, SkyDrive Network disk Baidu network disk, stable and long-term effective ~At the beginning of the document only with Notepad, obviously this is inconvenient and not practical, word is the same, with the editor to see the document always feel strange, of course, the most important is no bookmark function.Since the mobile phone has a reader, on the PC there is no reason not to find a few, found that it is necessary to use the Internet, and no longer like eread the technology monopoly, uncomfort
Tags: logical judgment file directory properties in shell scripts determine if special usage case judgment68. Logical judgment in shell script, file directory attribute judgment, if special usage, case judgmentI. Logical judgments in shell scriptsFormat 1:if condition; Then statement; FiFormat 2:if condition; Then statement; else statement; FiFormat 3:if ...; Then ...; Elif ...; Then ...; else ...; Fiif: If.Then: and then.-GT: Greater than.-LT: Less than.-eq: Equals.-ne: Not equal to. Noeq.-ge:
出当前负载值2. Monitoring Project 502.sh content#! /bin/bash# #获得一分钟前时间戳, in order to get 502 times in a minuteD= ' date-d '-1 min "+%h:%m"C_502= ' grep: $d: $log |grep ' 502 ' |wc-l 'If [$c _502-gt] [$send = = 1]; Thenecho "$addr $d 502 count is $c _502" ... /log/502.tmp/bin/bash. /mail/mail.sh $addr \_502 $c _502. /log/502.tmpFiecho "' Date +%t ' 502 $c _502"3. The monitoring item obtains the disk usage condition:disk.sh Content#! /bin/bash# #Writen by aming##Rm-f. /log/disk.tmpFor R in ' Df-h |awk
statement; Else statement; fiExample:[email protected] shell]# CP if1.sh if2.sh[Email protected] shell]# VI if2.sh#!/bin/bashA=1If [$a-GT 3]ThenEcho OKElseEcho NookFi[[Email protected] shell]# sh if2.sh//execution added the judgment of the Else statement, output NookNook[[email protected] shell]# sh-x if2.sh//-x can see the detailed execution of the script
A=1
' [' 1-gt 3 '] '//1 and 3 comparison is not greater than 3, the judgment is else
Echo NookNook
Format 3:if ... ;
Tags: put special usage Erro range Multi-select file properties passwd greater than OCALogical-judgment logical expressions in shell scripts are used in [] (brackets):
-lt:=little than less than
-le:=little wqual less than equals
-eq:=equal equals
-ne:=no Equal Not equal to
-gt:=greater than greater than
-ge:=greater equal greater than or equal
Used in (()) parentheses:
You need to enclose it in double brackets.Format One
if condition;
Android app Black and white list
When the Android device system works, many service runs in the background, only when the system memory is not enough to kill the background service automatically.Android OTT Box Project development, the network set-top box running memory 512m/1g memory is not enough to use, in order to improve the smoothness of the system, compile the firmware to add the app black and white list function.
The Android system will issue a broadcastreceiver boot broadc
create a QR code with the logo of the QRCode class library
Introduction: This article mainly introduces the use of PHP QRCode class library to create the middle with the logo of the two-dimensional code, QRCode generate two-dimensional code instance code, the need for friends can refer to the next
9. Under PHP, create a QR code with the logo of the QRCode class library _php
Introduction: This article mainly introduces the use of PHP QRCode class library to create the middle with the logo of the
1. Raspberry Pi has been on the black screen for some time, which is what we often call the suspend state. So please use the Xset tool to set it up.Xset s offXset DPMS 0 0 02.apt-cache Search: Find some of the necessary installation software3. Do not let the Raspberry Pi into the screensaver, is X Window's black screen state using Xset s ... Settings for example. Xset s 0 never screensavers Xset s 1 A second after the screen saver status4. Installing
library function, which covers the C standard function library
4
special files (usually devices in/dev) and drive Program
5
games and screensavers
7
miscellaneous
8
system administration commands and daemons
6
To view the contents of the corresponding section, add a number to the corresponding
library
4
Special files (usually devices in/dev) and drivers
5
File formats and conventions
6
Games and Screensavers
7
Miscellaneous
8
System administration Commands and Daemons
To view the contents of the corresponding section, add a number to the corresponding section after the man, as follows:3 printfAll hand albums follow a common layout
Command 2 system calls 3 library functions, covers the C standard function library 4 special files (typically devices in/dev) and drivers 5 file formats and conventions 6 games and Screensavers 7 Miscellaneous 8 system administration commands and DaemonsTo view the contents of the corresponding section, add a number to the corresponding section after the man, as follows:All hand albums follow a common layout, which is optimized for simple ASCII text
attracting them to use.From a technical point of view, MMS is definitely not as simple as SMS technology, said simple, MMS is encapsulated in the WAP protocol on top of the high-level application (Note: Here is only the package of protocols, and does not appear WAP browser itself), using this high-level application can be implemented including images, audio information, The transmission of information, including video information, data and text, and other multimedia information. Some in the ind
to listen, you can also turn it off in the settings of the screensaver program. :Http://www.qualitysavers.to/files1/angel_art.exe
7. A child is born (the son was born, 2 MB)A slide shows 17 beautiful pictures painted by famous artists with the subject of "Madonna and child (the Virgin Mary and the Holy Child. Optional music. :Http://www.qualitysavers.to/files1/child_is_born.exe
8. Angel's animated Christmas card (Lively Angel Christmas card 1.5 MB)Exquisite dynamic image screensaver w
connection between the client and server. being clever, the attackers decided to reverse the connection process and totally avoid the problem created by Nat, hence reverse-connect Trojans. all is good in the attacker's world again.
Next, Nat is widely used. Because NAT will damage the connection between the client and the server, the traditional Trojan horse will stop working. The cunning attacker decides to flip the connection process and completely avoids problems caused by Nat, resulting in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.