; clear all processes
Ifconfig --> network configuration program
Route --> route setting command
Bdflushd --> open the buffer and write it back to the disk.
4. Files in the/usr directory
User Directory, which contains some programs and configuration data that users often need.
Spool @-> ../var/adm --> connect to/var/adm
TMP @-> ../var/adm --> connect
UNIX network administrators primarily rely on system logs to obtain traces of intrusions. Of course, there are also traces of third-party tools recording intrusions into the system. UNIX systems store LOG files in the following common locations:/Usr/adm-earlier versions of UNIX/Var/adm-use this location for a new version/Var/log-use this location for some versions of Solaris, linux BSD, and Free BSD./Etc-pu
and add recordsCreate a data table
Sql="create table people (name char (), Job char (TEN), pay int (4)); "
cursor.execute (SQL)
# Add a recordCursor.execute ('INSERT into people values (%s,%s,%s);',('Bob','Dev', 50000))# or you can add multiple records at oncerows = [('Sue','mus', 70000), ('Ann','ADM', 60000)] Cursor.executemany ('INSERT into people values (%s,%s,%s);', rows) transaction commits are required after the operation is completed for the
Common File Viewing commands and Common File Viewing commands
Common File Viewing commands
1 cat
Common Parameters
-N: display the row number
-E: show the end character at the end of the line $
-B: displays non-empty row numbers
-S consecutive empty rows merge a row
-A: Show Hidden characters
Cat-
[root@centos7 ~]# cat -An /etc/passwd 1 root:x:0:0:root:/root:/bin/bash$ 2 bin:x:1:1:bin:/bin:/sbin/nologin$ 3 daemon:x:2:2:daemon:/sbin:/sbin/nologin$ 4 adm:x:3:4:
*
*
*
Ere
*
*
four. Use the Cut command to select a field:The Cut command is used to cut down the data in a text file, which can be either a field type or a character type. Here is an example of an application:/> cat/etc/passwdRoot:x:0:0:root:/root:/bin/bashBin:x:1:1:bin:/bin:/sbin/nologinDaemon:x:2:2:daemon:/sbin:/sbin/nologinAdm:x:3:4:adm:/var/
... Print (a) ...
4
>>> a
3
>>> a=5
>>> while a>0:
... A-=1 ... if (a==3): .. Continue ... Print (a) ...
4
2
1
0
>>>
As for the exercise, write a for, while the do not write, simple
#-*-Coding:utf-8-*-
l = [' Bart ', ' Lisa ', ' Adam '] for
temp in L:
print (' Hello ' +temp)
#结果:
Hel Lo Bart
Hello Lisa
Hello Adam
5.dict and set
Dict is a dictionary and is a built-in data type, using key-value (Key-value) storage. A dictionary can query value by key, or add an
can guarantee the securityCode:
Copy Code code as follows:
$urls = Parse_url ($db _bbsurl);
$domain = $urls [' Host '];
Include_once (r_p. ') Require/admvclient.php ');
$adm _oem= new Cnzz_adm_oem ();
To determine if a config file has a user password
Pwcache::getdata (d_p. "data/bbscache/adm_config.php");//Username Password profile
if (Isset ($adm _user) isset ($
1. View All Users: SELECT * from Dba_users; SELECT * from All_users; SELECT * from user_users;2. To view user or role system permissions (System permissions that are directly assigned to a user or role): SELECT * from Dba_sys_privs; SELECT * from User_sys_privs; Sql> select * from User_sys_privs; USERNAME PRIVILEGE ADM---------------------------------------------- ---------------------------zszq UNLIMITED tablespace NO3. View roles (view only roles
this file controls all the init states, and also controls the regeneration of dead processes.
6./etc/fstabInformation of the file system that can be mounted in the system.
7./etc/lvmtabRun the following command:# Strings/etc/lvmtab; View system VG and disk information.
8./etc/rc. config. d/netconfContains the system name and network configuration information, such as the IP address, subnet mask, and route information.
9./stand/systemContains the system driver and subsystem information, kernel d
-connection. synchronous signal transmission is performed on transmission media (such as optical fiber and microwave.
It is a new digital transmission system. It will be called a revolution in the Telecommunications transmission system.
Information Highway has recently become a hot topic. By the 21st century, people can complete various daily activities at home with the help of the information highway. The road, the most basic unit of the information highway, will be composed of SHD devices.-
rather as a fragmented emission. However, the colon plays a very important role in each line of the file, and the colon is used to separate each item. We are fortunate that the cut command provides such an extraction method, specifically, to set the "spacer", and then set "Extract the domain", OK! Take the first five elements of/etc/passwd as an example: [[emailprotected] programming]$ cat/etc/passwd|head-n 5 root:x:0:0:root:/ Root:/bin/bash Bin:x:1:1:bin:/bin:/sbin/nologin Daemon:x:2:2:d
updates in Windows XP
327850 how to configure and use automatic updates in Windows 2000
If you are a senior user or IT professional, you can use any of the following methods to configure automatic updates:
Use group policy or Microsoft Windows NT 4.0 system policy
Modify registry
This article describes how to use any of the following methods to configure the automatic update function.For more information, use the local group policy configuration to automatically update
Click Start, and th
intercepted, and the space between-F and 1 is optional.[Email protected] ~]# head-n2/etc/passwd |CUT-C2OI[Email protected] ~]# head-n2/etc/passwd |CUT-C1RB[Email protected] ~]# head-n2/etc/passwd |cut-c1-10root:x:0:0Bin:x:1:1:[Email protected] ~]#[Email protected] ~]# head-n2/etc/passwd |cut-c5-10: x:0:0X:1:1:The-c option can be followed by 1 number n, or an interval n1-n2, or multiple numbers n1,n2 and N3.[Email protected] ~]# head-n2/etc/passwd |cut-c1,3,10Ro0BnThe sort command is used for so
PrefaceAwk is the most powerful tool in the real world of Linux, and it is a programming language that can be used to process data and generate reports (Excel), and the data can be one or more files. A > shows content within a rangeThe test files and contents are as follows:[email protected] data]# cat TestAwk.txt root:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/nologindaemon:x : 2:2:daemon:/sbin:/sbin/nologinadm:x:3:4:adm:/var/
the specified segment
Example: (1) generate a report
Example: (2) Decimals
Rounded
Round decimal places without rounding
[Root @ tx3 ~] # Cat awk.1
23.3456 11.234 45.67
[Root @ tx3 ~] # Awk '{printf "%. 2f \ t %. 2f \ t %. 2f \ n", $1, $2, $3} 'awk.1
23.3511.2345.67
Iv. Use of awk
(1) Regular Expression
\ (\) \ {\} Is not supported
. * ^ $? + [] | \
Example [root @ tx3 ~] # Awk '/^ $/{print "this is an empty line"}'/etc/inittab
This is an empty line
This is an empty line
This is an empty
Common Unix log files:
File Name Content Monitoring Method
/Etc/rc. log/etc/rc running records read text files,/Var/adm/syslog. Log note the prompt information and correspondingVar/adm/SW/*. Log Software Installation Log date, analyze related problems./Var/adm/wtmp user logon information can be viewed using the last command/Var/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.