Nmap Development mailing list archives
Re: Review: Angry IP Scanner
From: bensonk () acm wwu edu
Date: Fri, 6 Jun 2008 00:40:53 -0700
cat input | perl -ne 'print int(rand()*99999999)." $_"' | sort -n | perl -ne 's/^\d+ // and print' > output I call it the frax0r-shuffle (tm) patentz pending all rights reserved ;)
That's a lot of perl overhead. If you have GNU sort: cat input | sort -R > output should achieve the same result. You can even specify your preferred source of randomness if you care. Benson
Attachment:
_bin
Description:
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Review: Angry IP Scanner Kris Katterjohn (Jun 05)
- Re: Review: Angry IP Scanner doug (Jun 05)
- Re: Review: Angry IP Scanner Fyodor (Jun 05)
- Re: Review: Angry IP Scanner Brandon Enright (Jun 05)
- Re: Review: Angry IP Scanner doug (Jun 06)
- Re: Review: Angry IP Scanner bensonk (Jun 06)
- Re: Review: Angry IP Scanner Brandon Enright (Jun 06)
- Re: Review: Angry IP Scanner doug (Jun 06)
- Re: Review: Angry IP Scanner doug (Jun 06)