The following describes how to set the Unix telnet command. We have analyzed some of the commands and codes. Then this code is used as a monitoring program. After the event is triggered, telnet to Sco unix to execute the command and obtain the command result. After several d
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database is "locked" and you cannot enter Server Manager to "gently" Terminate the database, you can use the kill command in UNIX to terminate all Oracle processes-this is one of the common uses of the kill command.To terminate an Oracle instance on a
] ~]#/etc/profile or [[email protected] ~] #source/etc/profileMake the change effective, if there is no error stating the success.Verify that there is data in the log[Email protected] ~]# More/var/log/201107.log2011-07-21 17:29:08 ##### Root PTS/2 (192.168.23.250) # # # # # # # /etc/profileYou can see that there's already data inside.You can also usePrompt_command= ' {date ' +%y-%m-%d%T ##### USER: $USER IP: $SSH _client PS: $SSH _tty # # (History 1 | {read x cmd; echo "$cmd";}) ";} >> $HISTORY
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
allows you to resume a file download that has been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control,
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
' ibase=16;obase=1010; AC ' |BC (Linux)0172> Echo ' ibase=16;obase=1010; AC ' |BC (Unix)Output base is too large172Note here: This error will be reported when executing in Unix, but there will still be results.]$ Echo ' ibase=16; AC ' | Bc172Convert decimal to hexadecimal]$ echo ' ibase=10;obase=16;172 ' |BCAC]$ echo ' obase=16;172 ' |BCACconverting decimal to Binary]$ echo ' obase=2;172 ' |BC10101100Conve
A Unix operating system may paralyze the system after a sudden power failure. At this point, the Unix operating system is not as good as that of Microsoft. In the event of a power failure, the Windows operating system will automatically detect and recover when it is restarted, But Unix will not. We need to manually execute The fsck
(which symlinks), ln ignores the- l and- p options. Otherwise (if making hard links), the last option specified controls behavior when a TARGET is a symbolic Link. The default is to act as if- p was specified.ln examplesln public_html/myfile1.txtCreate a hard link to the file public_html/myfile1.txt in the current directory.Ln-s Public_html/myfile1.txtCreate a symbolic link to the file public_html/myfile1.txt in the current directory.Ln-s Public_html/webstuffCreate a symbolic link to the direct
including sub-directoriesPWD (print working directory)Displays the path of the current directory (path)CD (change directory)Change the current directory(1)..Represents the parent directory to go to the current directory.(2)/Represents the go to root directory.(3)When there is no option, go to the user's home directoryTouch file_nameCreate a new file, modify the file dateFunction: Change the date of the file, do not modify the contents of the file, if the file does not exist, create a new file.M
Unix/Linux Command memorandum, unixlinux Memorandum
Arp: The ARP cache contains one or more tables used to store IP addresses and resolved MAC addresses.
// Extract all Bound0 ip and mac Information
Arp-n-I bond0 | awk '$5 = "bond0" {print $1, $3 }'
Sed: used to edit the text in a document or string through a series of commands
// Read a single row of data from/script/ip and print it out.
Sed-n '1p'
ChmodIs a Command Used in UNIX systems to control the user's permissions on files (ChAngeMoDA combination of e-word prefixes) and functions. Only the file owner and the Super User can modify the file or directory permissions. You can use absolute mode to specify the object ACL in symbolic mode.Usage
ChmodUse syntax
$ chmod [options] mode[,mode] file1 [file2 ...]
Use the LS
Plink_path ="C:/plink.exe"'Plink.exe path
Username ="Username"'User name
Password ="Password"'Password
Host ="192.168.0.1"'Unix/Linux server address
Command ="Ls"'Command to be executed
Set oshell = Createobject ("Wscript. Shell ")
'Combine plink commands, including logon and Command Ex
Recently, my colleague introduced me to the screen command, which is really good. In the past, in order to let the program run without the terminal, either let it run in the background or use nohup to run, but if the program needs to interact, it will be troublesome. For example, you need to use SCP for copy, enter a password, and the data volume is large. It takes a long time. People who have met will know the pain.
With screen, everything is simple.
In Unix/Linux, run the Find command to search for an empty directory: find/path-depth-type d-empty www.2cto.com: find/path-depth-type f-empty find the file by name: find/path-name name_of_file find the file by extension: find/path-name "*. given_extension ": find/path-name '*. txt '-perm 644 searches for a file based on the permission attributes of the file: find/path-perm-permision_bits www.2cto.com withou
"ibase=2;obase=10000; Binary "|BC-convert binary to 16 binary (10000_b=16_d)ReadelfStringsLook for an ASCII string with a length greater than 4 in the binary file. For object file, do not find the text segment, but search all byte for other files.-A To object file also searches the text segment-Search each byte for both normal and object files--Treat each remaining parameter as a file name-O for each ASCII string found, output its offset at the same time.-T [d|o|x] output offset using decimal (
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.