Summary: three methods of executing shell scripts, fork, source and exec, are summarized.
Prerequisites
1. any program we run is a child process generated by the parent process. After the child process is completed, it is returned to the parent
Use of the lynx Browser
Lynx online address: http://lynx.itlearner.comLynx introduction lynx
It is a full-featured WWW browser on the Character interface. It can run in a variety of operating systems, such as VMS, UNIX, Windows 95, and Windows NT,
Overview
Wildcard is processed by shell. It only appears in the argument of the command-neither in command_name nor in options. When a wildcard is encountered in argument, shell will regard it as a path or file name to search for possible matching
I. Introduction to minix3
Minix3 is a new open-source operating system designed with high reliability, high scalability, and security. Minix3 is more or less based on previous versions, but it is fundamentally different from the old version in many
Using Linux commands to send messages (post) Linux has developed to today, and many functions can be completed on a visual interface. However, commands are very useful in many cases. In particular, Linux administrators can communicate with other
Author:You need to participate in the process of adding;From:Linuxsir. orgIntroduction:This article only talks about the most commonly used Linux and Windows Shared Files, mainly to guide new fingers. How to create the simplest Samba server and
The first introduction of emacs-shell mode
Shell mode is an interesting mode in Emacs. Generally, there are three main ways to run shell in Emacs. One is to use Emacs terminal emulator. This mode basically simulates a terminal in Emacs and then runs
Shell is a command interpreter in Linux and the main environment in Linux. It has many functions, it mainly describes the basic concepts of shell, shell types, special characters in shell, redirection, and shell program. The focus is on shell
Shell Introduction
Although not part of the Unix/Linux kernel,But it
It calls most of the core functions of the system to execute programs, create files, and coordinate the running of various programs in parallel.. Therefore, shell is the most
After studying linux user management for a long time, I would like to share with you that you have certainly gained a lot after reading this article. I hope this article will teach you more things.
I. Permission control mechanism
Linux is a
Learning bash notes-process Processing1. process ID and job number. When you run the command after attaching the & amp; #, the shell will respond as follows:$ Ls &[1] 3318[1] indicates the job number and 3318 indicates the process number. When a
Percona-toolkit installation and introduction
MySQL database is one of the best lightweight and open-source databases. Its features, management, and robustness are quite different from those of Oracle. Therefore, there are many powerful third-party
Shell Process Control and shell Process
Unlike Java, PHP, and other languages, sh process control cannot be blankIf elseif statement syntax format:
if conditionthen command1 command2 ... commandN fiWrite a line (applicable to terminal
Use Innobackupex to quickly build (fix) the MySQL Master/Slave Architecture
There are many ways to build MySQL Master/Slave databases. The traditional mysqldump mode is one of the choices of many people. However, this method is not ideal for large
Do you want to know what your server is doing? You need to know the basic commands described in this article. Once you are familiar with these commands, it lays the foundation for becoming a professional Linux system administrator.
You can use a
This article describes how to solve the problem of linux Server hacking. The "root kits" or popular spying tools occupy your CPU, memory, data, and bandwidth.
At ordinary times, some friends may encounter the problem of server hacking. After
Netcat is the Swiss Army knife in the network tool. it can read and write data in the network through TCP and UDP. By combining with other tools and redirection, you can use it in multiple ways in the script. What the Netcat command can do is
Prepare to learn about ORACLE. when setting up the environment, always prompt that SWAP space is insufficient. Specifically, record the method for adding SWAP space! Step 1: Check the current partition (use free-m or cat/proc/swaps): [root @ db2root]
In many systems, Telnet is involved and used. Today, we will explain how to use and operate Linux Telnet commands. Here we will explain some important content and commands. Hope to help you. Use the Telnet command to log on remotely. This command
Article Title: How to Use GRUB or LILO to retrieve the Linux lost root password. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.