you can see, Git simply replaces the alias with the corresponding command. However, you might want to execute an external command instead of a GIT subcommand. If that's the case, you can add a symbol to the front of the command ! . It would be useful if you wanted to write some tools for collaborating with Git repositories. We now demonstrate the git visual aliases that will be defined gitk :' !GITK 'There are also aliases, renaming, and so on.Reference: Https://git-scm.com/book/zh/v2/Git-%E5%
,findfind* view command-type (f D)-name "ddd" Search by name-mtime by the modified timeTree view directory StructureXargs is used to give the output of the find/ls to the back processingSEQ Print number sequence echo{1..5}Man view commands and configuration file HelpTouch to create a file or modify the timestamp of a filePWD Displays the current pathVimdiff File Comparison ToolWHOAMI viewing the current command line end userSu Switch User role, note t
basic commands for viewing network performance in a Linux environment because Linux often uses a character interface, and Linux is more powerful, with default routing capabilities, which are equivalent to gateways and routers. The network performance is also relatively stable, and simple configuration. Of course, when configuring the network may occur when the network connectivity is unstable or does not pa
Linux System Foundation commands:Linux is a command line composed of the operation system! Essence in the command line, how the graphical interface grows to what level this principle will not change, the Linux command has many powerful effects: from simple disk operation, file access, to hosting a huge multimedia image and streaming file manufacturing.Install and Login commands: Login, shutdown, hwoulsternbyive, Rekick out, Mount, Umount, ChshDocument
relevant properties of the directory itself, typically used with-L.-R: Reverse mode display-R: Recursive display-rw-r--r--. 1 root root 41364 June Install.log-,d,l,b,c,p,sNumber 1: Number of times a file has been hard linkedLeft Root: Owner of FileRight root: Group of files41364: Siize of filesJune 14 14:32: Last modified time for a fileInstall.log: File nameFile View commands: Cat, TACCat: ForwardCat/etc/fstabCat/etc/fstab/etc/issueTAC: Reverse Orde
This may be useful-Linux Quick Start, basic commands, C Programming basics, embedded system basics (to)-Linux general technology-Linux programming and kernel information. The following is a detailed description. [I = s] This post was last edited by kkkdang
Linux Quick Start, basic commands, C Programming basics, Emb
It appears that after the basic command of Django, you know how to specify the port that the program runs to resolve the port conflict problem.This section is designed to let you understand some of the most basic Django commands, please try to remember them, and practice a lot1. Create a new Django project, Project for a project, project-name the project name, an
[工欲善其事, its prerequisite]
In this article, we'll demonstrate using MAVEN to write a simplest application and use this program to illustrate how the basic commands commonly used by MAVEN are used.
Preparatory work:
A. Operating system: Win7 x64
B. Development tools: Eclipse Mars Java EE version, Maven3.3.2,jdk7-------------------------------------------------------------------- -----------------------------
In the previous chapter we described the wildcard character (bash globing) and Io redirection and pipeline, and introduced the basic concept of user management, mainly described its user category and group category and the management of users and groups of the database files, in the user category is divided into administrators and ordinary users of the two major categories, And the ordinary user is divided into two types of system users and login user
Basic iptables commands in Linux
Firewall (Firewalld) is an isolation tool that prevents unauthorized access and makes the host more secure. It mainly works on the edge of the network or host, and matches and checks the communication packets in and out of the network or host according to the predefined rules; handle packets that can be matched by rules.Classification of firewalls:Host firewall: the work sco
used in the route selection protocol.
Router rip activates the RIP Protocol
Network + direct connection CIDR Block publish direct connection CIDR Block
Interface lookback 0 activation logic interface
Passive-interface + interface Type + interface number configuration interface is passive mode
Debug ip + protocol dynamic view of route update information
Undebug all disable all DEBUG information
Activate the network routing protocol of the routers, such as the routers, the routers,
inside the container. Inside this container is exactly the same as the normal Linux operation. 3. Container common management commands Docker run creates and launches a container, with the-D parameter followed by run, a daemon container is created to run in the background. Docker ps-a View containers that have been created Docker ps-s View started containers Docker start Con_name boot container named Con_name Containers Docker stop con_name
DOS (Windows) formatPath: The location where an object is storedDivided into: absolute path and relative pathIf the path is preceded by a heel, it is called an absolute pathOtherwise, it is referred to as relative path, relative to the current working directory position.Historical records:History View Historical Commands! 55 Execution History 55th order! -55 Execution History bottom 55th order! CD from historical countdown find
.... (Change the directory itself only)-R: Recursive modification (owner of modified directory and its internal files)--reference=/path/to/somefile file: Sets the owner of the file to be the same as the owner of the Somefile (no need to specify the owner)Chown username:grpname Fiel ... Change both the owner and the groupHown:groupname Fiel .... Modify Genus Group2, modified files belong to group: chgrp: Modify the file group-only the administrator can useBasic attachment parameters are the same
remote host rsh f01n03 date ftp transferring files between the local host and the remote host FTP ftp.sp.net.edu.cnNBSP;RCP copying files between the local host and the remote host RCP file1 host1:file2ping sends a response request to a network host ping hpc.sp.net.edu.cn Mail read and send e-mail mailwrite send a message to another user write username PTS/1NBSP;MESG allow or deny receive messages MESG Nkorn Shell commands Command name function Desc
view system is a few operating systems-R View kernel version of the system-A view detailed system kernel version and system operating systemRZ uploadIf this command is not available in the system, install it using yum install Lrzsz-Y OverlayDirectly input RZ, you can upload filesSZ DownloadIf this command is not available in the system, install it using yum install Lrzsz-Y OverlaySz-y Test.txtSU Switch UserSu RootHistory View Command Chroniclechmod permissions given to
Each person builds a HelloWorld project and exercises basic commands such as Git's add/commit/push/pull/fetch/clone. Compare the differences between the old and new versions of the project.steps to use:A) New HelloWorld projectb) Create a local repository and set up git mailboxes, user names, and more Create a Helloworld.java file locallyOpen git Bash and turn git init this directory into a repository that
This section is intended to help you understand some Django The most basic commands, please try to remember them, and practice a lot of1. Create a new Django Project
1
Django-admin.py?startproject?project-name
a Project as a project, Project-name project name, change to your own, to meet Python the variable naming convention (the beginning of an underscore
Linux basic commands--related operations of the directoryCommon commands for working with directories:
CD: Transform Catalog
PWD: Displays the current directory
mkdir: Create a new directory
RmDir: Delete an empty directory
CD (Transform directory)The CD is the abbreviation for Change directory, which is the command used to transform th
The basic commands used for MySQL cluster configuration and the real-time operation process,
1. Check whether you should use a MySQL cluster.
Reduce the pressure on the data center nodes and process large data volumes. MySQL is distributed and one or more applications correspond to one MySQL database. Share data with the common data of several MySQL databases, such as shopping cart and user objects, in data
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.