Tags: mysql batch processingA batch file that was written earlier when the MySQL interface was debugged.Register to start My_install.bat@echo Offset Mysql_dir=%~dp0rem set mysql_dir=%cd%if not "%mysql_home%" = "" ( If not "%mysql_home%" = = "%mysql_dir%" ( echo mysql_home=%mysql_home% = mysql_dir=%mysql_dir% goto my_ends )) Else ( set Mysql
"Write the automatic installation (SQL version). batSpecific content is as followsBatch processing instructions:#Win server R2 Install SQL Server x64 One-click Script @Sungeek ##自动安装 (SQL Version). bat or Auto-install (Component Library Edition). Bat Right-click the text to open, change the following variable parameter, as you need to modify. #①set predir=c:\sql_server2008r2_ Automatic Installation \sql_server_2008r2The predir= database installation p
reproduce FTP data transmission and implement protocol connection playback. In fact, many users use the same user name and password in different applications, this may seem worse. If hackers collect FTP passwords, they may also get passwords for your online account or other confidential data 。
3. Work on the TCP layer
The FTP
http://www.oschina.net/news/41286/amftp-2-0
AMFTP-based on Web online FTP file management client, Application PHP AMP Framework Development, provided by Amysql official,
It also belongs to one of the AMH panel expansion modules.
The first version was released in 2013-02-06 and the latest version 2.0 was released in 2013-6-10.
AMFTP version 1.0 supports file d
today, because of the need for work, it is not possible to use Zabbix's own functionality to detect network availability on an offer machine (Windows system) that is connected to the Web. So start by thinking about using the Python script to tune the system's ping command to detectYou can then use Zabbix to monitor and complete the task.Online check, found that using subprocess and Shlex can complete the detection, and then refer to the entire small
Role:Copy the SSH public key of the current machine to another machine. In order to realize from the current machine can ssh without password landing to other machinesUsage:1) Write the IP address you want to add to a file. For example, host2) Save the script as an SH file, such as Install_ssh.sh set the operational permissions3) rewrite the password settings in
Role:Copy the SSH public key of the current machine to another machine to enable SSH login to other machines from the current machine without password.How to use:1) Write the IP address you want to add to a file, such as host2) Save the script as sh file, such as Install_ssh.sh set executable permissions3) rewrite the password settings in the
1 " *.pid " ` 2 for inch $head _files 3 Do 4 ' {print $} ' | Xargs Kill-95 rm-f $file6 DoneCode as aboveExplain:1. Find all the PID files in the./fmsconf Directory2. Traverse the found file3. Start traversing4. Separate explanations:1. Cat $file: Print out the contents of file files2. awk ' {print $} ': Print the first unit character3. Xargs: Use the previous output as the input for this4. kill-9:
. Restarting may be a bit cumbersome, after all, we don't have a startup script. Restart, you can use the following command to implement.Killall PUREF-FTPDcd/usr/local/pureftpd/;/sbin/pure-config.pl./etc/pure-ftpd.conf5. Create an AccountThe account used by PURE-FTPD is not a Linux system account, but a virtual account. Because it's safer to do so.mkdir/data/www/Useradd FTPChown-r ftp:ftp/data/www//USR/LOCAL/PUREFTPD/BIN/PURE-PW Useradd ftp_user1-uftp
Files with the extension BAT (or CMD in NT/2000/XP/2003) are batch files.
===== Willsort compilation ======================================== =====. Bat is a batch processing file under DOS. CMD is another type of batch file in the NT kernel command line environment.In a b
: \ back. The displayed note prompts you to upload another CDWhen the disk is attached to the drive g, the pause command suspends the program so that you can change the disk and press any key to continue processing.[Call Command]Call another batch processing program from one batch processing program without terminating the parent batch processing program. The Cal
Wind7 Batch Set IP (script)
Description: Fill in your own IP address at the x.x.x.x.
Save as a ". bat" file and run as an administrator.
The code is as follows:
@echo off
: Main
Cls
echo please follow the instructions ...
Echo.
Echo 1 Sti-hust
Echo 2 dian-hust-711
Echo 3 DHCP
Echo 4 Exit
Echo.
set/p choice= Input A number:
Echo.
If "%choice%" = =
language. It is not executed, but serves as a comment for others to read and modify.
Rem messageSample: @ REM here is the description.5. Pause command
When running the pause command, the following message is displayed:
Press any key to continue...Sample:@ Echo off: BeginCopy A: *. * D: \ backEcho please put a new disk into driverPauseGoto begin
In this example, all files on drive a are copied to drive D: \ back. When the displayed note prompts you to put another disk into drive a, the pause com
and press any key to continue processing.
6. Call CommandCall another batch processing program from one batch processing program without terminating the parent batch processing program. The Call Command accepts the labels used as the call target. If a call is used outside a script or
displayed comment prompts you to changeWhen a disk is placed in drive a, the pause command will suspend the program so that you can change the disk and press any key to continueProcessing.
6. Call CommandCall another batch processing program from one batch processing program without terminating the parent batch processing program. Call Command accepted for call
Let's get to the point. The company now has 2 servers, are CentOS systems, a local (LAN), a computer in the telecommunications room. Because the work needs, the daily backup room data to the local, has been FTP login, and then downloaded to the local machine. Now hope, using the local CentOS machine, Automatic backup to Local.
The workaround is as follows:
1. Download the data that has been packaged on the machine in the remote telecommunication roo
I. File-based verification of virtual users① Create a virtual user database file. Command: Vim/etc/vsftpd/viruser650) this.width=650; "src=" Https://s4.51cto.com/oss/201710/27/327cf87fecda172d1fbabe943fefd138.png "title=" 1.png " alt= "327cf87fecda172d1fbabe943fefd138.png"/>Convert the file into a database format.Command: db_load-t-T hash-f viruser viruser.db650)
adb shell as root after device rootedOnce device rooted, we must perform "su" before we get root permission in adb shell,this are not convenient in some Situati Ons,so there has a method to get permission without perform "su".-O remount,rw/4755 /system/bin/shexit-rwsr-xr-x root Shell 285016 2015-02-02 20:57 SHWe set /system/bin/sh to SUID Permissonand now we can get root permission directly after ADB shell.Maybe this method has secure issue, so is only for specific suituation used.bat
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.