This is where you use a LIUNX command to view disk space
Df:disk Free http://www.cnblogs.com/chenwenbiao/archive/2011/08/07/2129831.html
Common parameters: Df-h
-------------------------------------
1. Restart the Postgre under Linux
Pg_ctl Restart (postgres user)
Today's problems
Because the data is imported, the database keeps generating backup files, which fills up the space
Cannot continue to boot.
Workaround:
The directory structure where the b
Click Back to learn the path of the Linux command line and shell script4.2-Monitoring disk space Mount Umount DF dulsThe command is used to display a list of file directories, Windows similar to the commands under the system DOS dir . When you execute a ls command, the default display is only the file name of the non-hidden files, the sort by file name, and the color displayed by the file name.List information for the current directory is listed by de
Recently used Unix time to convert applications in MySQL and. Net. Keep this information in your blog.How to get the present in different programming languages Unix time Stamp (Unix timestamp) ?
Java
Time
Javascript
Math.Round (New Date (). GetTime ()/1000)GetTime () The unit of return value is milliseconds
Mic
DfFunctionDisplays the maximum available space and usage for all current file systemsParameters-A: Displays all file systems and disk usage for each partition-I: Show i-nodes usage-K: size is represented by K (default value)-T: Displays all partition disk usage for one file system-X: Displays all partition disk usage that are not a single file system-T: Displays the name of the file system to which each partition belongsDuFunctionQuery disk usage space for a file or directoryParameters-A: Displa
breakpoint continues to upload a file to prevent network interruption when downloading large filesWget-b URL: Download a file in the background, tail-f wget-log View Download Progresswget--user-agent= "XXX" URL: Use pseudo proxy name to downloadwget--tries=40 URL: Download a file, failed to retry 40 timeswget--reject=gif URL: Download a file, but do not download GIF files for filtering the specified formatWget-o Download.log URL: Writes the download log to Download.logwget--ftp-user=username--f
breakpoint continues to upload a file to prevent network interruption when downloading large filesWget-b URL: Download a file in the background, tail-f wget-log View Download Progresswget--user-agent= "XXX" URL: Use pseudo proxy name to downloadwget--tries=40 URL: Download a file, failed to retry 40 timeswget--reject=gif URL: Download a file, but do not download GIF files for filtering the specified formatWget-o Download.log URL: Writes the download log to Download.logwget--ftp-user=username--f
1 DF Command
Used to view the size of each partition of the disk, used, available, mount point, and so on, remember oh is to view the partitions OH
2 du command
Lists the total size of a directory, which includes the size of the directory itself, as well as all of the files in the directory, as shown in the following list
3 ln to establish soft links with hard links
When you establish a hard link, you do this by adding an Inode: Document name to t
Http://tool.chinaz.com/Tools/unixtime.aspx now the Unix timestamp (Unix timestamp) is1440732364Unix Timestamp (Unix timestamp) → Beijing Time →unix timestamp (Unix timestamp) How do I get the current UNIX timestamp (
JS gets the Unix time stamp
The Unix timestamp (Unix timestamp), or Unix time (Unix times), POSIX time (POSIX times), is a time representation, defined as the total number of seconds from GMT January 01, 1970 00:00 00 seconds to the present.
Advanced Programming in the UNIX Environment (third edition) is a well-known programming book for Unix systems.However, the code example in the book, in order to correctly compile the run, you need to prepare the work:1. Download the source codePortal: http://apuebook.com/code3e.html2. Extracting source codeTar XF src.3e.tar.gz3. Install Libbsd-devel, otherwise compile the wrong returnYum Install Libbsd-de
Chapter 23rd UNIX File SystemNamed pipe Mkfifo:mkfifo [-M mode] pipe. Named pipes must be created explicitly and will not disappear (the RM command can be removed).The proc file is a pseudo-file used to access kernel information. For example, if a process ID is 1952, the process-related information can be found in a file in the/proc/1952 directory.The VFS (virtual file system) implements the details of file processing.24th Directory Operations~ Repres
1:unix file Type-3 typesNormal files (regular files): Text files (plain text, scripts, source programs, configuration files, HTML, etc.), binary files (multimedia files, databases, etc.)Directories: for organizing filesPseudo-file: does not store data for the purpose of providing a service. Divided into three kinds:Special files: Device drivers, file representations of physical devices (keyboards, monitors, etc.)Named pipes: Directing the output of on
UNIX, Linux, BSD-Unix, and MACOs are all computer operating systems.
The earliest Unix was developed in 1973 by Dennis Ritchie at the Bell Laboratory of att, which was all written in C language.After the successful development of the original UNIX, people thought it was very useful. As a result, two major branches e
Often people ask what is the difference between "linux and UNIX? ","linux is UNIX? 」。The answer is generally "linux is a Unix-like development of Os","linux and Unix similar but not a os".There are some stories about "linux and unix".First, "
Simple UNIX-prepaster and unix-based prepasterIn Linux, the current process scheduling algorithm is the CFS algorithm, which replaces the previous time slice rotation scheduling algorithm. The CFS algorithm smooths the dynamic priority calculation process, this allows the entire system to be preemptible by any execution entity at any time. In fact, this is the basic principle of the time-sharing system. Ima
Apue unix environment programming, unix environment programming
Today, we have finally finished reading all the first 17 chapters of APUE. Basically, the main knowledge is in these chapters.
After reading the "unix/linux Programming Practice tutorial", I felt very open and relaxed. At the code level, I learned many linux system mechanisms and never understood pro
Level: Intermediate
By Michael Stutz
From: IBM developerworks China
Link: http://www.ibm.com/developerworks/cn/aix/library/au-badunixhabits.html
When you often use a system, it is often in a fixed usage mode. Sometimes, you do not get into the habit of doing things in the best way possible. Sometimes, your bad habits may even lead to confusion. One of the best ways to correct such defects is to consciously adopt the good habits of resisting these bad habits. This article presents 10
I have been engaged in pythonWeb development for a year. Now I am confused. I mainly work on curd, that is, how to obtain data, and then present it to the front-end page. The framework uses django, optimization means adding memecache. Pay attention to this when querying the database. Currently, there are a lot of tangled issues: 1: the programming of process threads, how to use it in practice 2: network programming problems, the design and implementation of high-performance servers, I can't unde
Introduction: Do you know that blogging works in conjunction with UNIX (R)? UNIX's built-in Web and text processing tools enable you to create blogs quickly and easily. Explore some handy tips for improving the creative skills of UNIX blogs.
UNIX® has a lot in common with web blogs or blogs. In addition to being the native environment for most Web servers and th
A simple UNIX-Linux CFS annotation, unix-linuxcfsThis series is named simple UNIX, but it also includes the details of various UNIX-like systems. This series of articles are based on my study notes over the past few years, focusing on the analysis of various UNIX,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.