In Unix/Linux
Program Running in the background, many of them use to make the program run automatically at the end of the program. For example, to run MySql in the background:
/Usr/local/MySQL/bin/mysqld_safe -- user = MySQL
However, many of our programs do not support daemon like mysqld. Maybe our program is just a common program. Generally, even if this program is used and ended, if the terminal is closed, the program will also be closed. T
In Unix/Linux, you generally want to run a program in the background. Many of them use at the end of the program to run the program automatically. For example, to run MySql in the background:
/Usr/local/MySQL/bin/mysqld_safe-user = MySQL
However, many of our programs do not support daemon like mysqld. Maybe our program is just a common program. Generally, even if this program is used and ended, if the terminal is closed, the program will also be clo
In Win2000, a common method for system scheduled operations is to use the Linux at command after the scheduling service is started, you can also use the command line method "net start schedule" in MMC ".
The Linux at command is used as follows:
The Linux at
Using the SCP command under LinuxThe SCP is the abbreviation for secure copy Protocol, as well as the copy (CP) commands known to many Linux/unix users. SCP is used in a manner similar to the CP command, where a CP command copies a file or folder from one location (source) of the local operating system to the target location (the destination), and the SCP is used
sort by file size
The above are some usage of the ls command. Of course there are still a lot of examples that are not listed. you can use it as a man. Help to learn EnglishLs can combine the pipeline operator "|" to perform complex operations. For example: ls | less is used to implement the paging of the file list, lsCalculate the number of files in the current directoryLs-| * | grep "^-" | wc-|Finally, l
The purpose of the AIXmksysb command is to create a installable image of the root volume group on a file or bootable tape. Syntax mksysb [-bNumber] [-e] [-I] [-m] [-p] [-v] [-V] [-X] Device | File description mksy. .. the AIX mksysb command is used to create a installable image of the root volume group on a file or bootable tape. Syntax mksysb [-B Number] [-e] [-I] [-m] [-p] [-v] [-V] [-X] Device | File des
, I cannot restore one or more partitions.
G4l, too weak to meet my requirements!
Magic fdisk and DD commands
In deep distress, what is the principle of the magic ghost? Isn't it Data Replication? The DD command in Linux is not the most powerful data replication tool!
In this case, why should I use complicated tools like g4l? Can a DD Command help me implement
database is the data that is imported from the other end. Here we do not discuss the various methods of exporting data from other databases, and you will learn how to use MySQL to implement data export.
Use mysqldump:
(The mysqldump command is in the mysql/bin/directory)
Mysqldump tools in many ways are similar to the opposite effect of tool mysqlimport. They ha
program. More accurately, the top command provides real-time status monitoring of the system's processor. It will display the most "sensitive" CPU in the system Task List. This command can be used by CPU. Memory usage and execution time to sort tasks, and many of the features of the command can be set through interactive commands or in personal customization fil
mode that is used when trimming an object.
(4) Edge (EDGE) Option: Specifies whether the extrusion mode is used when trimming the object, and the system prompts as follows:
Enter an implied edge extension mode [extend/no Extend]
The "Extend" option allows the clipping boundary to extend to the trimmed object and trim if the trimmed boundary does not intersect with the clipped object. In the same case, pruning is not possible with "No Extend" mode. The comparison of the two modes is shown in
thorough understanding of this command is essential for writing successful shell scripts.
Working principle
The shortest definition of the test command might be to evaluate an expression, or return a value of 0 if the condition is true. If the expression is not true, it returns a value greater than 0-or it can be called a false value. The easiest way to check the status of the last
thorough understanding of this command is essential for writing successful shell scripts.
Working principle
The shortest definition of the test command might be to evaluate an expression, or return a value of 0 if the condition is true. If the expression is not true, it returns a value greater than 0-or it can be called a false value. The easiest way to check the status of the last
Using PHP to simulate our usual DOS command ping command, the main use of PHP's built-in function exec to call the system's ping command, to achieve the ping command function.
Copy CodeThe code is as follows:
$to _ping= ' www.phpernote.com ';
$count = 2;
$psize = 66;
echo
through 24th: 12,y represents the contents of a copy of line 12th to the line where the cursor is located: 24y means that the copy cursor is in the same row as the 24th row. Delete Similar5 Fast input charactersIn VI, you are not required to enter every character, there are many ways to quickly enter some charactersStudents who use Linux/unix must have an experience typing the first few characters and then pressing the
The regular execution of Linux is mainly done by adding custom plans to the Crontab file, which is slightly more complex than Windows (because there is no graphical interface), but it is not very complex, but it is not very complicated.
A Brief introduction
Under Linux, task scheduling is divided into two categories, system task scheduling and user task scheduling.
System task scheduling: The system needs to perform periodic tasks, such as restart, log cleanup, and so on, its configuration fi
Use
Reduces the size of object files that extend the Common Object file Format (Xcoff) by dropping the information used by the binding program and the symbol debugger.
Grammar
Strip [-v] [-R [-L] |-X [-L] |-T |-H |-e |-e] [-x {|64 |32_64}] [--] File ...
Description
The Strip command reduces the size of the Xcoff object file. The strip command selectively drops
RM: Delete command preface:Delete command in Windows Everyone is not unfamiliar, the removal command in Linux and Windows have a common feature, that is dangerous, the first two Linux mkdir command detailed and use the actual combat "beginner" we mentioned the RM
The route command is used to display and modify entries in the local IP address routing table. Use a ROUTE without parameters to display help.
Syntax:
Route [-f] [-p] [command [destination] [mask netmask] [gateway] [metric] [if interface]
Parameter description:
-F
Clear all routes that are not the master route (the subnet mask is 255.255.255.255), round-back netw
From: http://blog.csdn.net/hitlermen/article/details/4139009
1) Create an empty connection:Net use // ip/IPC $ ""/User: "" (Note: This command contains three spaces)
2) establish a non-empty connection:Net use // ip/IPC $ "password"/User: "User Name" (there are also three spaces)
3) default ing sharing:Net use Z: //
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.