Article title: Bash's most common activation mode. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The most common activation modes of Bash are interactive and non-interactive:
1. interactive activation
The standard input and output are connected to the terminal. There are three types: login, non-login, posix, and
Shell:An interface program that completes interactive operations between the user and the operating system, providing users with simplified operations; In the 70 's mid-century in Bell Labs, Bourne bit UNIX developed a shell program Bourne Shell, referred to as SH;Bill Joy: Rewrite c Shell in C according to SH, abbreviated as CSH; lie on the bed for its derivative version;David Korn: A collection of the advantages of Cshhesh development of the Korn Shell, referred to as Ksh;Gnu:gnu Organization
before you start introducing bash's configuration files, you need to know about the login shell and the Non-login shell. The two shell differences are as follows:* Login Shell: When you get bash, you need a complete login process, which is the login shell. such as: By the tty1 login, you need to enter the user name and password, this time to get Bash is login shell. * Non-login Shell: The way to get the
In the previous paragraph, I said:
The true face of the so-called environment variable is actually an arbitrary string.
When Bash starts, it imports a string containing the = sign into its own variable in the Environ array.
Bash starts an external command by reorganizing its internal variables labeled as environment variables into a string array to assign to Environ
In this article, we
Each C program has a main function, and each main function has a argv parameter, which is an array of strings, the value of which is specified by the parent process of the C program when it is started by the exec* function.A lot of people say that the value of the max in Bash is the value of argv[0] (zeroth argument) that the C program obtains in its main function, and we can demonstrate it through the function of the-a parameter of the EXEC command:
Recommendation: 10 Technical Masterpiece: "High-performance Linux server construction combat Ⅱ" full-network distribution, with probation chapters and the book instance source download!A bash security vulnerability has just erupted today, and Bash has a security vulnerability that directly affects UNIX-based systems such as Linux, OS X, and so on. The vulnerability could cause a remote attacker to execute a
The latest Basic Bash vulnerability repair solution
Bash broke the remote parsing Command Execution Vulnerability (CVE-2014-6271), spread to the major Linux distributions and MacOSX system. Attackers can remotely execute arbitrary commands in Bash-supported Web CGI environments.
After bash injection is made public, att
Introduction to shell-bash programming parameters
When you log on to the system, you have started to use bash, but we can also start bash on the command line:1. Bash parameter descriptionThe bash command format is:Bash [parameter] [file name]The meanings of parameters are a
Offers: Zstack cloud computingContent IntroductionCommand-line operations are undoubtedly the most time-consuming process when managing Linux servers. For most users, this means a lot of time to manipulate the bash shell.While most distributions offer default user types and root prompts, customizing our own prompt will undoubtedly help introduce more usage preferences. You can include a variety of practical information to help you perform tasks more s
Under Linux, the status of Bash is negligible, and the daily management and operation of Linux is mostly done in bash, so in order to improve the productivity of Linux, it becomes the problem of how to use bash efficiently. While some of the special characters under the shell can be used to some extent to improve efficiency, the latter's historical expansion unde
Focus on Listing 7Now, many Linux® and UNIX® systems have bash shells, which are the common default shells on Linux. In this article, you'll learn how to handle parameters and options in a bash script, and how to use the shell's parameter extensions to check or modify parameters. This article focuses on bash, where the examples are run on a
Bash script programming Step-by-step articlefunction, array, string manipulationfunction: functions in scripting are fundamentally different from the functions in our math. The functions here are mainly for the purpose of implementing procedural programming code reuse. For example, a function to calculate a number, when we need to use the calculation of numbers, call this function directly instead of every time the number must be re-written. Therefor
When you enter an instruction to the computer, Bash sends the instruction to the core kernel, and the core calls the relevant program to start the hardware.If you let the user operate the operating system directly, it may cause a crash of the system, so the operating system through the application to let the user operating system shell program Shell,bash is only
/*-------------------------------------------------------------------------------------------@ Black eyed poet --------------------------------------------------------------------------------------------*/A variable is a unit of computer memory where the stored value can be changed. Variables are used to temporarily save information.I. Variable setting rules1. Numbers, letters, underscores, cannot start with numbers.2.the default type of variables in
On the previous blog we introduced some of the basic features of bash, which we usually operate most frequently. In this blog we introduce the variables of bash, laying the groundwork for scripting shell scripts later.1. What is a variableA variable is a unit of computer memory where the stored value can be changed.When a shell script needs to save some informati
I add: Mac version git: http://code.google.com/p/git-osx-installer/downloads/list? Can = 3 Q = sort =-uploaded colspec = filename + Summary + uploaded + size + downloadcount
Other reference addresses:
Http://leeiio.me/bash-to-zsh-for-mac/
Original address http://sofish.de/1685
Yesterday on Twitter, I asked why the name displayed in terminal is so long. It is said that the computer name is too
First, understand the computer hardware components:Von. Neumann architecture defines the computer has the arithmetic, the controller, the memory, the input device, the output device five major parts, also has one principle is: must be the binary program to be able to run in the system, it can only process the binary file. Therefore, the source code of the program needs to be compiled into binary.Second, the
First, the Terminal FoundationThis article extracts some of my own in learning the Linux (CentOS 6.6) Bash command and will keep it up to date.Let's introduce the General Command input format for Linux shell terminal, for example:Root is the user name, HADOOPS02 is the machine name, the symbol ~ is the default working directory (i.e. $home) after the user logs in, and the symbol # (or $) next to the right bracket is called "Linux command Prompt".Promp
with the same name, if any, then an error is executed, which is the execution of the shell command. The command completion mechanism helps a lot of us Linux beginners, and we can use this to get help when we forget certain command input instructions. The {} in the Shell's command-line expansion attribute can populate a list of paths separated by the "comma" character in curly braces, and bash expands it into multiple independent paths. Make our opera
RedHat 5.x, 6.X Bash vulnerability RPM patch package download
RedHat 5.x, 6.X Bash vulnerability RPM patch package download and tutorial.
First, check the BASH version number of the server:
Bash-version
Install the three files in the bash-4.1.2-15.el6_5.2.x86_64 folder if th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.