In many cases, we need to terminate all Oracle processes ). When the database is "locked" and you cannot enter Server Manager to terminate the database, you can use the kill command in UNIX to terminate all Oracle processes. This is one of the common uses of the kill command.To terminate an Oracle instance on a UNIX server, perform the following steps:Terminate a
For example, we know a Linux file size of 1,500 bytes, then we use the following command to query
Find/-size 1500c, the character C indicates the size of the file to be checked is bytes.
If we do not even know the exact size of this file, then in Linux can also be a fuzzy search mode to solve.
For example, if we enter find/-size +10000000c This
ChmodIs a Command Used in UNIX systems to control the user's permissions on files (ChAngeMoDA combination of e-word prefixes) and functions. Only the file owner and the Super User can modify the file or directory permissions. You can use absolute mode to specify the object ACL in symbolic mode.Usage
ChmodUse syntax
$ chmod [options] mode[,mode] file1 [file2 ...]
Use the LS
process of restarting, the customer did not send text) after restarting, the customer sends the text, but in the server TCP has lost the previous connection information, so in response to an RST, The call returns Econnreset.6) Server main machine: When the normal shutdown, the INIT process usually first send sigterm signal to all processes (can be captured, the default action is to terminate the process, only ignored or processed after no termination, will be terminated by Sigkill), and wait fo
Recently, my colleague introduced me to the screen command, which is really good. In the past, in order to let the program run without the terminal, either let it run in the background or use nohup to run, but if the program needs to interact, it will be troublesome. For example, you need to use SCP for copy, enter a password, and the data volume is large. It takes a long time. People who have met will know
a delimiter to sort the 2nd field[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2D:1F:11C:2B:3A:4E:5Use ":" To make a delimiter, sort the 2nd field, sort by number size[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2-nD:1C:2B:3A:4E:5F:11Sort the/etc/passwd files by uid[Loring test]# Sort-t ":"-K 3-n/etc/passwdSort the passwd files in the order of the UID from large to small[Loring test]# Sort-t ":"-K 3-nr/etc/passwdPrint/etc/group in order of GID from small to large[Loring test]# so
"ibase=2;obase=10000; Binary "|BC-convert binary to 16 binary (10000_b=16_d)ReadelfStringsLook for an ASCII string with a length greater than 4 in the binary file. For object file, do not find the text segment, but search all byte for other files.-A To object file also searches the text segment-Search each byte for both normal and object files--Treat each remaining parameter as a file name-O for each ASCII string found, output its offset at the same time.-T [d|o|x] output offset using decimal (
Several useful Unix command shortcuts
1.!$ Bash or zsh represents the last parameter of the previous command, for example, where the!$ represents file-b, it is convenient to view the contents of the File-b file;
Copy Code code as follows:
$ CP file-a File-b
$ vim!$
2.grep-ri-r represents a recursive loo
Unix more command, unixmore
[Syntax]: more [-cdflrsuw] [-number of rows] [+ number of rows] [+/mode] [file...]
[Description]: displays the file on the terminal. -- more -- is displayed at the lower left of each screen. If the file is read rather than the pipe, the percentage is displayed at the end, indicates the displayed part. Press the Enter key to roll up a line and press the Space key to roll up a
Unix cp command, unixcp
[Syntax]: cp [-p] [-r] File 1 [file 2...] Target
[Description]: Set file 1 (file 2 ...) if the object is a file name, only one file can be copied. if the object is a directory, multiple files can be copied, if the target file does not exist, create this file. If yes, overwrite the previous content. If the target file is a directory, copy the file to this directory.-I will prompt
Sed and awk are powerful text filtering tools in the UNIX environment.
With SED and awk, it is easy to edit local files, and it is easier to use regular expressions to filter out the output of other commands.
SED represents the stream Editor, which means that sed is a flow-oriented mechanism. All inputs provided for the SED command are sent to STDOUT after being processed by SED.
The SED
Today I learned the Example 2-2 of "Advanced Programming in UNIX environment", but I am very confused.
I created a directory named sample2_2, put the source code in it, compile it, and generate the sample2_2 file. Then copy pathconf. sym and sysconf. sym to this directory.
Run the following command:
./Sample2_2 pathconf. sym
The result is as follows:
No symb
: Change the working directory to DIR before performing the archive action
-F,--file=archive: Specifies the archive file name (that will be created or existing)
-j,--BIP2: Using bzip2 compression for archive files
-j,--XZ: Using XZ compression for archive files
-P,--preserve-permissions: Preserve access to the original file
-V,--verbose: Display command entire execution process
-Z, gzip: Using gzip compression for archive files
Note: the connec
Jobs command example
I am a new Linux/Unix user. In Linux or Unix-like systems, how can I use BASH/KSH/TCSH or POSIX-based shell to view the job in progress )? On Unix/Linux, how does one display the current job status? (LCTT: job, also known as "task ")
Job control is a cap
Example of the passwd command in 10 Linux
As shown in the passwd command name, it is used to change the password of the System user. If the passwd command is executed by a non-root user, it will ask the current user's password and then set the new password of the user who calls the
Ss Command exampleGuideSs is short for Socket Statistics and can be used to obtain socket Statistics. It can display content similar to netstat. But the advantage of ss is that it can display more detailed information about TCP and connection status, and is faster and more efficient than netstat.
When the number of socket connections on the server becomes very large, the execution speed will be very slow, whether using the netstat
;B. There are generally three ways to get root privileges, simple is the SU command, but the SU command requires root password, need to switch back with SU + username, the other two sudo-i or sudo su command can be long-term access to root operations, Just enter the current
This article mainly introduces the PHP external execution command function usage, combined with the instance form analysis exec and the system executes the external command the related use skill, needs the friend can refer to the next
This example describes the use of external command functions for PHP. Share to every
of UNIX system is used, because the command is set to "% ". if other computer systems (such as OS, VAX/VMS, and Macintosh) commands are used, there are only some differences in details, but they are essentially the same, the following is an example of a basic Telnet command:
telnet porky.math.ukans.edu Trying 129.237.
, use tcpping to determine which hosts are running. NMAP does not implement this function by sending an icmpecho request packet and then waiting for a response. Instead, it sends a tcpack packet to the target network (or a single host) and waits for a response. If the host is running, the RST package is returned. This option is valid only when the target network/host blocks the ping packet and still allows you to scan it. For non-root users, we use the connect () system call to implement this fu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.