been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
including sub-directoriesPWD (print working directory)Displays the path of the current directory (path)CD (change directory)Change the current directory(1)..Represents the parent directory to go to the current directory.(2)/Represents the go to root directory.(3)When there is no option, go to the user's home directoryTouch file_nameCreate a new file, modify the file dateFunction: Change the date of the file, do not modify the contents of the file, if the file does not exist, create a new file.M
Below is a collection of 28 unix/linux under the 28 command line tools, some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. In order to facilitate the study, I have a picture, but also added the official website connectionDstat SAR
Iostat, Vmstat, ifstat a triple tool for viewing system performance (I mentioned those three Xxstat tools in the
Unix/Linux Command memorandum, unixlinux Memorandum
Arp: The ARP cache contains one or more tables used to store IP addresses and resolved MAC addresses.
// Extract all Bound0 ip and mac Information
Arp-n-I bond0 | awk '$5 = "bond0" {print $1, $3 }'
Sed: used to edit the text in a document or string through a series of commands
// Read a single row of data from/script/ip and print it out.
Sed-n '1p'
ChmodIs a Command Used in UNIX systems to control the user's permissions on files (ChAngeMoDA combination of e-word prefixes) and functions. Only the file owner and the Super User can modify the file or directory permissions. You can use absolute mode to specify the object ACL in symbolic mode.Usage
ChmodUse syntax
$ chmod [options] mode[,mode] file1 [file2 ...]
Use the LS
Plink_path ="C:/plink.exe"'Plink.exe path
Username ="Username"'User name
Password ="Password"'Password
Host ="192.168.0.1"'Unix/Linux server address
Command ="Ls"'Command to be executed
Set oshell = Createobject ("Wscript. Shell ")
'Combine plink commands, including logon and Command Ex
There are many commands in the UNIX operating system that can be used to back up files. However, the root file system in the UNIX operating system is a relatively special file. In general, you must uninstall other file systems If you are backing up this type of file. Because the root file system is the ancestor of other filesystems, it backs up files in other file systems at the same time if not uninstalled
Brief introduction
The crontab command is common in UNIX and unix-based operating systems, and is used to set periodically executed instructions. This command reads the instruction from the standard input device and stores it in a "crontab" file for later reading and execution.
Typically, crontab stored instructions
The conversion character of the shell command line is \ www.2cto. comecho $ PATH // get the current value of the system environment variable include a file (class) to: 1.4. # ifndef_ALARM _ # define_ALARM _ # endif extract and copy method: (c... for the unix command line, the conversion character of shell command line
a delimiter to sort the 2nd field[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2D:1F:11C:2B:3A:4E:5Use ":" To make a delimiter, sort the 2nd field, sort by number size[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2-nD:1C:2B:3A:4E:5F:11Sort the/etc/passwd files by uid[Loring test]# Sort-t ":"-K 3-n/etc/passwdSort the passwd files in the order of the UID from large to small[Loring test]# Sort-t ":"-K 3-nr/etc/passwdPrint/etc/group in order of GID from small to large[Loring test]# so
used with 01, instead of a newline character, it is split with-L number does not cut with a cut, but is called with the data of this number row after every number row is read utility-N number is cut and the results are grouped by each number, using each set of results as parameters, calling utility-X finds that if the number of parameters is insufficient, terminate Xargs immediately-T print the instructions to be executed to stderr before executing utility-p maxprocs Parallel mode, up to Maxpro
Recently, my colleague introduced me to the screen command, which is really good. In the past, in order to let the program run without the terminal, either let it run in the background or use nohup to run, but if the program needs to interact, it will be troublesome. For example, you need to use SCP for copy, enter a password, and the data volume is large. It takes a long time. People who have met will know the pain.
With screen, everything is simple.
In Unix/Linux, run the Find command to search for an empty directory: find/path-depth-type d-empty www.2cto.com: find/path-depth-type f-empty find the file by name: find/path-name name_of_file find the file by extension: find/path-name "*. given_extension ": find/path-name '*. txt '-perm 644 searches for a file based on the permission attributes of the file: find/path-perm-permision_bits www.2cto.com withou
"ibase=2;obase=10000; Binary "|BC-convert binary to 16 binary (10000_b=16_d)ReadelfStringsLook for an ASCII string with a length greater than 4 in the binary file. For object file, do not find the text segment, but search all byte for other files.-A To object file also searches the text segment-Search each byte for both normal and object files--Treat each remaining parameter as a file name-O for each ASCII string found, output its offset at the same time.-T [d|o|x] output offset using decimal (
toggle selection or [exit][previous][next]>Choose Product Installation Directories:----------------------------------------Middleware Home Directory: [/weblogic/oracle/middleware]Product Installation Directories:1| WebLogic Server: [/weblogic/oracle/middleware/wlserver_10.3]2| Oracle Coherence: [/weblogic/oracle/middleware/coherence_3.7]Enter index number to select OR [exit][previous][next]>--Default, enter:The following products and JDKs would be installed:-------------------------------------
SED usage: sed ' Command ' filename (s) displays only results without modifying the file.
1, sed ' 2,5d ' file displays files, excluding 2-5 rows, but the number of rows exceeds the actual number of files in the file does not error.
The sed '/10[1-4]/d ' file displays files, excluding rows containing 101-104.
Sed ' 2, $d ' file displays files, showing only the first row. The sed ' 2,$!d ' file displays only the other rows except the first line.
Se
Unix/Linux use the Find command to find the file to find the empty directory: find/path-depth-typed-emptywww.2cto.com to Find the empty File: find/path-depth-typef-empty find the file by name: find/path...
In Unix/Linux, run the Find command to search for an empty directory: find/path-depth-type d-empty www.2cto.com:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.