protected] home]# SU-NISJ[Email protected] ~]$ gpasswd-d stu StudentRemoving user Stu from group student[Email protected] ~]$ gpasswd-d Stu StuGpasswd:permission denied.14. Other relevant usersIn addition, Linux provides commands such as Id,whoami and groups to view the status of users and groups. The ID command is used to display the current user's uid,gid and the list of user groups to which the whoami i
#!/bin/bash 2 echo "The present date is: ' Date '" 3 echo "The present user is: ' WhoAmI '" 4 echo "The present Dir i S: ' pwd ' " 9. Write the shell script to get the network address of this machine.# !/bin/bash " ip=$ (ifconfig eth3| sed-n '/inet addr:/p ' |awk ' {print $} ' |awk-f: ' {print $} ') "10. Write a shell script to transfer files larger than 10K in the current directory to the/tmp directory1 #!/bin/bash 2 for file in $ (ls-l | awk "$
of the device to be mountedEg:mount/dev/cdromCd/mnt/cdrom//Enter the disc directoryOne .su switches to another person's identity without exiting the loginUsage: SU-L User name (if user name is default, switch to root state)Eg:su-l netseek (Switch to netseek This user, will be prompted to enter the password)whoami,whereis,which,id .WHOAMI: Confirming your identityWhereis: Query the directory where the comm
Unalias
To cancel the definition of an alias
Unalias del
Other commands
command name
function Description
Examples of Use
Uname
Displays information about the operating system
Uname-a
Clear
Clear screen or window contents
Clear
Env
Show all currently set environment variables
Env
W.H.O.
List all users who are currently logged on
In general, we can use the history command to view the user's operation record, but this command can not record which user logged in operation, and can not record the detailed operation time, and incomplete, so the wrong operation caused important data loss, it is difficult to find who is operating.
Here we use the script code to implement logging so that the user's login operation log:Edit the/etc/profile file and add the following code at the end of the file:First, add a line to record the
Enter HBase Shell Console$HBASE _home/bin/hbase ShellIf you have Kerberos authentication, you need to use the appropriate keytab for authentication (using the Kinit command), and then use the HBase shell to enter the certificate successfully. You can use the WhoAmI command to view the current user
hbase(main)> whoami
Management of Tables1) See what
a system, we cannot have only one user, so we need to create other users. As server Linux is more so, in the enterprise we have to avoid direct use of the root user directly to operate. First we need to look at the user name of the current user first.with WhoAmI : View the user name of the current user. Usage :1. whoami Direct return, you can see the current user. 650) this.width=650; "title=" 1.png "sr
-line mode. 2. pwd command# pwd Screen output current working directory. 3. hostname command# hostname Screen Output The name of the current local host.4. uname command# uname–a output Local Computer information 5. whoami command#whoami output The current user's login account 6. Date command# Date Prints the current date, time, and time zone of the operating system.The-s parameter is used to modify
definition of an alias
Unalias del
Other commands
command name
function Description
Examples of Use
Uname
Displays information about the operating system
Uname-a
Clear
Clear screen or window contents
Clear
Env
Show all currently set environment variables
Env
W.H.O.
List all users who are currently logged on
W.H.O.
The order in which environment variables are loaded after Linux startup is: ETC/PROFILE→/ETC/PROFILE.D/*.SH→~/.BASH_PROFILE→~/.BASHRC→[/ETC/BASHRC]To change the color of the shell font after a user logs in, add PS1 content to the ~/.BASHRC, and the following is my machine's settings:#. bashrc# User specific aliases and FunctionsaliasRM='rm-i'aliasCP='cp-i'aliasMV='mv-i'aliasVI='Vim'# Source Global Definitionsif[-F/ETC/BASHRC]; Then . /etc/BASHRCfiPS1="\[\e[37;40m\][\[\e[32;40m\]\u\[\e[37;
StuStu:stu Student[Email protected] home]# SU-NISJ[Email protected] ~]$ gpasswd-d stu StudentRemoving user Stu from group student[Email protected] ~]$ gpasswd-d Stu StuGpasswd:permission denied.14. Other relevant usersIn addition, Linux provides commands such as Id,whoami and groups to view the status of users and groups.The ID command is used to display the current user's uid,gid and the list of user groups to which the
is a space.Join (): Concatenate the strings in the list.(26) List:>>> list=["01.py", "WhoAmI"]>>> List[' 01.py ', ' WhoAmI ']>>> List[0]' 01.py 'List of additions and deletions to change:Append (): Adds an element after the list.Extend (): Adds another list behind the specified list.Insert (): receives two parameters and inserts at the specified position.The list uses indexes for modifications and lookups
3 steps to fix the release of the package generation Package.json
Use the NPM init command to enter the build Package.json interaction State, and then enter the relevant information as prompted.
D:\NODE.JS\0212GT;NPM init This utility would walk you through creating a Package.json file. It only covers the most common items, and tries to guess sane-defaults-"NPM help JSON" for definitive documentation O
n These fields and exactly what they do.
Use ' npm install
This time it will be found tha
ability of the function to be defined. In a function, we can use arguments to access the parameters of an incoming function, for example:
function Howmany () {var = arguments.length; alert (num); The}howmany function will output the number of parameters such as function, click on the following button to test.
Howmany (1,2,3,4) howmany (1,2,3,4,5,6,7,8)
function Arguments.calleeWe already know that the function will have the arguments attribute, and Arguments.callee is the currently executing
(in the KeyValue object), so be as concise as possible.
Hashing supports fixed-length keys and better data distribution, but loses the benefit of sorting. When designing HBase mode, it is a feasible way to deal with the inverse normalization. From a performance standpoint, normalization is optimized for writing, while the reverse normalization is optimized for reading.
Enter HBase Shell Console$HBASE _home/bin/hbase ShellIf you have Kerberos authentication, you need to use the appropriate key
Enter HBase Shell Console
$HBASE _home/bin/hbase Shell
If you have Kerberos authentication, you need to use the appropriate keytab for authentication (using the Kinit command), and then use the HBase shell after the authentication is successful. You can use the WhoAmI command to view the current user hbase (main) > WhoAmI The management of the table
1 See what Tables HBase (main) > list
2 Creating Table # S
Enter HBase Shell console
$HBASE _home/bin/hbase Shell
If you have Kerberos authentication, you need to use the appropriate keytab for authentication (using the Kinit command), and then use the HBase shell to enter the certificate successfully. You can use the WhoAmI command to view the current user
HBase (main) > WhoAmI
Management of Tables
1) See what tables are available
. If someone connects your machine to your IP address, they may be able to use a Web or FTP server program that runs on your machine. Of course there is a premise that the other side must know exactly what IP you are currently assigned to. Because each dial-up connection to obtain the IP is random, how to accurately master your IP?The following program uses Inetaddress.getbyname () to generate your IP address. In order for it to run, you must know the name of the computer beforehand. The program
exists under the Sails OU of the blog.com domain, the user name is User1.
Cn=users (the default container users are also expressed in CN)
dsadd user cn=test,ou=sails,dc=blog,dc=com uses the DN to create examples of users.
2.UPN (username) Username @ domain name, that is, users can use when logging in, such as jack@net.com, you can also change the suffix.
Modify: After Domain.msc, in the root right click--Properties--Change the UPN suffix, and then select the suffix in the user Properties-ac
StudentRemoving user Stu from group student[Email protected] ~]$ gpasswd-d Stu StuGpasswd:permission denied.14. Other relevant usersIn addition, Linux provides commands such as Id,whoami and groups to view the status of users and groups. The ID command is used to display the current user's uid,gid and the list of user groups to which the whoami is used to query the name of the current user; Groups is used
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.