SCP implementation data copy other machine copy to local file: SCP [email protected]/ip:filepath localpath Local copy to other machine: SCP localpath [email PROTECTED]/IP: FilePath folder copy:scp-r [email protected]/ip:folderpath localpath Detailed
Type of Shell:1. Log-in ShellLog in normally via a terminalSu-Su-l2. Non-login shellSuCommand window open under graphical terminalShell scripts that are executed automaticallyBash's configuration file1. Global
There are three ways to invoke external scripts when running shell scripts, exec (exec script.sh), source (source script.sh), fork (./script.sh)EXEC (exec/home/script.sh):Using Exec to invoke the script is equivalent to executing a command in the
Linux Shell reads a lineMethod OneBy specifying IFS--Internal Field Separator , by IFS default , you can set a value in the script IFSDEMO 1$cat t1.txt abcfd $cat test_IFS.sh #! /bin/shIFS="c"for LINE in `cat t1.txt`do echo $LINEdone$sh
Serial number
Task
Command combination
1
Delete a 0-byte file
Find. -type f-size 0-exec rm-rf {} \;Find. Type F-size 0-delete
2
View processes, sorted by memory from large to small
PS-E-O "%c:
just as soon as they came out, they were dumped out of DEX by the ghost Brother, which made it easy to crack. At first, I tried it with the zjdroid artifact, but I had never been worried about the success of the dump operation. One day, a reverse
'.' Matches any character
'*' Specifies that * can be used repeatedly for any number of times.
'^' Starts with a string
'$' String end
'. *' Any number of characters
'\' Escape Character
'[...]' Matches any character
'[^...]'
In gnome 3, gnome-shell is used for displaying the top bar. the widgets can be installed online from http://extensions.gnome.org. after installation, the deployments can be set by visiting http://extensions.gnome.org/local. on local host, the
Processing of acprotect's OEP using encryption Shell
Attachment download: Shelling file and PDF
1. encryption process:
Acproctect v1.41
Analyze the theft of OEP entry point code
2. analysis process:
After loading, EIP = 00412000
00412000> 60
Wscript. shell is the progid of the wshshell object. You can create a wshshell object to run programs, operate the registry, create shortcuts, access system folders, and manage environment variables.
This object has a run method.Run method to create
Typeset can be used to set variable attributes, such as case, width, and left-right alignment. When typeset is used to change the attributes of a variable, this change is permanent, the following uses KSh as an example to demonstrate the
Tag: Shell
Shell task control terms:
(1) Foreground task: Run in shell. The shell prompt does not appear before the task is completed, so other tasks cannot be run at the same time.
(2) Background task: Run in shell, but not exclusively in shell.
Location parameters can be used
shiftCommand left shift. For example
shift 3Indicates the original
$4Change
$1, The original
$5Change
$2And so on.
$1,
$2,
$3Discard,
$0Do not move. Without Parameters
shiftThe command is equivalent
shift 1. Very
Developed on the Linux platform, another script file is often executed on the console. The following methods are frequently used:./My. ShOrSource my. ShOr. My. Sh; What are the differences between the three methods? Let's take a look at how to call
In Linux, how does one use shell scripts to capture remote logs? There is a dilemma in analyzing online logs. There are too many machines. It is unrealistic to log on to each server, but it is more troublesome to download the logs because each SCP
Shell text filtering (awk) classification: Linux Shell script learning 1241 people read comments (0) Add to favorites report shell Regular Expression script task Language
If you want to format packets or extract data packets from a large text file,
Requirement: create 10 SYSTEM account oldboy01-oldboy10 in batches and set to generate password (different password ).
Implementation script:
#!/bin/bash#Question3for i in $(seq -w 10)do useradd -s /bin/bash oldboy$i echo "password$i"
(Linux shell) Chapter 2-joy of command (1), linuxshell
This article is from my personal blog: (linux shell) Chapter 2 -- joy of command (1)
In the previous chapter, we described some syntaxes that need to be paid attention to in linux shell. Next we
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.