If you want to see the output of the text, your best option is the Pipe.
Ironicly i just asked rfp for some advice about his 'Pesky Pipe' problem so i can give you the example script and output:
[root@wicca /root]# cat ppipe.pl
#!/usr/bin/perl
open(FILE,"/bin/netstat|") || die("can't open");
while(<FILE>){
print $_;
}
close(FILE);
[root@wicca /root]# perl ppipe.pl
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address St
+ate
tcp 0 0 10.9.205.4:netbios-ssn aeon-gig:1028 ESTAB
+LISHED
tcp 0 0 10.9.205.4:ssh aeon-gig:4931 ESTAB
+LISHED
Active UNIX domain sockets (w/o servers)
Proto RefCnt Flags Type State I-Node Path
unix 5 [ ] DGRAM 644 /dev/log
unix 2 [ ] DGRAM 1512
unix 2 [ ] DGRAM 1504
unix 2 [ ] DGRAM 904
[root@wicca /root]#