Basic Linux commands and Linux commands
[Epeter @ localhost ~] $
Where: epeter is the user name; localhost is the current host name ;~ The broken wave number indicates that the current user directory is used (If yes, the slash indicates that the current root directory is used ); $ indicates that you are currently logged on as a normal user (If yes, # indicates th
Linux Security Basics: network configuration commands and linux basic configuration commands
1. ifconfig view and configure network interface information(1) set an IP addressIfconfig eth0 192.168.0.1(2) temporarily disable or enable the NICIfconfig eth0 downIfconfig eth0 up(3) set the subnet maskIfconfig eth0 netmask 255.255.255.0(4) view the status of the first
Django basic commands, Django commands
1. Create a project
Django-admin.py startproject myblog
2. Create an app
Python manage. py startapp blog
3. Create a database table or change a database table or field
Python manage. py makemigrations blog
Python manage. py migrate
4. Run the Development Server
Python manage. py runserver
5. Clear the database
Pyt
A few days ago learned the basic Linux commands, here to share, as a summary.Environment: 192.168.54.242Cd:CD-Switch to the first use path;Cd.. Go to Parent PathCD ~ Enter into the root/directoryCD Ibid.Cd.. /Relative DirectoryMkdir:mkdir a Create directory AMkdir-p a/b/c Creating a tree DirectoryMKDIR-M 777 A Create directory A and give maximum permissionsMkdir-m a=rwx a ibid.(About permissions: Rwx refers
Hello everyone, this time we will introduce some network configurations under liunx, simple basic optimization of shell, and level adjustment first. There are also some commands for you to take a look.
Statement: I like to share with others. I am happy, that is, to make everyone happy. Some of my posts are my previous study notes, and some of my questions can be easily recorded, I also wrote it when I sudde
Basic Linux commands: sar and basic linux sarCommon sar command formats
Sar [options] [-A] [-o file] t [n]
Where:
T indicates the sampling interval, and n indicates the number of samples. The default value is 1;
-O file: stores the command results in binary format. file is the file name.
Options is the command line option. Common options for sar
Linux basic commands and linux basic notes
Today, we are building a Linux production environment. This is a complex task that has to be done. Although I have done it many times, there are still many steps and commands that I don't remember. Every time I find information everywhere, it is very troublesome. So I wrote do
the fifth column-C take character \ (text letter \)[[emailprotected] oldboy]# cut -d " " -f3,5 oldboy.txt |sed ‘s#,myqq #,#g‘24. How many lines does the WC statistic file have?How many rows are in the-l statistics file[[emailprotected] oldboy]# wc -l /etc/services10774 /etc/services25, DUMPE2FS display the file system (partition) informationinode sizeblock sizedumpe2fs /dev/sda3|egrep -i "block size|inode count"[[emailprotected] ~]# dumpe2fs /dev/sda3 |grep -i "inode size"dumpe2fs 1.41.12
the table is complete: Query the id=1 table: Enter id=1 table data by alias: query If there is a teacher with job null: for female teachers on a specified date: Multi-Criteria query: Query the ID at the end of the name for E: query begins with the specified character: query with Z in the name: ID Flashback Arrangement: multi-valued sorting: Male and female groups: total number of records queried: Limit Paging query: more Learning Resources and references: MySQL lear
Basic features of Bash(1) Command historyHistoryCall the last parameter of the previous command! $Esc.atl+.Control how the command history is recordedEnvironment variable: HistcontrolIgnoreedups: Ignore duplicate commands, continuous and same as "repeat"Ignorespace: Ignores all commands that start with whitespaceIgnoreboth:ignoreedups,ignorespaceHow to modify Env
Vim basic operations and vim basic commands
Copy y
Paste p
Cut d
When the row processes yy (copy row), dd (cut row)
Multi-row processing nyy (copying multiple rows) and ndd (cutting multiple rows)
Line paste when row copy is used
Partial row pasting when using region Replication
Intra-row processing y ^ (copying from the cursor
192.168.1.x to connect to the database salesTYPE DATABASE USER ip-address ip-mask METHODHost sales all 192.168.1.0 255.255.255.0 ident Sameuser (indicates that any operating system user can connect with a database user of the same name)8. See so much, come up with a complete example of creating a PostgreSQL database user(1) Access to PostgreSQL advanced users(2) Enable the client program and enter the TEMPLATE1 databasePsql template1(3) Create a usertemplate1=# CREATE USER Hellen with encryped
knows Test2 's password, and he cannot access the database directly from the Internet, but only through a Web page on the MySQL host.Grant Select,insert,update,delete on mydb.* to [[E-mail Protected]][email protected][/email] identified by "ABC";If you do not want to test2 have a password, you can call another command to erase the password.Grant Select,insert,update,delete on mydb.* to [[E-mail Protected]][email protected][/email] identified by ""; 4.1 Creating a Database Note: Connect to the M
+
Add permissions
G
The group where the owner resides
W
Write right
-
Delete permissions
O
The others
X
Executive power
=
is what it calls unique permissions
A
All (U,g and O)
To delete all permissions for a file, enter a command:chmod a-rwx Test.txtTo add permissions to the file owner, enter the command:chmod u+rwx TestYou can also use numbers to indicate
Basic LINUX operation commands and basic linux operations
Ls to list files and directories-A: displays all files and directories, including hidden files and directories.-L: displays full attribute information of files and directories.
Cd changes current path(Relative path and data pair path)
Pwd displays the current working file directory
Create a directory u
(+) Default ' Shenzhen ',Year Date); End of Build tableThe following is the Insert fieldInsert into teacher values (' ' ', ' Glchengang ', ' Shenzhen One ', ' 1976-10-10 ');Insert into teacher values (' ' ', ' Jack ', ' Shenzhen One ', ' 1975-12-23 ');Note: In the table under construction1. Set the ID to a numeric field of length 3: Int (3), and let it automatically add one to each record: auto_increment, and cannot be empty: NOT NULL, and let him be the main field primary key.2. Set name to a
,Address varchar (+) Default ' Shenzhen ',Year Date); End of Build tableThe following is the Insert fieldInsert into teacher values (' ' ', ' Glchengang ', ' Shenzhen One ', ' 1976-10-10 ');Insert into teacher values (' ' ', ' Jack ', ' Shenzhen One ', ' 1975-12-23 ');Note: In the table under construction1. Set the ID to a numeric field of length 3: Int (3), and let it automatically add one to each record: auto_increment, and cannot be empty: NOT NULL, and let him be the main field primary key.2
that developers can submit locally under distributed Each developer machine has a server database backup file record history back to the past multi-share003. Git workflowWorkspaces: code written at work staging area: Staging, helping us save the code as a transition layer to avoid misoperation protect workspace and version area Branch processing version area: Manage version, code action in repository generates version004. Some basic Linux
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.