of this nature please report it.
I have a flat file and the data in it is having the following format.
4AGDA, 211, 51LN39, 4AGDI, 216, 15, 45ACCUNET Generic Digital Access Local Channels
(Only 1 row is shown).
This as you can see is a comma delimited file. I want to do the follwing manipulation.
Copy the last 4 characters from field1 (ie AGDA)
Copy the last 2 characters from field2 (ie 11)
Copy the last 5 characters from field3 (ie 1LN39)
Copy the last 4 characters from field4 (ie AGDI)
Copy the last 2 characters from field5 (ie 16)
Copy the last character from field6 (ie 5)
Leaving the first 2 characters and copying the rest of the data from field7 (ie 45ACCUNET Generic Digital Access Local Channels)
and then print the result in a new file. This is to be done for all the rows in that falt file.
Please help me with the commands or programming conceptsb to achieve the above functionality.
gee, are you a kiddie??
a cracker that calls himself a hacker??
i may be misunderstanding whats behind that screenname, but i dont think i am
I'm not phishing for anything. But, I do like to go fishing, particularly for trout, walleye, northern pike, perch, white bass, and crappies.
I don't trade fish, but I do trade live Phish recordings as well as recordings of other jambands. In the past, I did this mostly through my ftp server and BnPs, although these days I'm using bittorrent as it is a much more efficient use of my time. All done legally, as Phish allows the trading of their audience recordings.
Not a kiddie, not a cracker (but I am caucasian), and my last hack was building a low impedence microphone to use with a harmonica and a guitar amp for less than $12 in parts from a local electronics shop.
Yes, I think you're misunderstand what's behind my screenname.