Gateway/dev MTU
IP route add 192.168.5.0/24 dev eth0
IP route add 192.168.10.0/24 via 192.168.5.100 Dev eth0
IP route add default via 192.168.1.254 dev eth0
IP route Delete 192.168.10.0/24
5 dhclient IP Request via DHCP
6 Ping
Ping–c2–s 8000–m do 192.168.1.254 #发大包并且不允许交换机或路由器将封包重组
IP header 20bytes,icmp20bytes, ETHERNET Baotou 1500
7netstat
-N uses a number instead of a host name
-A lists all online statuses, including the Tcp/udp/unix socket
-T only TCP pac
represents what AWK looks for in the data, and the action is a series of commands that are executed when a match is found. Curly braces ({}) do not need to always appear in the program, but they are used to group a series of instructions according to a particular pattern. pattern is the regular expression to be represented, surrounded by slashes.Example#输出df第一个字段 [[email protected] ~]# df-ph |awk ' {print $} ' #输出df第一个和第三个字段 [[email protected] ~]# df-ph |awk ' {print $1,$3} ' # Output DF last f
Re-created a workspace, and the previous settings were all gone.So I'm going to write it down.The auto-complete feature of Eclipse is turned off by defaultContent Assist, Editor, Java---windowsThe bottom column on the right is auto-activation,There are three options below, and the second "Auto activation triggers for Java:" option has a "." In the text box after it. "indicates: Only input". " Then there will be code hints and auto-completion "Put the "." In the text box Replace it and replace it
The first is to install SSH service under Linux (root)Since the use of the Debian version is slightly different from otherInstallation Services Apt-get Install SSHTo see if the service is turned on for services SSH statusTurn on services service SSH startDownload SSH client Installation under WindowsSSH Secure Shell ClientSSH Secure File Transfer ClientClient connection is to fill in the Linux IP (pre-guaranteed ping pass)and user name (I choose root)Port default 22You will then be asked to fill
? SETOnce the session is closed, the Sqlplus retention command is released.#list View the historical SQL command:1. Set the input formatSET Sqlblanklines onSET PAGESIZE 100SET WRAP OFFSET Linesize 200SELECT ' DROP talbe ' | | ' ' | | table_name| | ' ' | | '; 'From User_tables;Bulk generate delete data table syntax2. Change the command in the bufferc/n/mList/3. Save Buffer CommandLinux:save/backup/text. TxtWindows:save E:backuptext. Txt4. View the saved commandsGET E:backuptext. Txt5. Load and ru
Tags: firewall web site Hash soc encryption Compress package centralize sniff service First, the introduction NC is Netcat shorthand, has the network world the Swiss XXX reputation. Because it is short and functional, it is designed as a simple and reliable network tool. NC commands commonly used are two: 1,-V Output detailed interaction or error message 2,-n if the following is IP address will not be DNS resolution EG:NC-VN 192.168.11.11 88,882, the use of NC text transmission: Similar
: Available Disk sizesuser%: Shows the amount of free disk space for the total disk partition.Mount on: Mount directory name corresponding to the disk partition3 Partitioning a disk using the Fdisk tool(1) Fdisk is a powerful disk partition management tool that can observe the use of hard disks.(2) Fdisk uses two parts, querying parts and interacting parts. First, the FDISK device enters the command interaction and then enters m to display the commands that the interaction can use4 planning part
If you are responsible for working with an EXCEL spreadsheet that lists 200 new employees who are working from next week, or because a technical support person clicks on something that should not be clicked and causes a user account to be misconfigured, or you just need a more relaxed way to manage it than to open "users and Computers" Active Directory??, there are plenty of free management tools available to help. Some
:./host://mnt/hgfs, the shared file configuration is successful.Configuring shared files can bring a lot of convenience:
Ability to process all configuration file backups in practice to prevent data loss after virtual machine failure or deletion
Faster file transfer with host, avoid using other protocols to transfer files, or Occupy console file system
shared files can be configured as shared by multiple configurations, including host directories, or mobile devices. Of course,
In my study of Ethereum technology, because of less relevant information, so took more detours. So here we will not introduce the grammatical structure of solidity, but will be in the next stage, from the actual combat, in succession to introduce Geth, browser-solidity, mist these three tools, and in the process of constantly explaining the basic concept of ethereum.
Through the practical use of these
variables, constants, functions, regular expressions, operators, variables in awk by string variables and numeric variables, and if variables defined in awk are not initialized, the initial value is an empty string or 0Plus +ReductionByRemoveResidual%Power Operation ^Self-add + +Self-reduction--Add Value + =Assign value after subtraction-=Assign value after multiplying *=Assigning values after dividing/=Greater than >Less than Greater than or equal to >=Less than or equal to equals =Not equal t
AWT (Abstract window Toolkit), the Chinese translation of the Abstraction Windows Toolkit, which provides an interface for interacting with the local graphical interface, is the basic tool provided by Java for creating and setting up a graphical user interface for Java.The graphical functions in AWT have a one by one correspondence with the graphical functions provided by the operating system, called peers, and when writing graphical user interfaces u
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.