A Unix operating system may paralyze the system after a sudden power failure. At this point, the Unix operating system is not as good as that of Microsoft. If a power failure occurs, the Windows operating system will automatically detect and restore the system when it is restarted, but Unix won't... A Unix operating sy
Commands for interchange of date, time, and Unix timestamps in Linux Command lines
At work, you often need to get the current Unix timestamp or convert the given timestamp to a date format that we can recognize, on the linux Command Line terminal, you can easily solve the problem by using several commands.
1. convert a
The Iconv command is a file-encoded reload tool that runs on the Linux/unix platform. When we look at the text file in the Linux/unix system shell, we often find that the file is garbled in Chinese, this is due to the encoding of the text file and the current operating system settings, which can be encoded by using the ICONV conversion, to solve the garbled probl
1. Password security
The/etc/passwd file in the UNIX system contains all the information that the system needs to know about each user (the encrypted password may also be stored in the/etc/shadow file).
/ETC/PASSWD contains the user's login name, encrypted password, user number, user group number, user comment, user home directory, and user
The shell program used. Where the user number (UID) and the user group number (GID) are used to uniquely iden
There are many commands in the UNIX operating system that can be used to back up files. However, the root file system in the UNIX operating system is a relatively special file. In general, you must uninstall other file systems If you are backing up this type of file. Because the root file system is the ancestor of other filesystems, it backs up files in other file systems at the same time if not uninstalled
Brief introduction
The crontab command is common in UNIX and unix-based operating systems, and is used to set periodically executed instructions. This command reads the instruction from the standard input device and stores it in a "crontab" file for later reading and execution.
Typically, crontab stored instructions
As you know, there are times when it is necessary to terminate all Oracle processes (process) or a specified set of Oracle processes. When the database is "locked" and you are unable to enter Server Manager to "gently" terminate the database, you can terminate all Oracle processes with the KILL command in Unix-one of the common uses of the KILL command.When you need to terminate an Oracle instance (instance
The guy who is familiar with DOS is trying to make UNIX like DOS,
One of them is to set the Unix prompt as $ p $ G. The following describes the method.
The GNU bash (Bourne again shell) is more convenient for different shell settings)And KSh (Korn shell) and tcsh (enhanced version of CSH, CSH in Linux isSymbol connection ). The General Sh (Bourne shell) and CSH settings are cool. One by oneVarious shell se
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database ldquo; locks rdquo, and you cannot enter
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database ldquo; locks rdquo, and you cannot enter
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database is "locked" and you ca
In many cases, we need to terminate all Oracle processes ). When the database is "locked" and you cannot enter Server Manager to terminate the database, you can use the kill command in UNIX to terminate all Oracle processes. This is one of the common uses of the kill command.To terminate an Oracle instance on a UNIX server, perform the following steps:Terminate a
In the process of using the UNIX operating system, we often use a variety of problems, such as the system suddenly slowed down, the system is prone to panic or the host of the terminal often appear panic, when we often guess, is hard disk space is too small, or insufficient memory? Is there a bottleneck in I/O, or is there a problem with the core parameters of the system? At this time, we should consider using the system to provide us with the SAR
Lienhua342014-10-15ISO C defines the system function for executing a command string in a program. Its statement is as follows,
#include
int system (const char *cmdstring);
The system function calls the fork, exec, and WAITPID functions in its implementation. The system function calls the fork function to create the child process, and then calls '/bin/sh-c cmdstring ' to execute the command
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
Below is a collection of 28 unix/linux under the 28 command line tools, some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. In order to facilitate the study, I have a picture, but also added the official website connectionDstat SAR
Iostat, Vmstat, ifstat a triple tool for viewing system performance (I mentioned those three Xxstat tools in the
under the use of Linux/unix, often use the text interface to set up the system or operating system, the author himself in the process of work is also constantly in touch with this command, so forThis special brewing, preparation, began the writing of this article. This paper mainly records some of their usual linux/unix under the operation of
The conversion character of the shell command line is \ www.2cto. comecho $ PATH // get the current value of the system environment variable include a file (class) to: 1.4. # ifndef_ALARM _ # define_ALARM _ # endif extract and copy method: (c... for the unix command line, the conversion character of shell command line
a delimiter to sort the 2nd field[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2D:1F:11C:2B:3A:4E:5Use ":" To make a delimiter, sort the 2nd field, sort by number size[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2-nD:1C:2B:3A:4E:5F:11Sort the/etc/passwd files by uid[Loring test]# Sort-t ":"-K 3-n/etc/passwdSort the passwd files in the order of the UID from large to small[Loring test]# Sort-t ":"-K 3-nr/etc/passwdPrint/etc/group in order of GID from small to large[Loring test]# so
used with 01, instead of a newline character, it is split with-L number does not cut with a cut, but is called with the data of this number row after every number row is read utility-N number is cut and the results are grouped by each number, using each set of results as parameters, calling utility-X finds that if the number of parameters is insufficient, terminate Xargs immediately-T print the instructions to be executed to stderr before executing utility-p maxprocs Parallel mode, up to Maxpro
28 Unix/linux Command-line artifactBelow are the 28 Kristóf Kovács collected under the 28 Command line tools (original link), some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. This article is also discussed in Hacker News, you can go to see. I have added the website link and some instructions in th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.