Discover traceroute command in unix, include the articles, news, trends, analysis and practical advice about traceroute command in unix on alibabacloud.com
Excerpt from: http://blog.csdn.net/zjg555543/article/details/8278266Linux and UNIX, each version of the operating system has its own software installation, the most convenient is to install software online, this article is to collect the various versions of the online installation of the command.1. Solaris 10:Pkgutil-i2. FreeBSD:Enter/usr/ports/devel/*/execute make,make install will automatically download t
The guy who is familiar with DOS is trying to make UNIX like DOS,
One of them is to set the Unix prompt as $ p $ G. The following describes the method.
The GNU bash (Bourne again shell) is more convenient for different shell settings)And KSh (Korn shell) and tcsh (enhanced version of CSH, CSH in Linux isSymbol connection ). The General Sh (Bourne shell) and CSH settings are cool. One by oneVarious shell se
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database ldquo; locks rdquo, and you cannot enter
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database ldquo; locks rdquo, and you cannot enter
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database is "locked" and you ca
In many cases, we need to terminate all Oracle processes ). When the database is "locked" and you cannot enter Server Manager to terminate the database, you can use the kill command in UNIX to terminate all Oracle processes. This is one of the common uses of the kill command.To terminate an Oracle instance on a UNIX server, perform the following steps:Terminate a
In the process of using the UNIX operating system, we often use a variety of problems, such as the system suddenly slowed down, the system is prone to panic or the host of the terminal often appear panic, when we often guess, is hard disk space is too small, or insufficient memory? Is there a bottleneck in I/O, or is there a problem with the core parameters of the system? At this time, we should consider using the system to provide us with the SAR
including sub-directoriesPWD (print working directory)Displays the path of the current directory (path)CD (change directory)Change the current directory(1)..Represents the parent directory to go to the current directory.(2)/Represents the go to root directory.(3)When there is no option, go to the user's home directoryTouch file_nameCreate a new file, modify the file dateFunction: Change the date of the file, do not modify the contents of the file, if the file does not exist, create a new file.M
Lienhua342014-10-15ISO C defines the system function for executing a command string in a program. Its statement is as follows,
#include
int system (const char *cmdstring);
The system function calls the fork, exec, and WAITPID functions in its implementation. The system function calls the fork function to create the child process, and then calls '/bin/sh-c cmdstring ' to execute the command
Unix/Linux Command memorandum, unixlinux Memorandum
Arp: The ARP cache contains one or more tables used to store IP addresses and resolved MAC addresses.
// Extract all Bound0 ip and mac Information
Arp-n-I bond0 | awk '$5 = "bond0" {print $1, $3 }'
Sed: used to edit the text in a document or string through a series of commands
// Read a single row of data from/script/ip and print it out.
Sed-n '1p'
ChmodIs a Command Used in UNIX systems to control the user's permissions on files (ChAngeMoDA combination of e-word prefixes) and functions. Only the file owner and the Super User can modify the file or directory permissions. You can use absolute mode to specify the object ACL in symbolic mode.Usage
ChmodUse syntax
$ chmod [options] mode[,mode] file1 [file2 ...]
Use the LS
Plink_path ="C:/plink.exe"'Plink.exe path
Username ="Username"'User name
Password ="Password"'Password
Host ="192.168.0.1"'Unix/Linux server address
Command ="Ls"'Command to be executed
Set oshell = Createobject ("Wscript. Shell ")
'Combine plink commands, including logon and Command Ex
BG and FGLinux/unix the biggest advantage of the Microsoft platform is the real multi-user, multi-tasking. Therefore, in the task management also has the characteristic management thought.We know that on Windows, we either have a program running in the background as a service or stop the service. Instead of allowing the program to switch between foreground and background. Linux provides FG and BG commands that allow you to easily schedule tasks that a
Execute Docker PS command, appear
"Cannot connect to the Docker daemon at Unix:///var/run/docker.sock. Is the Docker daemon running?
Error
It is now determined that the Docker itself is installed properly.
The problem is because the Docker service did not start, so the Docker process could not be found under the corresponding/var/run/path.
Execute service Docker start
Recently, my colleague introduced me to the screen command, which is really good. In the past, in order to let the program run without the terminal, either let it run in the background or use nohup to run, but if the program needs to interact, it will be troublesome. For example, you need to use SCP for copy, enter a password, and the data volume is large. It takes a long time. People who have met will know the pain.
With screen, everything is simple.
The conversion character of the shell command line is \ www.2cto. comecho $ PATH // get the current value of the system environment variable include a file (class) to: 1.4. # ifndef_ALARM _ # define_ALARM _ # endif extract and copy method: (c... for the unix command line, the conversion character of shell command line
a delimiter to sort the 2nd field[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2D:1F:11C:2B:3A:4E:5Use ":" To make a delimiter, sort the 2nd field, sort by number size[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2-nD:1C:2B:3A:4E:5F:11Sort the/etc/passwd files by uid[Loring test]# Sort-t ":"-K 3-n/etc/passwdSort the passwd files in the order of the UID from large to small[Loring test]# Sort-t ":"-K 3-nr/etc/passwdPrint/etc/group in order of GID from small to large[Loring test]# so
In Unix/Linux, run the Find command to search for an empty directory: find/path-depth-type d-empty www.2cto.com: find/path-depth-type f-empty find the file by name: find/path-name name_of_file find the file by extension: find/path-name "*. given_extension ": find/path-name '*. txt '-perm 644 searches for a file based on the permission attributes of the file: find/path-perm-permision_bits www.2cto.com withou
"ibase=2;obase=10000; Binary "|BC-convert binary to 16 binary (10000_b=16_d)ReadelfStringsLook for an ASCII string with a length greater than 4 in the binary file. For object file, do not find the text segment, but search all byte for other files.-A To object file also searches the text segment-Search each byte for both normal and object files--Treat each remaining parameter as a file name-O for each ASCII string found, output its offset at the same time.-T [d|o|x] output offset using decimal (
toggle selection or [exit][previous][next]>Choose Product Installation Directories:----------------------------------------Middleware Home Directory: [/weblogic/oracle/middleware]Product Installation Directories:1| WebLogic Server: [/weblogic/oracle/middleware/wlserver_10.3]2| Oracle Coherence: [/weblogic/oracle/middleware/coherence_3.7]Enter index number to select OR [exit][previous][next]>--Default, enter:The following products and JDKs would be installed:-------------------------------------
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.