Posted on 1998-07-15
Last Modified: 2010-03-05
I have been using PERL on UNIX system for the past 1 week.
Would like to know, how much is PERL different on Windows systems, if any.
Are there major deviations in running perl scripts over WINDOWS.

Or after working on UNIX there shouldn't be any problems working on WINDOWS env. ???
Question by:sanjaychopra
LVL 51

Expert Comment

ID: 1208433
you just pointed to one of perl's advantages ;-)

Dipite some differences in writing pathnames or calling system routines, perl behaves equal on UNIX and Windoze (perl -e  doesn't work on Win for me)-:

Expert Comment

ID: 1208434
Ummm, that's not entirely true.  Two big differences (both are easily surmountable) are the fact that shebang doesn't work (i.e. #!path-of-perl-executable options) which is only a real problem if you want to have multiple versions of perl, for some reason (i.e. development and production).  Secondly is file-glob'ing must be handled by an external program rather than by the shell as in Unix.

There are a couple of less significant issues; for a list, try downloading perl, building it, and then running make test.
LVL 51

Expert Comment

ID: 1208435
Hey b2pi, #!path-of-perl-executable has nothing to do with perl, it is feature of UNIX shells.
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.


Expert Comment

ID: 1208436
The same thing holds for globbing, _EXCEPT_ under win32.  Nevertheless, those are two features people expect to find, and don't (directly) under win32.
LVL 84

Expert Comment

ID: 1208437

Accepted Solution

theGrayPilgrim earned 0 total points
ID: 1208438
I was a unix programmer for 3 years,
I recently moved to Windows NT, and I can tell you that regarding Perl5, the move was extremely easy (Almost no difference).


Author Comment

ID: 1208439
Thanks a lot for the whole hearted response

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
perl rename 2 137
perl script to count sepecial characters in a file 7 131
Perl string filter 5 65
Perl tar error 8 32
Many time we need to work with multiple files all together. If its windows system then we can use some GUI based editor to accomplish our task. But what if you are on putty or have only CLI(Command Line Interface) as an option to  edit your files. I…
A year or so back I was asked to have a play with MongoDB; within half an hour I had downloaded (,  installed and started the daemon, and had a console window open. After an hour or two of playing at the command …
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now