Discover find command in unix with examples, include the articles, news, trends, analysis and practical advice about find command in unix with examples on alibabacloud.com
In unix and linux, the chmod command is used to change the permissions of files and directories. This is a must for unix and linux users to be familiar with many
In unix and linux, the chmod command is used to change the permissions of files and directories. This is one of t
Vi. Linux/UNIX operating command accumulation [kill, netstat, df, du], netstatduIn Linux/UNIX, users often use the text interface to set the system or operating system. The author is constantly in touch with this command during his work, therefore, this article has been specially developed, prepared, and started. This
Iv. Linux/UNIX operating command accumulation [chmod, chown, tail], chmodchownIn Linux/UNIX, users often use the text interface to set the system or operating system. The author is constantly in touch with this command during his work, therefore, this article has been specially developed, prepared, and started. This ar
Grep command series: How to Use grep commands in Linux/UNIX
How can I use the grep command in Linux, Apple OS X, and other UNIX-like systems? Can you give me some simple examples?
The grep command is used to search for text, or to
The Dos2unix command is used to convert a DOS-formatted text file into Unix (Dos/mac to UNIX text, format Converter). Dos text file is based on \ r \ n As a break mark, expressed as 16 binary is 0D 0 A. The text file under Unix is marked with \ n as a break mark, which means that the 16 binary is 0 a. The DOS format te
=auto-iRnH 'getChar();'*.c
Where,
-N: add a line number starting with 1 before each output line.
-H: print the file name for each matching file. This is the default option when you want to search for multiple files. (LCTT :-h option forcibly hides the file name. In addition, the-l and-L options are used to only display the matching/mismatched file names, -H and-h are used to control whether to display/not display the file name before displaying matching rows. Note the difference .)
$grep
Linux disk management commands and usage examples, linux disk command examplesLinux disk management
Linux disk management is directly related to the performance of the entire system.
Linux disk management commonly uses three commands: df, du, and fdisk.
Df: list the total disk usage of the file system du: Check disk space usage fdisk: used for disk partitioning
Df
Df Co
under the use of Linux/unix, often use the text interface to set up the system or operating system, the author himself in the process of work is also constantly in touch with this command, so forThis special brewing, preparation, began the writing of this article. This paper mainly records some of their usual linux/unix under the operation of
a delimiter to sort the 2nd field[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2D:1F:11C:2B:3A:4E:5Use ":" To make a delimiter, sort the 2nd field, sort by number size[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2-nD:1C:2B:3A:4E:5F:11Sort the/etc/passwd files by uid[Loring test]# Sort-t ":"-K 3-n/etc/passwdSort the passwd files in the order of the UID from large to small[Loring test]# Sort-t ":"-K 3-nr/etc/passwdPrint/etc/group in order of GID from small to large[Loring test]# so
toggle selection or [exit][previous][next]>Choose Product Installation Directories:----------------------------------------Middleware Home Directory: [/weblogic/oracle/middleware]Product Installation Directories:1| WebLogic Server: [/weblogic/oracle/middleware/wlserver_10.3]2| Oracle Coherence: [/weblogic/oracle/middleware/coherence_3.7]Enter index number to select OR [exit][previous][next]>--Default, enter:The following products and JDKs would be installed:-------------------------------------
needs to access the core memory and various files, so it needs to be executed by the root user.
The files opened by lsof can be:
1. Common Files
2. Directory
3. network file system files
4. characters or device files
5. (function) shared library
6. pipe, named pipe
7. symbolic links
8. network files (such as NFS file, network socket, and unix domain socket)
9. there are other types of files, etc.
3. command
replace spaces in all mp3 file names _
$ find . -type f -iname “*.mp3″ -exec rename “s/ /_/g” {} \;Example 15: execute two commands simultaneously in the find result
On the find man page, the following is an example of the syntax for using two commands in a file search traversal.
The following find command is used to traverse the file system once, list the files and directories with the setuid attribute, and write the/root/suid.txt file. if the file
Links in Linux commands mean that several commands are combined and executed through the operator. In Linux, the link commands are similar to writing short shell scripts in shell and directly executed on the terminal. Link makes automatic processing more convenient. Moreover, an unattended machine can run in a very organized manner with the help of the link operator.
10 link operators in Linux
This article aims to introduce some common link operators, and help readers improve productivity, redu
The Cat (concatenation) command is one of the more commonly used commands in Linux/unix open source systems. We can use the Cat command to create one or more files, view the contents of the file, concatenate the files and output the content to the end device or new files, this article will be an example of the Linux cat commands in some simple ways.The cat (short
Seven examples of the uniq command: the uniq command in Linux can be used to process repeated lines in text files, this tutorial explains some of the most common usage of the uniq command, which may be helpful to you. The following File test will be used as the test file... seven e
The test command expects to find a parameter on the command line that is considered empty when the shell does not assign a value to the variable. This means that when the script is being processed, test will report the error once the script is looking for a parameter that does not exist.
When you try to protect the script, you can solve the problem by including all the arguments in double quotes. The shell
Linux crontab command usage details and examples, linuxcrontab
Linux systems are controlled by the cron (crond) System Service. The Linux system has a lot of planned work, so this system service is started by default. In addition, because users can also set scheduled tasks themselves, the Linux system also provides the command for users to control scheduled tasks
Sed command details and examples
The query function of the grep command, the stream editing function of the sed command, and the awk (which has now become a programming language) are more powerful text editing commands. in Linux system management, it plays an important and comprehensive role. The following perl program
Seven examples of the uniq command: The uniq command in Linux can be used to process repeated lines in text files, this tutorial explains some of the most common usage of the uniq command, which may be helpful to you. The following file test will be used as a test file to explain how the uniq
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.