command mkdir My \ Documents ents to create a directory name with spaces in the middle. This is also true if you want to create a file name with spaces. However, if a file or directory contains metacharacters, you also need to use transfer characters to define these special metacharacters. Otherwise, some inexplicable problems may occur.
Second, use escape characters to wrap the command. In Unix operating systems, some
I think most UNIX network administrators have more or less had such troubles: a user needs to work on multiple different UNIX systems and log on to different UNIX systems, save their documents, and the administrator needs to create an account for him on every UNIX system, set the password, set the group information, an
administrator-M: Specifies that the group member and-a use almost-R: Remove password-r: Restrict user login group, only members in group can join the group with NEWGRPGpasswdgroupname : If the system has a Peter account, the account itself is not a member of the GroupName group, use NEWGRP need to enter a passwordLet the user temporarily join the group, and then the file group created by Peter will be groupname. So this way you can temporarily let Peter build the textUse other groups instead of
As a computer user, do not understand the graphical operation of the file system does not count on the use of computers. So as a programmer, if you do not understand the command line operation of the Linux file system, you do not dare to say that you are a qualified programmer. We work in the use of Unix/linux as an application server, nothing more than to deploy our written software to a remote server, without the various operations on the file, if y
Document directory
Small programs are easy to understand
Small programs are easy to maintain
Small programs consume fewer system resources
Small programs are easier to combine with other tools
Three Systems
The UNIX Philosophy
Author:David Calvert
The UNIX Philosophy
FromThe UNIX PhilosophyBy Mike gancarz. Operating systems embody the philos
Using Lsof to find open filesLearn more about the system by looking at the open file. Knowing which files the application opens or which application opens a particular file, as a system administrator, will allow you to make better decisions. For example, you should not uninstall a file system that has an open file. With lsof , you can check open files and abort the process as needed before uninstalling. Similarly, if you find an unknown file, you can find out exactly which application opened the
clumsy or difficult to accomplish on other operating systems, either having to program themselves or turning to specialized tools. In UNIX operating systems, you can simply tap a few commands, which is also one of the reasons Unix/Linux enjoys.
So where can this power and flexibility come from?
1. Each command only does one thing, which is equivalent to providi
Introduction: This is a unix/linux system Management Automation series, mainly about how to achieve automated monitoring process status and performance and timely notify the system administrator.
Process monitoring is a very important part of unix/linux system management. It can monitor the process status, CPU utilization of the process, and so on, and can send alarm information to the system administrator
A timed task (cron job) is used to schedule commands that need to be executed periodically. With it, you can configure certain commands or scripts to run periodically over a set period of time. Cron is one of the most useful tools in Linux or Unix-like systems. The Cron Service (daemon) runs in the background of the system and continuously checks the/etc/crontab
Article Title: System Management: UNIX file systems. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Description of file name
Files on UNIX computers are organized in hierarchies. The top layer of this hierarchy is/, which is generally called a slash or root directory
Deploy IBM_DB2 on dozens, hundreds, or thousands of clients and servers based on UNIX and Linux platforms, including IBMDB2UniversalDatabase (
Deploy IBM _ DB2 products on dozens, hundreds, or thousands of clients and servers based on UNIX and Linux platforms, including IBM DB2 Universal Database (
Deploy IBM _ DB2 products on dozens, hundreds, or thousands of clients and servers based on
The Dos2unix command is used to convert a DOS-formatted text file into Unix (Dos/mac to UNIX text, format Converter). Dos text file is based on \ r \ n As a break mark, expressed as 16 binary is 0D 0 A. The text file under Unix is marked with \ n as a break mark, which means that the 16 binary is 0 a. The DOS format text file under Linux, with the lower version o
2016.11.4 9:30-10:15Adding new softwareIf you do need to install additional software, your first need to determine the canonical name of the relevant software PAC Kage. For example, you ' d need to translate "I want to install locate" to "I need to install the findutils pack Age, "or translate" I need named"to" I had to install BIND. " A variety of System-specific indexes on the web can help with this, but Google is usually just as effective. For example, the A search for "Locate command" takes
. It can also be used to manage startup and shutdown settings for Oracle database services and Oracle databases, edit registry parameter settings, and view Oracle process information.
Automatic tasks
On UNIX, automated tasks like backups are done through cron-run shell scripts. Use scheduling tasks on Windows2000 to run batch files on a regular basis. This schedule is more resilient than the at dispatch command on the previous Windows NT. It allows a
All of the following commands are valid in Linux/Unix shell. Bash is the main command here. In case of any discrepancy, your own server shall prevail. Linux mentioned in this article mainly refers to RHEL/centos, and Unix refers to FreeBSD, which is also the most used version on the server.
CTRL + a switch to the command line
This operation has the same result as
The following is a summary of my personal experience. I believe it is useful for UNIX or UNIX-clonefreebsd, openbsd, netbsd, linux, and etc that have been infiltrated: first, you can use the following system commands and configuration files to track the source path of intruders: 1. who ------ (view who logged on to the system) 2.
The following is a summary of my
BKJIA technical materials] recently, many colleagues, especially our PHP developers, basically do not use shortcuts in Linux/unix, seriously affecting work efficiency, therefore, this article is specially written. I will comment it out in detail after each usage.
All of the following commands are valid in Linux/unix shell. bash is the main command here. In case o
shows that the sync command should be executed twice to ensure reliability, because the information is not actually written to the disk when the sync command is completed, this command has been executed once. After executing the sync command, wait until the disk work light is off (assuming there is a system work indicator light), and then stop the running of the machine or start the machine.
A unix system can be damaged at any time. Therefore, you m
Variables are indispensable in any development language. In Unix operating systems, there are also variables. System Engineers can use variables when writing scripts or commands. Now I will talk to you about how to use variables in Unix operating systems, and under what circumstances to use variables.
I. Considerations for variable definition.
Defining variables
The main content of this article is to introduce the simple principle of ODBC and how to install, configure and program ODBC under Linux/unix.
ODBC principle
ODBC is the abbreviation for open database Connect, which is the Open-source interconnect, a unified interface standard for accessing databases, presented by Microsoft in 1991, and middleware between applications and database systems. It provides database independence by using the interaction of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.