G is a pattern modifier that indicates multiple lookups in the entire string.Match method to find content that matches the reg regular match
"AB23839CD". Match (/\d+/)
Blank \s (Including Space return tab, etc.)\f matches the page break, \ n matches the newline character, \ r matches the carriage return, \ t matches the tab, and the \v matches the Vertical tab.\s matches a single space, equivalent to [\f\n\r\t\v]. For example:Example 1:
parameter must have the. bat or. CMD extension.
7. Start command
Call an external program. All the DOS commands and command line programs can be called by the START command.
Common Intrusion parameters:
Minimum window size when Min startsSeparate starts a 16-bit windows program in a separate spaceHigh starts applications in the high priority categoryRealtime starts applications in the realtime priority categoryWait starts the application and waits for it to endParameters: these are parameters s
G is a pattern modifier that indicates multiple lookups in the entire string.Match method to find content that matches the reg regular match
"AB23839CD". Match (/\d+/)
Blank \s (Including Space return tab, etc.)\f matches the page break, \ n matches the newline character, \ r matches the carriage return, \ t matches the tab, and the \v matches the Vertical tab.\s matches a single space, equivalent to [\f\n\r\t\v]. For example:Example 1:
-9]|1[0-9]|0?) [0-9]) 7. Mobile number Class (13[0-9]|15[0-9]|18[0-9]) ([\d]{2,4}) {2} 8. Match 33111 type ([[\d]) \1{1,} ([\d]) \2{2,} 9. Match 5331533 type ([\d ] {1,} ([\d]) {1,}) \1{1,} 10, matching 22334,123355 type ([\d]) \1{1,} ([\d]) \2{1,} 11. The bottom match $//aabb, which allows AAAA (\d) \1 (\d) \2$//abab, Allow AAAA (\d) (\d) \1\2$//aaab to allow AAAA (\d) \1\1\d$//while allowing (?:( \d) \1 (\d) \2| (\d) (\d) \3\4| (\d) \5\5\d) $//above if AAAA is not allowed, the second (\d) inst
This article aims to solve the problem of IE hijacking. There are many reasons for IE hijacking. The simple reason is that the Registry is changed. The complicated one is virus, Trojan Infection, or driver protection, in the end, you still need to reset the relevant registry. All the operations mentioned in this article have the premise that the virus should be cleared first. On this premise, we can follow the related operations shown in this article to handle the problem.I. Registry Positioning
Comments: The IE browser is hijacked. It is often encountered when surfing the Internet. The following method is very useful.
This article aims to solve the problem of IE hijacking. There are many reasons for IE hijacking. The simple reason is that the Registry is changed. The complicated one is virus, Trojan Infection, or driver protection, in the end, you still need to reset the relevant registry. All the operations mentioned in this article have the premise that the virus should be cleared fi
// Precaseless: case-insensitive, equivalent to I in other languagesVaRReg: tperlregex;BeginReg: = tperlregex. Create (NiL );
Reg. Subject: = 'abc ABC abc ';Reg. RegEx: = 'abc ';Reg. Replacement: = '◆ ';
Reg. Options: = [precaseless]; // The options are of the set type.
Reg.
do not display choices and? At end of prompt string. The question mark and the character to be selected are not displayed.
/S treat choice keys as case sensitive. sensitive when processing the characters to be selected
/T [:] C, nn default choice to C after NN seconds, the prompt string errorlevel is set to offset of key user presses in choices is selected by default after C text prompt string to display. errorlevel is set to the offset value of the characters typed by the user in the character
Each time we fragment the hard disk, we must first open the "Start> All Programs> accessories> System Tools" branch, and then run the "disk fragment program" under the branch ", this completes the hard disk fragmentation operation. This operation process is really troublesome. If we can add the hard disk fragment function to the right-click menu, it will be much easier to organize the hard disk fragment later. Open notepad and enter the following content:
Windows Registry Editor Version 5.00
[
To activate Diskeeper 2009 using a registration machine, follow these steps:
1. Disable the service diskeeper: Enter "services. msc" in the running state, find the diskeeper, right-click it, and choose disable;
2. Copy the three files in the "crack file" to the Diskeeper 2009 installation directory and replace the corresponding files;
3. Run the registration machine (the Vista system needs to disable "UAC", right-click to run as Administrator), select the installed version, and then
. sensitive when processing the characters to be selected/T [:] C, nn default choice to C after NN seconds, the prompt string errorlevel is set to offset of key user presses in choices is selected by default after C text prompt string to display. errorlevel is set to the offset value of the characters typed by the user in the characters to be selected if I run the command:For choice/c ync/m ", Press Y, N, or C. "The screen will show: Press Y to confirm, press n to confirm, or press C to cancel.
Second, JavaScript expression function in the description of the detailed (exec, test, match, replace, search, split)1. Use Regular Expressions method to match the lookup string1.1. Exec method Detailedreturn value of the Exec methodThe Exec method returned is not actually a matching result string, but an object, simply modify the Execreg function, to do an experiment can confirm this point:function Execreg (Reg, str) {var result = reg.exec (str); al
Article from: http://wenku.baidu.com/view/ead0ab6fb84ae45c3b358cc2.html
V. Reg Export
Description: Creates a copy of the specified sub-item, item, and value to a file to transfer it to another server.
Syntax:
Reg export keyname filename
Parameters:
Keyname specifies the full path of the subitem. The export operation can only work on a local computer. Start with the corresponding subdirectory tree path. The
Receive a space alarm to view disk usage:Df-hFile system capacity has been used with available% mount points/dev/sda2 8.2G 7.4G 824M 91%/Tmpfs 32G 0 32G 0%/dev/shm/dev/sda3 814G 281G 533G 35%/HomeLook at the size of the system and the capacity is 5G, inexplicable 3G where to go#/usr/sbin/lsof | grep deletedCOMMAND PID USER FD TYPE DEVICE SIZE NODE NAMEDbus-daem 3798 dbus txt REG 8,2 306992 129307/bin/dbus-daemon (Deleted)SendMail 12457 smmsp 3uW
How to remove the VBS virus completely under WIN7 environment?
What can a VBS virus do?
In the case of displaying hidden files and extensions, the USB disk and my computer have multiple file Autorun.inf and *. VBS (8-digit VBS file) All folders under the root folder become two, one is hidden, and the other is shortcuts. Sometimes the system's display of hidden files will be invalidated, unable to fully display the virus file (but can be seen through the WinRAR file browsing), if not complete
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.