Command operations for Linux1. Daily Operation Command* * View your current working directoryPwd* * Time to view current systemDate* * See who is online (who logged in to the server)Who view current onlineLast view recent log in history2. File System operation**LS/view child nodes (folders and files) information in the root directoryLs-al-a is show hidden file-L is displayed in a more detailed list form* * Switch DirectoriesCd/home* * Create Foldermkdir AAA
The use of Delphi tstringlistTstrings is an abstract class that, in actual development, is the most applied except for the basic type.Tstringlist Common Methods and properties:VarList:tstringlist;I:integer;BeginList: = tstringlist.create;List.add (' Strings1 '); AddList.add (' Strings2 ');List.exchange (0,1); ReplacementList.insert (0, ' Strings3 '); InsertI: = List.indexof (' Strings1 '); {The first occurrence of a position}List.sort; Sortlist.sorted: = True; {Specify sort}List.count; TotalList
① Configuring the console login password The first way to configure authentication (AAA)[Server] AAA (authentication mode)[SERVER-AAA] local-user admin1234 password irreversible-cipher (irreversible password) [email protected] (local user admin1234 password)[SERVER-AAA] Local-user admin1234 Privilege level 15 (local u
version 2
III >. Because the function of the program is to delete the specified primary key, subkey, and key values, this requires that we first set the location and name of the values in the registry. Specifically as follows:The following subkey and key values are established in the "SOFTWARE" subkey below the HKEY_LOCAL_MACHINE PRIMARY key:Create a "AAA" subkey under the "SOFTWARE" subkey. Under AAA subk
Written questions often have running results, and most of the body size is around the scope of expansion, the following summarizes several related questions:
The outer variable function can be found inside the variable inside the function (local variable) outside the outer layer is not found. function aaa () { var a = 10;} alert (a); // error A is not defined because a is a local variable defined inside the function, the outer (global enviro
In RangeSet of Guava learning, we talked about the features and usage of RangeSet. There are many differences between RangeMap and RangeSet.On the official API of Google Guava, we can know that RangeMap is a collection type that does not intersection and is not an empty Range (key) map to a Value ). Unlike RangeSet, RangeMap cannot merge adjacent intervals even if the ing value is the same.Like RangeSet, RangeMap is also an interface that implements only two classes, mmutableRangeMap and TreeRan
Tstrings is an abstract class that, in actual development, is the most applied except for the basic type.General usage We all know, now to discuss some of its advanced usage.Let's start by listing several properties to be discussed:1, CommaText2, Delimiter Delimitedtext3, Names Values ValuefromindexLet's look at the first one: CommaText. How to use it? To speak in code:Constconstr:string = ' aaa,bbb,ccc,ddd ';VarStrs:tstrings;I:integer;BeginSTRs: =
own wrapper objects: the String number Boolean base type will find the corresponding wrapper object type, then wrap the object to give all the properties and methods to the base type, and then wrap the object to disappear Varstr = ' Hello ';String.prototype.lastValue = function () {return This.charat (this.length-1);}; Alert (Str.lastvalue ());o var str = ' Hello '; Str.number = 10; After the object is created, the wrapper object disappears immediately alert (str.number); New objects created by
When you use-xx:+traceclasspaths or execute jinfo on a server, you get the jar packages Classpath contains, for example:Java.class.path = local/aaa/lib/spring-data-redis-1.8.3.release.jar:/usr/local/aaa/lib/ spring-tx-4.3.8.release.jar:/usr/local/aaa/lib/spring-jdbc-4.3.7.release.jar:/usr/local/aaa/lib/ Classmate-1.3.1
' regexp ' and its front and back lines, plus the ' regexp ' before the first line# line number of rows (similar to "GREP-A1-B1")Sed-n-E '/regexp/{=;x;1!p;g;$! n;p;d;} ' -E H# Displays lines containing "AAA", "BBB" or "CCC" (in any order)
Sed '/aaa/!d/bbb/!d/ccc/!d ' NBS P # The order of the strings does not affect the result # displays lines containing "
/**
* 1, the null judgement of the string org.aphche.commons.lang.StringUtils
*/
Checks If a String is empty ("") or null.
SYSTEM.OUT.PRINTLN (Stringutils.isempty (null)); True
System.out.println (Stringutils.isempty ("")); True
System.out.println (Stringutils.isempty ("")); False
System.out.println (Stringutils.isempty ("Bob"));//False
System.out.println (Stringutils.isempty ( " Bob ")); False
//Checks If a String is whitespace, empty ("") or null.
SYSTEM.OUT
display matching rowsSed-n '/regexp/{g;1!p;}; H # find ' regexp ' and display the next line of matching rows, but do not show matching rowsSed-n '/regexp/{n;p;} ' # Displays the line that contains ' regexp ' and its front and back lines, plus the ' regexp ' before the first line# line number of rows (similar to "GREP-A1-B1")Sed-n-E '/regexp/{=;x;1!p;g;$! n;p;d;} ' -E H # Displays lines containing "AAA", "BBB" or "CCC" (in any order)Sed '/
Copyright NOTICE: This article for Bo Master original article, reproduced please indicate the source, Welcome to exchange Study!At work, the string class is an object type that we use very frequently. In order to improve performance and reduce memory overhead, the JVM avoids duplicate string creation and maintains a special memory space, which is the core of our discussion today, the string pool. String pooling is maintained by the string class private.We know that there are two ways to create a
remote user to 3
[H3C] local-user aaa
[H3C-luser-aaa] pa
[H3C-luser-aaa] password si
The [H3C-luser-aaa] password simple aaa
[H3C-luser-aaa] ser
[H3C-luser-aaa] service-
archives.After this operation, 1,201 kB of additional disk space will be used.Do you want to continue [Y/n]? 2. Configure msmtp and mutt
2.1 configure msmtpCreate the msmtp log File ". msmtp. log" and specify it in. msmtprc. Note that "." indicates a hidden file and the content is empty.
$ sudo vim ~/.msmtp.log
Configure the msmtp Configuration File ". msmtprc"
#Accounts will inherit settings from this sectiondefaults# A first gmail addressaccount gmailhost smtp.gmail.comport
located in a type of file system that are typically found in the configuration file/etc/fstab, which contains information about the file system in the system.-mount does not cross the file system mount point when locating files.-follow If the find command encounters a symbolic link file, it tracks to the file that the link points to.1. Find/directory files starting with a[Email protected] ~]# Find/-name a.*/a.txt[Email protected] ~]#2. Find files with file permissions of 644 in the current di
Native usageAPIs for direct use_.rejectRemoves an element based on the condition.var foo = [ {id: 0, name: "aaa", age: 33}, {id: 1, name: "bbb", age: 25}]var bar = _.reject(foo, [‘id‘, 0])//bar = [{id: 1, name: "bbb", age: 25}]_.pickFilters the value in the first parameter and returns the array based on the key of the second parametervar foo = {id: 0, name: "aaa", age: 33}var bar = _.pick(foo, [‘name‘, ‘
Entry Point of NGN access control security
-- Diameter protocol and its application in the SIP network environment
Xie Wei
I. Introduction
The diameter series protocol is a new generation of AAA technology, which is gaining more and more attention due to its powerful scalability and security assurance. In international standards organizations such as ITU, 3GPP and PP2, DIAM-ETER protocols have been officially used as the preferred
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.