Solved

sending commands to running dos application

Posted on 2004-09-22
3
896 Views
Last Modified: 2009-12-16
This seems to be the most appropriate place to ask this question, but if it's not feasable then i may have to do it under programming....but

We use filenet here for document management
Part of my job every day is to do this
start > run
"csm_tool"
"HA c:\outfile.txt"
<set to output to text file>
"s"
<prints text i need here>
"q"
<exits>

it takes 5 minutes to do, and frankly i am lazy...i know i can automate it. Heres the problems and cavets though:

"csm_tool" does NOT support any command line arguments (and the vender dosent care what i think or ask, so it's out of the quetion)
i can have the exe inside print to a text file (which i am going to do and is ultimately my goal) through HA filename
if i do something like echo s | csm_tool then it goes into a loop....not sure why, yet if i do a echo q (quit) it dosent....i have no clue why it is looping until the program terminates....

so basically, i need to send HA file, then s, then q to a running dos program, or have a batch file do it for me.....is this possible? if not, i will move it over to a VB/C# forum and ask.....thanks
0
Comment
Question by:fcisler
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
LRHGuy earned 250 total points
ID: 12125553
You can try something like this:

Create a file inp.txt with two lines:

s
q


Then start the program like this:

csm_tool < inp.txt

It might work...
0
 
LVL 7

Expert Comment

by:LRHGuy
ID: 12125580
To expound further, the inp.txt file should have everything you would normally enter.

So, you could create a batch file:

gocsm.bat

with:

csm_tool < inp.txt

and in inp.txt put:

HA c:\outfile.txt
s
q


That is, if I understand what you're trying to do. Some programs, though, don't accept input from the standard input, so the redirection might not work.
0
 
LVL 1

Author Comment

by:fcisler
ID: 12125768
LRHGuy,

thank you very much....dunno why i didn't think to try that....
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Selective Copy and overwrite 7 54
DOSBox Keyboard 3 72
Remove column in output file from batch script 11 55
Running Visio Macro from VBS File 3 58
VALIDATING DATES One method of validating dates is to jam the date into the DATE command and see if it accepts it by examining the system's errorlevel value. A non-zero result indicates failure. A typical example might look something like the fol…
Introduction: Recently, I got a requirement to zip all files individually with batch file script in Windows OS. I don't know much about scripting, but I searched Google and found a lot of examples and websites to complete my task. Finally, I was ab…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now