
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Write two scripts called encryption and decryption. Test both scripts by encrypting a file called
file1 and save the result in file2. Then use file2 as the input to the decryption script and check if
the output is the same as file1.
May I get help with this in bash shell please?
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps

Knowledge Booster
Similar questions
- Running a flawed software has unknown repercussions. What will happen after the code for frmProgram is written? Is it possible to display the event handler for the command button? What exactly does the Unload Me statement serve? Why is it necessary to have executable files?arrow_forwardWrite a script that gets from a user a paragraph of plaintext and a distance value. Then output this paragraph into an encrypted text using a Caesar cipher. Write this text to a file called 'encryptfile.txt. Then read this file and write it to a file named 'copyfile.txt' I do not know how to apply the algorithm and how to save itarrow_forwardWrite a function extractData in your shell script wparser.bash. This function will perform the core processing logic associated with each file. The main script will just iteratively call this function with different files as its argument. USE grep, awk, sed, find This function should accept a data file as its argument. This function should then produce an output of the following format that that contains only the temperature and wind information from the sensors along with a header. (see image; truncated for brevity). A clean format of data like this form can be used by various information processing systems. The script is basically only including the year, month, day and hour information, followed by the temperature reported by each temperature sensor, and wind speed from wind sensors at that time. If a temperature sensor’s reading is NOINF or MISSED SYNC STEP in the original data file for that particular time, the script must instead output the previous readout for that…arrow_forward
- The Problem: There's no shortage of people who have a great idea abouthow to speed up the build. They have all sorts of reasons why their pet idea willlet you complete a five day build in 3.8 seconds.For example, the gcc compiler has the -pipe option. Normally thecompiler will run the first pass of the compiler and write the output to atemporary file. Then pass 2 will read this file and write a second temporary. Andso on for however many passes are needed.With the -pipe option every pass is run at the same time the output of oneconnected to the input of the next through a pipe. The theory is that by doingthis you eliminate the temporary file, the disk I/O for the temporary file and doeverything in memory.So the -pipe option must make things faster. And if we needed moreconvincing we can take a look at the kernel Makefiles and find that the option isused there and if the Linux kernel uses it, then it must be good.arrow_forwardWrite a shell program that renames all files in the current directory. It should remove all vowels from the filenames. For example, apple.txt should be renamed ppl.txt. If the resulting filename is an empty string, then the file should not be renamed.arrow_forwardPlease answer the following Bash question, please show your output as well. 1. Write a Bash function named ‘Generate-ID' that generates all possible UGA student id start with 900. The output should be saved into a file named studentID.csv. 2. Write a Bash function named ‘Find_word’ that read wordlist.txt file to find all words end with “ing” and output these words to WordEndIng.csv. 3. The auth.log file (path: /var/log/auth.log) and syslog file (path: /var/log/syslog) are two of the most important log files in Linux. Generally, adversaries target these files so that system administrators couldn’t track what attackers are doing. Write a function named get-linuxlog() that reads all the above two files and stores them into a file named linuxeventlog.txt (Hint use the ‘cat’ command)arrow_forward
- I need help with my code i need to ask the user for a filename. Display the oldest car for every manufacturer from that file. If two cars have the same year, compare based on the VIN. my code is not working properly, it is just dipslaying exactly what is in the file that the user inputs here is the code import java.io.BufferedReader;import java.io.FileReader;import java.util.Comparator;import java.io.File;import java.io.FileNotFoundException;import java.util.ArrayList;import java.util.Collections;import java.util.Scanner;class Car {private String makeModel;private int year;private String VIN;public Car(String makeModel, int year, String VIN) {this.makeModel = makeModel;this.year = year;this.VIN = VIN;}public String getMakeModel() {return makeModel;}public int getYear() {return year;}public String getVIN() {return VIN;}}class Assignment8_2 {private static int minIndex(ArrayList<Car> cars, int i, int j) {if (i == j)return i;int k = minIndex(cars, i + 1, j);if…arrow_forwardhelp me rewrite the code without using bufferReader pleasearrow_forwardAlice used a password to create a zip file secret.zip which contains only a secret.txt file. The secret.txt file contains really important information that Alice would like to access. Unfortunately, Alice forgot the password she used to create the zip file. Alice only remembers that the password is a six-digit password.Given the secret.zip file, you are asked to help Alice to recover the password with an implementation in Python.arrow_forward
- You shall implement a Microshell, “MSH”. MSH shall provide the following functions: Provide a shell-like interface for launching new programs: When MSH starts running, it will print a prompt "cssc0000% " (replace cssc0000 with your username) and then wait for the user to type in a file name. Note, MSH will NOT have any shell built-in functions (such as cd, setenv, printenv, bg, fg, etc), with the exception of #5 (below). When the user enters a filename and hits the “enter” key, MSH then reads the filename entered and determines if the file is an executable file. If it isn't, MSH will print a useful error message to the user and then return to #1 above (display a new prompt and wait for user input). If it is an executable file, then MSH will create a new process and run this program in the new process. Note – you will need to determine whether the filename is a fully qualified path name or if the file needs to be searched for (fully qualified pathnames begin with a slash (i.e. "/"),…arrow_forwardHow do we tell the bash shell to set the primary prompt?arrow_forwardWrite a java code. Create a new text file (.txt) in your computer from your java program. Use FileOutputStream class to write the content into this new text file. The content into this file should be written from the existing text file in your computer. Use FileInputStream class to read the content from the existing text file.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY