mkdir directory name = = Create a directoryrmdir empty Directory name = = Delete an empty directoryRM file name = = Delete a file or multiple filesRM–RF non-empty directory name = = delete everything under a non-empty directoryTouch filename = =
mkdir directory name = = Create a directoryrmdir empty Directory name = = Delete an empty directoryRM file name = = Delete a file or multiple filesRM–RF non-empty directory name = = delete everything under a non-empty directoryTouch filename = =
RM Delete File command1 , command formatRM [Options] File ...2. Command functionRM Command, delete File command, is a common command under the Linux system, the function of the command is to delete a file or a whole directory or a part of the
Linux Delete directory is very simple, many people are still accustomed to using rmdir, but once the directory is not empty, into deep distress, now use the RM-RF command.
Direct RM is OK, but add two parameters-rf namely: RM-RF directory Name
-R is
mkdir directory name = = Create a directoryrmdir empty Directory name = = Delete an empty directoryRM file name = = Delete a file or multiple filesRM–RF non-empty directory name = = delete everything under a non-empty directoryTouch filename = =
mkdir directory name = = Create a directoryrmdir empty Directory name = = Delete an empty directoryRM file name = = Delete a file or multiple filesRM–RF non-empty directory name = = delete everything under a non-empty directoryTouch filename = =
mkdir directory name to create a directory
RmDir Empty directory name Delete an empty directory
RM FileName File name Delete one file or multiple files
RM–RF non-empty directory name deletes everything under a non-empty directory
Touch filename
1, connected to the TFS database Server TfsVersionControl Library;2, check Tbl_workspace table, find the corresponding working directory, such as SELECT * from Tbl_workspace where workspacename= ' somebody '3. Use the Workspaceid found in the
How can I skillfully configure two security tools to prevent brute-force attacks?Introduction to brute force attacks
We all know this buzzword: "Prevention is better than treatment ." If you are a Linux system administrator, you may know how a
mysql| Data | Data Directory
MySQL Data directory structure
Blue Forest http://www.lslnet.com May 28, 2000 10:40
Author: Yan Zi
Conceptually, most relational database systems are similar: They have a series of database components, each
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.