Perl file to find duplicate files

#!/usr/bin/perl

use strict ;
use warnings;
use File::Find;
use Data::Dumper;
use Digest::MD5;

my $pth = $ARGV[0];
unless ($pth) {
  print " perl1 path";
  exit ;
}
$\ = $/;
my %size ;
my %unopenfile ;
my %md5;
my @resuts;
my $m5 = Digest::MD5->new;

find( sub {
    return if $_ eq '.' ;
    return  if $_ eq  '..';
    $size {$File::Find::name} = -s if -f ;

    }, $pth ) ;

foreach my $file ( keys %size ){
  next if $size{$file} < 1 ;

  unless (open (f1, "$file") ) {
    $unopenfile{$file}++;
    next ;
  }
  push @{$md5{$m5->addfile(*f1)->hexdigest}}, $file;

  close (f1);
}

foreach my $files ( keys %md5){
  if ($#{$md5{$files}} >= 1){
    push (@resuts, @{$md5{$files}});
  }

}

foreach my $dup (@resuts) {
  print "the duplicate files are $dup"

auto indent

need to put in you /root/.vimrc
:set tabstop=2 softtabstop=2 shiftwidth=2 expandtab
--

Top IT security certifications that can give you a hike


Bangalore: IT security has been one area that has been relatively resilient even during the recent economic crisis, a research for the first three months of 2010 by Foote Partners noted a jump in pay for professionals working in the IT security business. After speaking to analysts, researchers and representatives from ClearanceJobs.com, eWEEK compiled the hottest 
security certifications job hunters currently need. 


Application security

Certifications having to do with application security are also very popular. ISC2's Certified Secure Software Lifecycle Professional (CSSLP) certification can help. Other popular certifications are GIAC Secure Software Programmer - Java (GSSP-JAVA) and GIAC Secure Software Programmer - .NET (GSSP-NET).

Auditing prowess

Certified Information Systems Auditor (CISA) has emerged as another hot button security certification of late, according to Foote Partners. Candidates for a CISA certification must pass a test, adhere to the Information Systems Audit and Control Association's Code of Professional Ethics, provide proof of a minimum of five years of professional IS auditing, control, or security work and follow a program of continuing professional education.

Management calls

Increasingly, the Certified Information Systems Security Professional (CISSP) certification has become important, as has Certified Information Security Manager (CISM). CISSP is governed by the International Information Systems Security Certification Consortium (ISC2).

Penetration testing

The Certified Ethical Hacker (CEH) provided by the International Council of E-Commerce Consultants (EC-Council) is a good start for pen testers, as is GIAC's Certified Intrusion Analyst certification, according to ClearanceJobs.com.

Wireless security in demand

The Certified Wireless Security Professional (CWSP) is a wireless LAN certification for the Certified Wireless Network Professional program.

Windows security

GIAC Certified Windows Security Administrator (GCWN) also went up in market value during the first three months of this year, according to Foote Partners.

CheckPoint check list

Foote Partners also found certain CheckPoint certifications rose significantly between January and April, in particular CheckPoint Certified Security Administrator and CheckPoint Certified Security Expert.

Forensics specialists

Forensics has been a growth area as well. CyberSecurity Forensic Analyst and the EC-Council/Certified Hacking Forensic Investigator (CHFI) certifications have seen market value increases in the past year, though the market value of CHFI did not grow in the first three months of the year, according to Foote Partners.

Other Articles

Enter your email address: