Town Field Poem:Cheng listens to the Tathagata language, the world name and benefit of Dayton. Be willing to do the Tibetan apostles, the broad show is by Sanfu mention.I would like to do what I learned, to achieve a conscience blog. May all the Yimeimei, reproduce the wisdom of the body.——————————————————————————————————————————Code# OS operating system# Python cross-platform language import osprint (Os.listdir (Os.curdir))Result——————————————————————————————————————————The essence of the blog,
/* -- Handle deadlocksView the current process or deadlock process and automatically kill the dead ProcessBecause it is intended for dead, if there is a deadlock process, you can only view the deadlock ProcessOf course, you can use Parameter Control to check only the deadlock process, whether there is a deadlock or not.-- Producer build 2004.4 --*//* -- Call exampleExec p_lockinfo--*/Create proc p_lockinfo@
================================== Declaration ==================================This article is original, reproduced in the text of the influential annotated author and source, and to ensure the integrity of the article.Do not modify (including this statement) without the consent of the author, and reserve the right of legal investigation.Do not use academic references without the consent of the author.Do not use for commercial publication, commercial printing or commercial reference without th
Viewed the number of connections and the current number of connections
Netstat-ant | grep $IP: 80 | Wc-l
netstat-ant | grep $ip: | grep EST | wc-l
View IP access times
Netstat-nat|grep ":" |awk ' {print $} ' |awk-f: ' {print $} ' | Sort| Uniq-c|sort-n
Linux command:
Netstat-n | awk '/^tcp/{++s[$NF]} end {to (a in S) print A, S[a]} '
Watch ' netstat-n | awk '/^tcp/{++s[\ $NF]} end {to (a in S) pr
First, view and manage the currently logged in user
1. Use the W command to view the process information that the logged-on user is using,and the W command to display the names of the users who have logged in to the system and what they are doing. The information used by this command originates from the/var/run/utmp file. The information for the W command output includes:
User name
User
First, view and manage the currently logged in user
1. Use the W command to view the process information that the logged-on user is using,and the W command to display the names of the users who have logged in to the system and what they are doing. The information used by this command originates from the/var/run/utmp file. The information for the W command output includes:
User name
U
One, view and modify the time zone of Linux 1. View current time zoneCommand:Date -R2. Modify the setup Linux Server time zone method ACommand:TzselectMethod B is limited to Redhat Linux and CentOSCommand:TimeconfigMethod C applies to DebianCommand:Dpkg-reconfigure Tzdata3. Copy the appropriate time zone file, replace the system time zone file, or create a linked
YS Web SocketThere is a horizontal ultra-vires vulnerability, the current user can arbitrarily view other user's alarm information, can cause sensitive information leakage "high" Problem Description: YS Use timed polling web socket Test steps: 1. Openburpintercept the agent and starthttprequest interception function. 2. sign in with a normal accountYS(assuming that the
Linux in use pwdcommand to view the full path of the current working directory. Simply put, you will have a current working directory every time you operate in a terminal. when you are unsure of your current location, you will use the pwd to determine the exact location of the curr
Tags: order inline category label IMM play article Pfile row Tags: Oracle database 2017-01-04 14:40 6709 People read comments (0) favorite reports Classification:database (Wuyi) Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced. It is useful to look at the connection of the data, finish writing the program while testing the code side to see the release of database connections to help optimize the analysis of a robust system program. 1.
The lsof command on Linux allows you to view the files currently used by the current system and, of course, to view network socket communications.
$ lsof View all system IO operations
$ lsof/etc/passwd View process usage of the file system
$ lsof-p
$ LSOF-I@AAA.BBB.
Environment Description :
MySQL version: 5.5.57-log
Operating system version: Red Hat Enterprise Linux Server Release 6.6 (Santiago)
Requirements Description :View all tables in the currently used database, but do not query the view or show the view, that is, all the base tables are queriedthe following SQL statements are implemented :SELECT
4 Ways to Identify the logged-in on Your Linux SystemAs a system administrator, you can often (at some point) need to see which users in your system are active. Sometimes you even need to know what they are doing. This article summarizes 4 ways to view system user information (by number (ID)).1. Use the W command to view the process information that the logged on user is usingThe W command is used to displa
As a system administrator, you can often (at some point) need to see which users in your system are active. Sometimes you even need to know what they are doing. This article summarizes 4 ways to view system user information (by number (ID)).1. Use the W command to view the process information that the logged on user is usingThe W command is used to display the names of the users who have logged in to the sy
PHP View ID instance of current session
This article mainly introduces PHP to view the current session ID method, the example analysis of two common to get the ID in session skills, very practical value, the need for friends can refer to the following
This example describes how PHP looks at the ID of the
Tags: ext list folder Justify top style is add marginLs-l |grep "^-" |wc-l//verified Redhat easy to useOrFind./company-type F | Wc-lView the number of files under a folder, including the subfolders.Ls-lr|grep "^-" |wc-lView the number of folders under a folder, including those in subfolders.Ls-lr|grep "^d" |wc-lDescriptionLs-lLong list output file information in this directory (note the file here, different from the general file, may be the directory, links, device files, etc.)grep "^-"In this c
log list viewAnalysis results in the gv$logmnr_contents view, you can query by the following statement:Select scn,timestamp,log_id,seg_owner,seg_type,table_space,data_blk#,data_obj#,data_objd#,Session#,serial#,username,session_info,sql_redo,sql_undo from Logmnr3 t where T.sql_redo like ' create% ';If you cannot query the Gv$logmnr_contents view correctly and report the following error, ORA-01306: You must
$logmnr_transactionGv$logmnr_logs is the analysis log list viewAnalysis results in the gv$logmnr_contents view, you can query by the following statement:Select scn,timestamp,log_id,seg_owner,seg_type,table_space,data_blk#,data_obj#,data_objd#,Session#,serial#,username,session_info,sql_redo,sql_undo from Logmnr3 t where T.sql_redo like ' create% ';If you cannot query the Gv$logmnr_contents view correctly and
This method is to get the screen shots of current activity through view, not framebuffer way, so there are some limitations. But this method is relatively simple and easy to understand.
Get a screenshot of the bitmap format first by using the following function:
Copy Code code as follows:
Public Bitmap myshot (activity activity) {
Get the top view
Tags: program blank ext suse process Dalian param Connect UserRelationship between two parameters: Sessions=1.1*processes+5 The current summary of the statement, in view of the data connection is very useful, after writing the program while testing the code side to see the release of database connections to help optimize the analysis of a robust system program. 1.SQL code1.select Count (*) fromv$processSel
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.