Solved

.\errorlogs - What is it?

Posted on 2004-08-06
2
285 Views
Last Modified: 2010-04-22
Hi,

I run a program in Linux and I found out that in the same directory, there is some entry as ".\errorlogs"
I try to find out what it is by using ls -alrt .\errorlogs
but I got: no such file or directory

If you know what it is and why such a things comes up inside the directory, please help,

Thanks,

Rfr1tz

0
Comment
Question by:rfr1tz
2 Comments
 
LVL 45

Assisted Solution

by:sunnycoder
sunnycoder earned 50 total points
ID: 11740174
Hi rfr1tz,

sounds like your application is maintaining a log of all the errors that it encountered
just do a
ls -al | grep error
in that directory to see the file/directory name and try to access it again

Sunnycoder
0
 
LVL 23

Accepted Solution

by:
brettmjohnson earned 200 total points
ID: 11741348
> I run a program in Linux and I found out that in the same directory, there is some entry as ".\errorlogs"
> I try to find out what it is by using ls -alrt .\errorlogs
> but I got: no such file or directory

It sounds like this program was originally written for MS-DOS (or Windows).
and sloppily ported to Linux.
The MS-DOS pathname separator is backslash (\) whereas the Unix pathname
separator is forward slash (/).  (The Microsoft engineer who chose backslash says
it is the biggest regret of his career.) The code is attempting to create a file called
"errorlogs" in the current directory.  However the backslash is not interpreted as
a pathname delimiter on Linux, so it is creating a file called ".\errorlog".

Now, the Unix shell interprets backslash as a "quote-next-character", so when
you say 'ls .\errorlogs", it thinks you are quoting the 'e' (which didn't really need
quoting, but you're the boss) so it gives you an error when it doesn't see ".errorlogs".
You can avoid the problem by escaping the backslash with ... another backslash:

ls -alrt  .\\errorlogs
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Have you ever been frustrated by having to click seven times in order to retrieve a small bit of information from the web, always the same seven clicks, scrolling down and down until you reach your target? When you know the benefits of the command l…
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now