Nmap Development mailing list archives

Re: Review: Angry IP Scanner


From: bensonk () acm wwu edu
Date: Fri, 6 Jun 2008 00:40:53 -0700

cat input | perl -ne 'print int(rand()*99999999)." $_"' | sort -n | perl -ne 's/^\d+ // and print' > output

I call it the frax0r-shuffle (tm) patentz pending all rights reserved ;)

That's a lot of perl overhead.  If you have GNU sort:
cat input | sort -R > output
should achieve the same result.  You can even specify your preferred
source of randomness if you care.  

Benson

Attachment: _bin
Description:


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org

Current thread: