sidebar is stored in the sidebar.css, and the theme is stored in the MAIN.CSS. Different angles have their own advantages and disadvantages.
Lingnan Network to recommend a CSS partitioning method: Base.css+common.css+page.css. All the styles of a website are divided into three categories by function: base, common, page, the final style of any page is performed by these three.
The base layer is the lowest level of dependency on the Web page style, which is relatively stable and does not need
VI several shortcut keys, record the memoI. Cursor movement1. Move the cursor to the file to start pressing the GG two key2. Move the cursor to the end of the file press the G key3. Move the cursor to the wardrobe press ^4. Move the cursor to the end of the line by pressing $Two. Editing1. Delete a (cursor) word (alphanumeric string) press DW two key2. Delete (cursor) line press DD two key3. Press the * key at the full text search cursor4. Search under (top) a match word press N (n) key5. Search
cap_linux_immutable processing capability (identifier.
Example:1,Use the chattr command to prevent the modification of a key file in the system.:#Chattr + I/etc/resolv. conf
Then run the MV/etc/resolv. conf command to operate on the file. Operation not permitted is obtained.. When editing the file, VIM prompts W10: Warning: Changing a readonly.File error. To modify this file, remove the I attribute: chattr-I/etc/resolv. conf.
#Lsattr/etc/resol
How to Set up a Java Development Environment under Mac OS and configure Java environment variables, osjava1. Open the terminal and search in the finder (This MAC) to find the Terminal 2. In cdlouiedeAir :~ Cdlouie $ (cdlouie is my computer user name) and enter sudo vim/etc/profile 3. enter the user name and password of the computer after the password. The password is not displayed. then, press the I key editor status ("/etc/profile" [readonly] 16L, 369C) at any location to switch to INSERT (-- I
Environmental W10 iis10/win2012There was previously a Web site on IIS, which later wrote an interface item that needs to be hooked up to this web site as a Web application.After you right-click Add Application, point to interface item. The interface project is not reachable. There is a problem with the configuration.Looking for a long time on the Internet, using a configuration specifies that subsites do not inherit the Webconfig configuration of the
Today the study uses TFS, primarily to manage the source code. No team management.Use the Environment W10 Pro/VS2017 Community/sqlserver2016/tfs2017 Express version1. Download and install TFS2017 address: https://www.visualstudio.com/zh-hans/downloads/?rr=https%3A%2F%2Fmsdn.microsoft.com%2Flibrary %2fms181477.aspx
After entering the page, drag down to find TFS2017 EXPRESS, free, suitable for 5 people below this version of about 300 m.
Use
automatically invalidated. S: The file or directory is deleted confidentially, that is, the hard disk space is fully recovered. U: In contrast to S, when set to U, the data content actually exists in the disk and can be used for undeletion. A and I are commonly used in the parameter options. The A option enforces that only non-removable, multi-log system security settings can be added. While I is a more stringent security setting, only superuser (root) or processes with cap_linux_immutable p
determined only by the ACL configuration, but by the code user's basic permissions and configured ACL permissions " As determined by the operation, other:rwx and code:r-- = code:r-- Now use code user, test writable When writing a file, it appears-INSERT--w10:warning: Changing a readonly file hint. In addition to setting up a single user, you can set up user groups, effective permissions (masks), such as for user groups: g:[user group]:[rwx]Note: Th
Several common small commands for viewing logged-in users:1, W : Displays the currently logged on user and what they are doing[Email protected] usr]# W10:02:06 up 2 days, 2:06, 1 user, Load average:0.00, 0.00, 0.00USER TTY from [email protected] IDLE jcpu PCPURoot pts/0 10.109.134.247 Mon09 0.00s 0.40s 0.15s W2, WhoAmI display the current login system valid user name[Email protected] usr]# WhoAmIRoot3. Who shows which users are currently logged inWho-
such as:~]#pwd7.history history command columns such as:~]#history 查看历史命令~]#history -c 清除历史命令7.shutdown Power off restart command format:Showdown [OPTION] [TIME] [WALL ...]Options:-R restart equals reboot-H shutdown-P shut down the machine-C cancels the previous shutdown operationTime:Now: Close the machine immediatelyhh:mm several minutes+m a few minutes later+0: Equivalent nowWALL: Send a notification column to another user such as:~]#shutdown -r +2 “warning...." 2分钟以后关机,并向其他用户发出”warning“
files or directories confidentially, that is, the hard disk space is fully recovered.U: In contrast to S, when set to U, the data content actually exists in the disk and can be used for undeletion.A and I are commonly used in the various parameter options. The A option enforces that only non-removable, multi-log system security settings can be added. While I is a more stringent security setting, only superuser (root) or processes with cap_linux_immutable processing power (identity) can apply th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.