Perl file to find duplicate files
#!/usr/bin/perl
use strict ;
use warnings;
use File::Find;
use Data::Dumper;
use Digest::MD5;
my $pth = $ARGV[0];
unless ($pth) {
print " perl1 path";
exit ;
}
$\ = $/;
my %size ;
my %unopenfile ;
my %md5;
my @resuts;
my $m5 = Digest::MD5->new;
find( sub {
return if $_ eq '.' ;
return if $_ eq '..';
$size {$File::Find::name} = -s if -f ;
}, $pth ) ;
foreach my $file ( keys %size ){
next if $size{$file} < 1 ;
unless (open (f1, "$file") ) {
$unopenfile{$file}++;
next ;
}
push @{$md5{$m5->addfile(*f1)->hexdigest}}, $file;
close (f1);
}
foreach my $files ( keys %md5){
if ($#{$md5{$files}} >= 1){
push (@resuts, @{$md5{$files}});
}
}
foreach my $dup (@resuts) {
print "the duplicate files are $dup"
use strict ;
use warnings;
use File::Find;
use Data::Dumper;
use Digest::MD5;
my $pth = $ARGV[0];
unless ($pth) {
print " perl1 path";
exit ;
}
$\ = $/;
my %size ;
my %unopenfile ;
my %md5;
my @resuts;
my $m5 = Digest::MD5->new;
find( sub {
return if $_ eq '.' ;
return if $_ eq '..';
$size {$File::Find::name} = -s if -f ;
}, $pth ) ;
foreach my $file ( keys %size ){
next if $size{$file} < 1 ;
unless (open (f1, "$file") ) {
$unopenfile{$file}++;
next ;
}
push @{$md5{$m5->addfile(*f1)->hexdigest}}, $file;
close (f1);
}
foreach my $files ( keys %md5){
if ($#{$md5{$files}} >= 1){
push (@resuts, @{$md5{$files}});
}
}
foreach my $dup (@resuts) {
print "the duplicate files are $dup"
Top IT security certifications that can give you a hike
Bangalore: IT security has been one area that has been relatively resilient even during the recent economic crisis, a research for the first three months of 2010 by Foote Partners noted a jump in pay for professionals working in the IT security business. After speaking to analysts, researchers and representatives from ClearanceJobs.com, eWEEK compiled the hottest
security certifications job hunters currently need.
Application security
Certifications having to do with application security are also very popular. ISC2's Certified Secure Software Lifecycle Professional (CSSLP) certification can help. Other popular certifications are GIAC Secure Software Programmer - Java (GSSP-JAVA) and GIAC Secure Software Programmer - .NET (GSSP-NET).
Auditing prowess
Certified Information Systems Auditor (CISA) has emerged as another hot button security certification of late, according to Foote Partners. Candidates for a CISA certification must pass a test, adhere to the Information Systems Audit and Control Association's Code of Professional Ethics, provide proof of a minimum of five years of professional IS auditing, control, or security work and follow a program of continuing professional education.
Management calls
Increasingly, the Certified Information Systems Security Professional (CISSP) certification has become important, as has Certified Information Security Manager (CISM). CISSP is governed by the International Information Systems Security Certification Consortium (ISC2).
Penetration testing
The Certified Ethical Hacker (CEH) provided by the International Council of E-Commerce Consultants (EC-Council) is a good start for pen testers, as is GIAC's Certified Intrusion Analyst certification, according to ClearanceJobs.com.
Wireless security in demand
The Certified Wireless Security Professional (CWSP) is a wireless LAN certification for the Certified Wireless Network Professional program.
Windows security
GIAC Certified Windows Security Administrator (GCWN) also went up in market value during the first three months of this year, according to Foote Partners.
CheckPoint check list
Foote Partners also found certain CheckPoint certifications rose significantly between January and April, in particular CheckPoint Certified Security Administrator and CheckPoint Certified Security Expert.
Forensics specialists
Forensics has been a growth area as well. CyberSecurity Forensic Analyst and the EC-Council/Certified Hacking Forensic Investigator (CHFI) certifications have seen market value increases in the past year, though the market value of CHFI did not grow in the first three months of the year, according to Foote Partners.
Where - best source for perl scripts example
Where - best source for Perl scripts example ... mostly SYSADMIN stuff
http://www.stonehenge.com/merlyn/LinuxMag/
http://www.stonehenge.com/merlyn/PerlJournal/
http://www.stonehenge.com/merlyn/WebTechniques/
http://oreilly.com/catalog/9780596006396/
http://www.cpan.org/scripts/index.html
http://sourceforge.net/softwaremap/?&fq%5B%5D=trove%3A253&fq%5B%5D=trove%3A176
http://freshmeat.net/tags/systems-administration?page=1&with=437&without=
Subscribe to:
Posts (Atom)