• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 178
  • Last Modified:

opening another console at run time using system()

Hi I have two questions regarding system call in Unix in C language.

1. What function will I use to be able to open another console by using a system() in C? The scenario is to call an executable file inside the code and that executable will open another console(this is aside from the existing console used at run time).

2. The code is like this :

    /* line 1 : */ char w_temp[100] ;
    /* line 2 : */ strcpy(w_temp,"ls -l tempdir " ) ;
    /* line 3 : */ system(w_temp) ;

    NOTE : tempdir is not an existing directory.

  By executing these lines, the compiler execute   automatically the system call "ls -l tempdir". My aim is not to write "No such file or directory" to the console even if the file/directory is not existing. In this case even if I catch the return of line 3 I cannot control its automatic writing of the result of my command ("ls -l tempdir"). My question is, is there a way for me to control the result of the system call before it writes to the console? Like in this case, I would want the code not to write to the console the result of the string I passed( "ls -l tempdir" ). The string is a parameter for my function.

That's all thank you!
0
keziah0815
Asked:
keziah0815
1 Solution
 
ozoCommented:
#include <string.h>
#include <stdio.h>
#include <stdlib.h>
char w_temp[100] ;
FILE *ptr;
strcpy(w_temp,"ls -l tempdir 2>&1" ) ;
if( ptr = popen(w_temp,"r") ){
    char buf[BUFSIZ];
    while( fgets(buf, BUFSIZ, ptr) ){
       (void) printf("%s", buf);
    }

}
0
 
keziah0815Author Commented:
The code you gave still prints "No such file or directory" on the console. I would like not to write "No such file or directory" on the console.
0
 
jonninCommented:
Can you redirect the output and remove the offending line?
0
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

 
MFCRichCommented:
The offending line is printed to stderr. You could redirect this to /dev/null before the popen() call from ozo's comment and restore it when finished.

As for opening a console, you could fork() and exec() an xterm. Would that accomplish what you want?
0
 
ozoCommented:
#include <string.h>
#include <stdio.h>
#include <stdlib.h>
char w_temp[100] ;
FILE *ptr;
strcpy(w_temp,"ls -l tempdir 2>&1" ) ;
if( ptr = popen(w_temp,"r") ){
   char buf[BUFSIZ];
   while( fgets(buf, BUFSIZ, ptr) ){
      /*(void) printf("%s", buf);*/
   }
}
0
 
Kent OlsenData Warehouse Architect / DBACommented:
No comment has been added lately, so it's time to clean up this TA.

I will leave a recommendation in the Cleanup topic area that this question is:
Accept MFCRich's comment as answer

Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

Kent (Kdo)
EE Cleanup Volunteer
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now