Useradd can be used to create a user account. After the account is created, use passwd to set the password of the account, and use userdel to delete the account. The account created using the useradd command is actually saved in the/etc/passwd text file.SyntaxUseradd [-mMnr] [-c [-G OrUseradd-D [-B] [-e Parameter description: -C -D -D. Change the defau
Use Bluetooth in the Android command line and Bluetooth in the android command line
Note: This part only applies to broadcom series bluetooth chips, such as RK903 and AP6xxx Series
Switch to the root user using the su command
1. confirm that the RFKILL driver has been loaded.
Ls/sys/class/rfkill/rfkill0/
If the rfkill0
The Linux rm command is used to delete a file or directory.SyntaxRm [options] name...Parameters:-I ask for confirmation one by one before deletion.-F the original file is deleted directly even if its attribute is set to "read-only". You do not need to confirm the attribute one by one.-R also deletes directories and the following files one by one.InstanceYou can use the rm
This directive provides the system administrator to shut down the FTP server at the set time and to notify the user of the warning message before it is closed. When the shutdown time is set to none, the server is immediately shut down. If the "+30" method is set to indicate that the server is closed after 30 minutes. By analogy, suppose that the format of "1130" means that the server will be closed at 11:30 Daily, with a time format of 24 hours. After the FTP server is shut down, a file named Sh
The Linux who command is used to display which users are on the system, the displayed information includes the user ID, terminal used, connection from which side, online time, idle time, CPU usage, and action.Permission: all users can use it.SyntaxWho-[husfV] [user]Parameter description: -H: do not display title columns -U: do not display user actions/work -S: Display in short format -F: do not
When the ping command is executed, the ICMP transmission protocol is used to send the request response message. If the network function of the remote host is normal, the system returns the response message, so that the host operates normally.SyntaxPing [-dfnqrRv] [-c [-S Parameter description: -D: Use the SO_DEBUG function of Socket. -C -F limit detection. -I -I -L -N: only numbers
The grep command is used to find files whose content contains the specified template style. If the content of a file conforms to the specified template style, the default grep command displays the column containing the template style. If no file name is specified or the given file name is "-", The grep command reads data from the standard input device.S
Use the PHP Command Line Mode to collect stock trend information, and the php Command Line
Let's just talk about the implementation code.
The main function has only one class implementation (stock. class. php ):
The call method in the command prompt is as follows (stock. php ):
Direct
Ubuntu does not require any additional configuration. For example, if you do not need to install ftp or other software, you can use the scp command to directly transfer files, which is really convenient! ✓ Dragon@192.168.253.137 :~ /You will be asked about your account's dragon password.
Ubuntu does not require any additional configuration. For example, if you do not need to install ftp or other software,
Uniq can check for repeated occurrences of rows in a text file.
Grammar
Uniq [-cdu][-f
[Input file] [Output FILE]
Parameters:
-C or--count displays the number of occurrences of the row next to each column.
-D or--repeated displays only the rows that appear repeatedly.
-f
-s
-U or--unique only show one row at a time.
-w
--help display Help.
--version Displays version information.
[Input file] Specifies a sorted text file.
[Output FILE] Specifies the output fi
Win7 default does not install Telnet function, so you directly with telnet command is not used;You can go to "control Panel"-"program" (in the bottom left corner)---"Turn Windows features on or off", check "Telnet client", OK to use the Telnet command normally.If you can't find it in a simpler way, click on the right mouse button, the propertiesThen search for ke
file and use crontab file to set the time table.InstanceRun the Command/bin/ls once every 0th minutes of every hour every month.0 7 ***/bin/lsDuring October 11, December, the/usr/bin/backup task is executed every 20 minutes from to every day.0 6-12/3*12 */usr/bin/backupFrom Monday to Friday, send a letter to alex@domain.name at every day0 17 ** 1-5 mail-s "hi" alex@domain.name Execute echo "
When Apeache fails to be started, use the command line to detect (novice) and apeache command line.
1. When configuring the Apache server, it is often necessary in httpd. conf: Modify and add some code. If The code is written by mistake or The code is written incorrectly, The requested operation has failed will be reported directly when it cannot be started norm
The Linux mount command is a frequently used command that mounts files outside of the Linux system.
Grammar
Mount [-HV]
mount-a [-FFNRSVW] [-t Vfstype]
Mount [-FNRSVW] [-O options [,...]] device | Dir
Mount [-FNRSVW] [-t vfstype] [-O options] Device dir
Parameter description:
-V: Displaying program versions
-H: Show secondary messages
-V: Displays more messages, usually with-F for debugging.
Label:The Windows CMD window cannot display Chinese, not necessarily garbled in the database--most of the cases just display the problem and can be resolved in the following ways:1. Exit DOS or reopen in cmd window, lose:chcp 65001 then enter OKNote: 65001 is the encoding of Unicode (UTF-8) 65001.2, right-click on the command line title bar, select "Properties"-"Font", the font will be modified to "Lucida Console" OK (this font looks good, not necess
Example of how to use the python command line youdao dictionary, python command line
Preface
Since I have been using the Linux system, it is particularly difficult to support dictionaries. For those of me who have been reading English documents, I have been stuck in shells and used a proper dictionary before, I feel very good. Although there is a web version, it
Use of usermod in user and group management on the command line interface, command line usermod
After adding a user using useradd, you need to use the usermod command to make some modifications.Function Description: Modify the information of a user account.Syntax: usermod [-
Umask can be used to set the [permission mask]. A permission mask is composed of 3 octal digits, which, when the permission mask is removed from existing access permissions, can produce preset permissions when the file is created.
Grammar
umask [-s][Permission Mask]
parameter Description :
-S represents the permission mask in text.
Instance
Using the directive "umask" to view the current permission mask, enter the following command:
$ umask
When we need to use the same file in a different directory, we don't need to put a file that must be the same in every directory we need, we just put the file in a certain directory, and then use the LN command link in the other directory to make it available, without duplicating the disk space.
Grammar
ln[parameters [Source files or directories] [destination f
You can use chattr to modify the attributes of a file or directory and run the lsattr command to query its attributes.SyntaxLsattr [-adlRvV] [file or directory...]Parameters: -A displays all files and directories, including the additional built-in characters starting with ".", the current directory "." and the upper Directory "..". -D display, directory name, rather than
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.