Often when writing a shell script, you will encounter a different user to execute the relevant commands, the way to simply note:
1. Execute a single command: su-user-c "command"
For example, the following command is to create a test123 directory
We are using Linux development process, often need to jump between different servers, through SSH, each need to enter the password, more cumbersome, today from the Internet to find the relevant methods, but the experimental process found that there
Recently busy learning Python, see a Paramiko module, seemingly very powerful, learn to write a small program, you can log on to Linux directly under Windows, execute and return execution results.
The following is directly attached to the code:
#!
A xp_cmdshellEXEC Master.. xp_cmdshell ' ipconfig '
Open xp_cmdshell:
--To allow advanced the options to be changed.
EXEC sp_configure ' show advanced options ', 1
Go
--To update the currently configured value for advanced
1. What is SSH
SSH is a security protocol based on the application layer and the transport layer. SSH is currently a more reliable protocol for providing security for Telnet sessions and other network services. SSH is the standard configuration for
Today, my company colleagues came to me and said that I was going to execute the Python script on the server with another user, but it was always done by the root user in the crontab, so I thought of a lazy way to use the shell script to switch to
Today in Redis, execute the setrange name 1 Chun command times with the following error message:(Error) Misconf Redis is configured to save the RDB snapshots, but was currently not able to persist on disk. Commands that may modify the data set is
1. pseudo-distributed installation1.1 Modify IP(1) Open the virtual network card of VMware or VirtualBox(2) Set the network connection mode to host-only in VMware or VirtualBox(3) In Linux, modify the IP. There is an icon in the upper corner,
Author: huaqing visionary lecturer
In the raspberry system, there are a lot of ready-made drivers and resources, although this is far from suitable for most of the design use, so in the use of certain devices, you need to write or modify some of the
1. Concurrency consistency
Common concurrency consistency problems include: Lost modifications, non-repeated reads, dirty reads, and Phantom reads (Phantom reads are often classified as non-repeated reads in some materials ).1.1 lost
Document directory
2.2.1 concurrency consistency
2.2.2 solutions to concurrency consistency problems
2.2.3 transaction isolation level
From http://www.cnblogs.com/zhenyulu/articles/330494.html
The complete code of this part can be downloaded
Redis master Copy
This chapter describes a powerful feature of Redis – Master-slave replication. A master host can have multiple slave from the computer. And a slave from the machine can also have multiple slave from the machine. This continues to
1. Data Structure of the page table
Page number
Flag
Primary storage block number
Modify bit
External Store address
Struct pageitem {unsigned pageid; // The Job page number unsigned outmaddr; // The address bool state
Source Address: Https://github.com/google/snappyDownload git clone https://github.com/google/snappy
compile
into the snappy source directory, execute the command:./autogen.sh Error "./autogen.sh:line 3:aclocal:command not found"
Software used in the lab development environment:[[email protected] local]# llTotal320576-rw-r--r--1Root root52550402Mar6 Ten: theapache-flume-1.6. 0-bin. Tar. GZdrwxr-xr-x 7Root root4096Jul the Ten: $flumedrwxr-xr-x. OneRoot root4096JulTen
This example for you to share the MySQL 5.6.17 installation tutorial simple version, for your reference, the specific content as follows
1.linux version mysql download (not recommended under 5.7, installation of the various bugs Ah, 5.6 is the best)
One: Two computers to do the experiment
1: Server Redhat Enterprise 5
ip:192.168.1.112
2: Client Redhat Enterprise 5
ip:192.168.1.113
3: The server and the client can ping each other
Second: The server configuration is as follows
1: In
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.