Ls
Normal file:-,fCatalog Files: DLink file (Symbolic link): LDevice files:Character Devices: CBlock Device: bNamed pipes: PSocket file: S
Linux file time stamp
Time is divided into three types: creation time,Modification Time: OpenAccess time: Read-writeChange time: The time the source data has changed
Directories and files cannot have the same name in Linux in the same directoryls: Listing directory contentsLs-a View All Files
[Root@docker-node1 scripts]# Ls-a. .. Cmdline-jmxclient-0.10.3
examples Example 1 : Lists the contents of the current directorycommand:lsls The file and directory under the current directory are listed without any arguments after the command[Email protected] ~]# lsanaconda-ks.cfg cplogs.sh Documents install.log Music public tmpautouserdel.sh Desktop Downloads install.log.syslog Pictures Templates videos[[email protected] ~]# Example 2 : Lists all files in the current directorycommand:ls-a[Email protected] ~]# ls-a. Bash_history cplogs.sh Downloads. Gnot
: remote_folderOrScp-r local_folder remote_ip: remote_folder1st user names are specified. After the command is executed, enter the user password;2nd user names are not specified. After the command is executed, enter the user name and password;
Copy from remote server to local server:The scp command remotely replicated to the local device is the same as the command above. You only need to swap the order of the two parameters after the command locally copied to the remote device.
Instance 1: copy
be written (write)x indicates that the file can be executed (if it is a program)Where: Rwx can also be replaced by numbersR------------4W-----------2X------------1-------------0Let's go:Represents the Add permission-Indicates delete permission= indicates a permission to make it uniqueWhen we all understand the above, then we often have some of the following permissions are easy to understand:-RW-------(600) Only the owner has read and write permissions-rw-r--r--(644) Only the owner has read and
Find (T t) {Link
Find = first; while (find! = Null) {if (! Find. data. equals (t) {find = find. next;} else {break;} return find;} public Link
Delete (T) {Link
P = first; Link
Q = first; while (! P. data. equals (t) {if (p. next = null) {// It indicates that return null has not been found at the end of the chain;} else {q = p; p = p. next ;}} q. next = p. next; return p;} public void display
)) path. AddLine(To:. Zero)} return path. Cgpath}Springback Effect of CurvesThe springback of the curve is CAKeyframeAnimation added to the reference, then the coordinates of the monitoring reference are used to view CADisplayLink view controlPoint Achieve the rebound effect of the curve, and the following is the main code and:Start animation func startanimation () {isanimation = True Adddisplay () boundanimation (x:0,y: Execute)}//cakeyframeanimation animation private func boundanimation (x: CG
$oracle_home/lib/sfc3rac1:/apps/oracle/product/10.2.0/lib$ LS-LRT |grep BOBKlrwxrwxrwx 1 Oracle Oinstall LIBOBK.A-/USR/OMNI/LIB/LIBOB2ORACLE8_64BIT.Asfc3rac1:/apps/oracle/product/10.2.0/lib$But insisted that the current Solaris does not have this soft connection file in Oracle HomeThere is a secondary file under the DP installation path[email protected]:/opt/omni/lib] #ls-LRTTotal 16200-r-xr-xr-x 1 root sy
NetScaler Modify kernel image and make FlashbootFirst, modify kernel image1) NETSCALER-ADC download page address https://www.citrix.com/downloads/netscaler-adc/2) Netscaler-vpx-express version download page address https://www.citrix.com/downloads/netscaler-adc/virtual-appliances/ Netscaler-vpx-express.htmlGets the NetScaler VPX Build upgrade package file that contains the NetScaler kernel image.Get a free trial License serial number.3) See if the sha256 value of the downloaded file is the same
be written (write)x indicates that the file can be executed (if it is a program)Where: Rwx can also be replaced by numbersR------------4W-----------2X------------1-------------0Let's go:Represents the Add permission-Indicates delete permission= indicates a permission to make it uniqueWhen we all understand the above, then we often have some of the following permissions are easy to understand:-RW-------(600) Only the owner has read and write permissions-rw-r--r--(644) Only the owner has read and
be written (write)x indicates that the file can be executed (if it is a program)Where: Rwx can also be replaced by numbersR------------4W-----------2X------------1-------------0Let's go:Represents the Add permission-Indicates delete permission= indicates a permission to make it uniqueWhen we all understand the above, then we often have some of the following permissions are easy to understand:-RW-------(600) Only the owner has read and write permissions-rw-r--r--(644) Only the owner has read and
directory name, there may be multiple source files or directory parameters. The mv command moves the source files specified by each parameter to the target directory. When a file is moved across file systems, the mv copies the file first, and then deletes the original file. The link to the file will also be lost. Www.2cto.com 3. Command Parameter:-B: If you want to overwrite the file, back up the file before overwriting. -F: force indicates that if the target file already exists, the file will
named nginx to save the compiled and installed files.
[Root @ CentOS local] # mkdir nginx [root @ CentOS local] # Total ll usage 960drwxr-xr-x. 2 root 6 February 24 16:18 bindrwxr-xr-x. 2 root 6 May November 5 2016 etcdrwxr-xr-x. 2 root 6 August 2016 gamesdrwxr-xr-x. 2 root 6 August 2016 includedrwxr-
Ls
Introduction :The LS command is used to display the target list, which is a high-usage command in Linux. The output information of the LS command can be colored highlighted to distinguish between different types of files.
Parameters:The directory or file to display
Options :-A: Show All files and directories[Email protected] ppp]# ls-a.Chap-secrets ip-down ip-up.ipv6to4 options peers. Eaptls-client ip-down.ipv6to4 ipv6-down options.pptpdbackup eaptls-server ip-up ipv6-up pap
target file (destination) already exists, you will be asked to overwrite it!-U: If the target file already exists and source is newer, update (update)-T:--target-directory=directory move all source arguments into directory, which is the target directory for the specified MV, which is suitable for moving multiple source files to a directory, when the target directory is in front, The source file is behind.4. Command instance:Example one: Renaming a fileCommand:MV Test.log Test1.txtOutput:[email
the previous backup if you need to overwrite the file.-f:force mandatory Meaning, if the target file already exists, will not be asked and directly covered;-I: If the target file (destination) already exists, you will be asked to overwrite it!-U: If the target file already exists and source is newer, update (update)-T:--target-directory=directory move all source arguments into directory, which is the target directory for the specified MV, which is suitable for moving multiple source files to a
the previous backup if you need to overwrite the file.-f:force mandatory Meaning, if the target file already exists, will not be asked and directly covered;-I: If the target file (destination) already exists, you will be asked to overwrite it!-U: If the target file already exists and source is newer, update (update)-T:--target-directory=directory move all source arguments into directory, which is the target directory for the specified MV, which is suitable for moving multiple source files to a
: Overwrite the previous backup if you need to overwrite the file.-f:force mandatory Meaning, if the target file already exists, will not be asked and directly covered;-I: If the target file (destination) already exists, you will be asked to overwrite it!-U: If the target file already exists and source is newer, update (update)-T:--target-directory=directory move all source arguments into directory, which is the target directory for the specified MV, which is suitable for moving multiple source
deletes the original file. The link to the file will also be lost.
3. command parameters:
-B: If you need to overwrite the file, back up the file before overwriting.
-F: force indicates that if the target file already exists, it is overwritten without asking;
-I: If the destination file (destination) already exists, you will be asked if it is overwritten!
-U: update is performed only when the target file already exists and the source file is updated)
-T: -- target-directory = DIRECTORY move all
file systems, the mv copies the file first, and then deletes the original file. the link to the file will also be lost.
3. command parameters:
-B: If you need to overwrite the file, back up the file before overwriting.-F: force indicates that if the target file already exists, it is overwritten without asking;-I: if the destination file (destination) already exists, you will be asked if it is overwritten!-U: update is performed only when the target file already exists and the source file is upd
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.