Below are the 28 Kristóf Kovács collected under the 28 Command line tools (original link), some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. This article is also discussed in Hacker News, you can go to see. I have added the website link and some instructions in the author's original text.Dstat SARIostat, Vmstat, Ifstat three-in-one tool for
Reference: http://blog.jobbole.com/23638/Below are the 28 Kristóf Kovács collected under the 28 Command line tools (original link), some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. This article is also discussed in Hacker News, you can go to see. I have added the website link and some instructions in the author's original text.Dstat SARIost
Below are the 28 Kristóf Kovács collected under the 28 Command line tools (original link), some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. This article is also discussed in Hacker News, you can go to see. I have added the website link and some instructions in the author's original text.Dstat SARIostat, Vmstat, Ifstat three-in-one tool for
, including FreeBSD and Mac OS X.Installing rtorrent# apt-get Install rtorrent (APT-based system)# yum Install rtorrent (Yum-based system)Check that rtorrent is installed correctly in the terminal with the following command# rtorrentrtorrent command-line toolsFeatures of the rtorrentSome useful shortcut keys and how to use them
CTRL + Q – Exit RTorrent a
; 115.113.134.3.static-mumbai.vsnl.net.in.28472: P 116:232(116) ack 1 win 964822:08:59.617916 IP 115.113.134.3.static-mumbai.vsnl.net.in.28472 > tecmint.com.ssh: . ack 116 win 64347
For more information about tcpdump usage, see 12 examples of using Tcpdump commands in Linux.
5. Netstat-network status statistics
Netstat is a command line tool used to monitor inbound and outbound packets and network interface
, so a lot of time is wasted in the preservation site, process switching, recovery site. In this way, process-level parallelism is not good enough.Fortunately, the task scheduling management function was added to PowerShell. With a simple experiment, we can see that the PowerShell schedule for jobs is very different from the default for Windows, which generally maintains a high-speed operation with the same number of CPU cores, while other processes consume only a fraction of the CPU time. Until
/downloads/prozilla/tarballs/prozilla-2.0.4.tar.bz2
Iii. Appendix: Automatically log on to ftp and download the shell script of the file
1. vi autoftp1.sh
#! /Bin/bash
Ftp-iun 192.168.20.20 2121 2>/dev/null/tmp/ftp.txt
Ftp-iun
Rm-rf/tmp/ftp.txt
The above method is to use the proxy server to access the Internet on the Linux c
Several network commands in Command Line Mode
Previous/Next article16:20:55
View (166) /
Comment (0) /
Rating (
0
/
0
)
Several network commands in Command Line Mode
I. Ping Command
I. Ping Command
In the Windows
Lunix adjustment time is to speed up or slow down the server time. Generally, do not adjust the time online. To test locally, adjust the server time.Date-s 07/09/2013Date-s 17:05:00========================================================== =How to import an SQL file to a specified database through the mysql Command LineMysql command line import method.The steps
Unix Command Line Tricks–part Ihttp://www.cyberciti.biz/open-source/command-line-hacks/20-unix-command-line-tricks-part-i/Deleting a HUGE fileI had a huge log file 200GB I need to delete on a production Web server. My rm and LS
chroot_local_user is changed to NO, the opposite is true. This indicates that all users in the chroot_list file are locked, other users not in this file are not locked.
4. Linux vsftpd provides users with permissions such as modification and deletion.
Modify/etc/vsftpd. conf file, find and remove the following line of comment to grant the user the permission to modify and delete the file: write_enable = YES to grant different permissions to different
# Nothing/bin/bash: foo: command not foundshijiangge @ localhost :~ $ Unalias name # destroy nameChapter 7 of TODO
========================================================== =The Lunix adjustment time is to speed up or slow down the server time. generally, do not adjust the time online. to test locally, adjust the server time.Date-s 07/09/2013Date-s 17:05:00========================================================== =How to import an SQL file to a sp
tools to track the activities of each user, such as what the user is doing, what commands they have submitted, and how many resources they have used, how long have they been on the system.
For installation and usage examples of these commands, see the article: Use psacct or acct to monitor user activities.
11. Monit-Linux Process and service monitoring tools
Monit is a free open-source software and a network-based process monitoring tool. It automatically monitors and manages system processes,
to track the activities of each user, such as what the user is doing, what commands they have submitted, and how many resources they have used, how long have they been on the system.
For installation and usage examples of these commands, see the article: Use psacct or acct to monitor user activities.
11. Monit-Linux Process and service monitoring tools
Monit is a free open-source software and a network-based process monitoring tool. It automatically monitors and manages system processes, progra
networksPackage and command line tools for network interface statistics. It is a very useful tool that the system administrator can use to monitor network performance, locate and solve network problems.
#netstat-a|moreActiveInternetconnections(serversandestablished)ProtoRecv-QSend-QLocalAddressForeignAddressStatetcp00*:mysql*:*LISTENtcp00*:sunrpc*:*LISTENtcp00*:realm-rusd*:*LISTENtcp00*:
option to save the captured package to a file for later analysis. In almost all major Linux releases, tcpdump can be used . #tcpdump-IETH0TCPDUMP:VERBOSEOUTPUTSUPPRESSED,USE-VOR-VVFORFULLPROTOCOLDECODELISTENINGONETH0,LINK-TYPEEN10MB ( Ethernet), capturesize96bytes22:08:59.617628iptecmint.com.ssh>115.113.134.3.static-mumbai.vsnl.net.in.28472: p2532133365:2532133481 (ack3561562349win964822:09:07.653466iptecmint.com.ssh>115.113.134.3). static-mumbai.vsnl.net.in.28472:p116:232 (ack1win964822:0) 8:5
Hidecmd.rar Download: Runs a batch with a hidden window.
Curl.exe
7.12.2
File transfer
593,670
Curl is a file transfer tool that uses URL syntax to work in a command-line manner
E6ed60cda883b9ec5cfa84354e3c74ea
Mt.exe
Unknown
98,117
MT is a network management software
53440c1d5db397d79b895b5e9ce8b63d
Ncftp.exe
3.2.0
basic usage of wgetUse wget to download a separate file.# wget Http://www.website-name.com/fileDownload the entire site recursively.# Wget-r Http://www.website-name.comDownload files of the specified type (for example, PDF and PNG) from a Web site.# wget-r-A png,pdf http://www.website-name.comWget is a great tool that allows you to customize or filter downloads on machines with limited resources. This is a wget download that mirrors a website (yahoo.com).Wget
user activity
The psacct or acct tool is used to monitor the activity status of each user in the system. These two service processes run in the background, which closely monitors all activities of each user running on the system, and also monitors the resources used by these activities.
The system administrator can use these two tools to track the activities of each user, such as what the user is doing, what commands they have submitted, and how many resources they have used, how long have the
monitoring toolsMonit is a free open source software and a web-based process monitoring tool. It can automatically monitor and manage system processes, programs, files, folders, permissions, sum verification codes and file systems.This software can monitor services like Apache, MySQL, Mail, FTP, ProFTP, Nginx, SSH, and so on. You can use the command line or the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.