Войти

Показать полную графическую версию : [решено] Помогите убрать всё после запятой в txt файле


Jeronimo45
02-11-2017, 13:14
Пожалуйста помогите убрать ВСЁ после запятой в каждой строке txt файла, а то их более 200000 строк в самом файле.
Краткий пример:


000.000.000.000-000.255.255.255,Bogon
001.002.004.000-001.002.004.255,China Internet Information Center (CNNIC)
001.002.008.000-001.002.008.255,China Internet Information Center (CNNIC)
001.009.096.105-001.009.096.105,Botnet on Telekom Malaysia
001.009.102.251-001.009.102.251,Botnet on Telekom Malaysia
001.009.106.186-001.009.106.186,Botnet on Telekom Malaysia
001.016.000.000-001.019.255.255,Korea Internet & Security Agency (KISA)-IPv6 Policy
001.055.241.140-001.055.241.140,Botnet on FPT Telecom
001.093.021.147-001.093.021.147,SMSHoax FakeAV Fraud Trojan
001.093.026.097-001.093.026.097,SMSHoax FakeAV Fraud Trojan
001.179.128.002-001.179.128.002,SMSHoax FakeAV Fraud Trojan
001.179.128.003-001.179.128.003,SMSHoax FakeAV Fraud Trojan
001.179.136.040-001.179.136.047,Communications Police Bangkok
001.179.138.224-001.179.138.231,Royal thai Navy College Of Nursing
001.179.140.200-001.179.140.203,Traffic Police Bangkok
001.179.146.052-001.179.146.055,Central-Police-Training-Division TH
001.179.147.002-001.179.147.002,SMSHoax FakeAV Fraud Trojan
001.179.153.216-001.179.153.219,Ministry-of-Public-Health TH
001.179.164.124-001.179.164.127,Armytp45-TH
001.179.167.188-001.179.167.191,Southern Border Provinces Police Operation Center
001.186.188.000-001.186.188.127,Detected AP2P on D-VoiS
001.202.096.052-001.202.096.052,Detected AP2P on ChinaNet Beijing proxy
001.204.179.141-001.204.179.141,Botnet on ChinaNet Guizhou
001.226.051.218-001.226.051.218,Detected AP2P on SK Broadband proxy
002.051.000.165-002.051.000.165,SMSHoax FakeAV Fraud Trojan
002.056.000.000-002.059.255.255,Bogon, Detected kad activity on E-Rent LLC (hijacked)
002.061.073.179-002.061.073.179,SMSHoax FakeAV Fraud Trojan
002.095.002.174-002.095.002.174,datingnearby.com
002.095.041.202-002.095.041.202,datingnearby.com
002.135.237.106-002.135.237.106,SMSHoax FakeAV Fraud Trojan
002.135.237.250-002.135.237.250,SMSHoax FakeAV Fraud Trojan
002.176.159.195-002.176.159.195,Botnet on ITC
002.181.001.127-002.181.001.127,Detected AP2P on ITC proxy
002.181.108.137-002.181.108.137,SMSHoax FakeAV Fraud Trojan
002.183.155.002-002.183.155.002,SMSHoax FakeAV Fraud Trojan
002.184.193.227-002.184.193.227,Detected AP2P on Dadehaye Donyaye Door proxy

Iska
02-11-2017, 13:51
Включая саму запятую, полагаю? Выполните непосредственно в командной строке:
>"Result.txt" (for /f "usebackq delims=," %i in ("C:\Мои проекты\0126\Source.txt") do @echo %i)

Jeronimo45
02-11-2017, 13:55
Нет. Запятые нужно оставить.

Iska
02-11-2017, 14:10
Jeronimo45, тогда просто добавить в предыдущий код вывод запятой в конец:
>"Result.txt" (for /f "usebackq delims=," %i in ("C:\Мои проекты\0126\Source.txt") do @echo %i,)




© OSzone.net 2001-2012