1. Remove the file suffix ". Sh" from the current directory"
For I in 'ls .'
Do
MV-V $ I 'echo $ {I %. Sh }'
Done
2. When the column file directory is in the shell, the file name variable with spaces is not treated as two parameters.
Ls-
This book is comprehensive and detailed. It is suitable for beginners to study carefully.
Chapter 2 welcome to the Linux World
1. POSIX standard
2. Linux has kernel programming interfaces
3. Linux supports Secure hierarchical file
An operating system can be divided into two parts: kernel and shell ).A shell program encapsulates the kernel that communicates directly with the hardware: hardware kernel shell Application
In some operating systems, the kernel and shell are
1. Delete 0-byte filesFind-type F-size 0-exec Rm-RF {}\;
2. View ProcessesSort by memory from large to smallPS-e-o "% C: % P: % Z: % A" | sort-K5-NR
3. sort by CPU utilization from large to smallPS-e-o "% C: % P: % Z: % A" | sort-NR
4. Print the URL
Do not add the parameter-V. Otherwise, you will test it on Linux.
VI autoftp. Sh
The content is as follows:
FTP-n-v-I
Linux Command (used to set file permissions) umask
022
The preceding command indicates that the umask value in Linux is 022.
-B. returns true if the file exists and is a block file.-C: returns true if the file exists and is a character file.-D. If pathname exists and is a directory, true is returned.-E: returns true if the file or directory specified by pathname exists.-F
Compression command:*. Z compress program zookeeper case;*. Bz2 Bzip2 program zookeeper case;*. GZ gzip program upload history case;* The resources packaged by the. Tar program have not been deleted;* .Tar.gz tar program packaging example, which has
Securecrt is easy to set when you remember the password, so this person is used to securecrt, but the file upload function has never been figured out. Pshell has been used for a long time, because pshell has a powerful secureftp function. After
Document directory
Function Definition
Return Value
To put it simply, the popen () functionFunction Definition
#include FILE * popen(const char *command , const char *type );int pclose(FILE *stream);Function Description
The popen () function
1, note:Ulimit is used for resources occupied by Shell startup processes.2. Category:Shell built-in commands3. Syntax format:Ulimit [-acdfhlmnpsstvw] [size]4. Parameter introduction:-H: Set hardware resource limits.-S: Set software resource
One of the most depressing problems in code debugging is that once Erlang shell closes the command history that has just been entered, it will be lost. It is convenient to maintain the history of an input command; the following project can help us
I have been busy recently, and occasionally spend some time reading books to supplement my energy. Recently I am studying programming languages-I am very touched by the road to practice. What I 've learned by mistake is a more system, the complete
During the bug quality analysis, the word segmentation should be sorted and de-duplicated, so we thought of sort and uniq.
It is very convenient to call shell through python.
#-*-Coding: UTF-8 -*-Import OSImport sysDef cws_statistics (flag, afile,
Reference: http://feidaodalian.iteye.com/blog/697158It is said that this is an unsolved bug of the SSH Secure Shell client for many years. Both the client and the server must be 'utf-8' encoded.Find information on the Internet and find a simple
One command alias settings: alias, unalias
Command alias is a very interesting thing, especially when your usual command is very long! In addition, you can add predefined attributes to some common commands to prevent accidental file killing! For
Data Stream redirection refers to the data that should appear on the screen after a command is executed and transmitted to another place, such as a file or device (such as a printer !)! This is important in Linux text mode! This is especially useful
It is a good thing. In many places of life, people like to use abbreviations, which saves time and effort. Bash also has its own abbreviation, alias,Alias always has a lot to do. Why not? As mentioned above, we often talk about a large number of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.