-
In IL, a label is a name with a colon (that is,) at the end. It allows us to jump unconditionally from part of the code to another part. We often see this label in the IL code generated by the counter compiler. For example:
IL_0000: ldstr "hi" IL_0005: call void [mscorlib]System.Console::WriteLine(class System.String) IL_000a: call void zzz::abc() IL_000f: ret
The word in front of the colon is the label. In the program given belo
", db="Test", charset="UTF8") 7cursor =conn.cursor ()8 9 #Delete a tableTensql ="drop table if exists user" One cursor.execute (SQL) A - #Create -sql ="CREATE table if not exists user (name varchar (primary) key, created Int (ten))" the cursor.execute (SQL) - - #Write -sql ="INSERT INTO User (name,created) VALUES (%s,%s)" +param = ("AAA", Int (Time.time ())) -n =Cursor.execute (Sql,param) + Print 'Insert', N A at #Write Multiple lines
the exit of the program (returns 0 for success, returns non 0 for failure)4. Custom variablesSyntax format:Name=[value]There can be no spaces on either side of the equal sign, the variable name is case sensitive, and the value of the variable is called later using the $ variable nameExample: a=2 echo $a5, logical symbol : Logic andCMD1 CMD2Has a short circuit effectFor example:CAT/ETC/PASSWD mkdir zzz/Explain:If the file is not successful (for exam
-shared-o $ @ $ (TGT)
18
Run the following command:
$ Make-f makefile-lib
$
Generate the libmy. so library.
Note: In the maintenance file, row 17th uses the-shared option to generate a dynamic link library, and uses the-s option to remove the symbol table in the target file, thus reducing the file length.
3. Share the dynamic link library
3.1 dynamic link library configuration file
To make the dynamic link library used by the system, you need to maintain the configur
set-uid root program to run under the ordinary userIn this case, ignore the LD_PRELOAD environment variable, do not overload the sleep function, and use the system's own sleep function:2.6.3 The program that compiles myprog into a set-uid root runs under rootIn this case, using the LD_PRELOAD environment variable, use the overloaded sleep function:2.6.4 under a normal user to compile Myprog into a set-uid ordinary user program run under another ordinary userIn this case, the sleep function is n
set-uid root program to run under the ordinary userIn this case, ignore the LD_PRELOAD environment variable, do not overload the sleep function, and use the system's own sleep function:2.6.3 The program that compiles myprog into a set-uid root runs under rootIn this case, using the LD_PRELOAD environment variable, use the overloaded sleep function:2.6.4 under a normal user to compile Myprog into a set-uid ordinary user program run under another ordinary userIn this case, the sleep function is n
The Linux under tar command is extracted to the specified directory:#tar zxvf/bbs.tar.zip-c/zzz/bbs//The root directory under the Bbs.tar.zip decompression to/zzz/bbs, the premise to ensure that the existence of/zzz/bbs this directoryThis is a bit different from the CP command, and the CP command will automatically create this directory if it doesn't exist! attac
Code that is located after the return statement is not executed. In the 1th program given below, you will find that there is a WriteLine function call in C #, but we do not see it in our IL code. This is because the compiler realizes that any statement after the return will not be executed, and thus does not have to convert it into IL.
A.cs
class zzz { public static void Main() { return; System.Console.WriteLine("hi"); } }
A.il
.assembly mukhi {}
: Password maximum time (password validity period) (days)Sixth column: Warning time before password expiresSeventh column: Password expiration payback dateEighth column: Account validityNineth column: Reserved columnsPractice:1. Add group KKK GID is 1500Groupadd-g KKK2. Add user Zorro UID 1500 belongs to KKK group description: Hello home directory/mnt Shell:bashUseradd-u 1500-g
copy of this variable when creating each new shell. This process is called variable output. ExampleWrite a C program, the C program needs to dynamically link a user-written dynamic library. After everything has been compiled, run the executable file, and you will find that the dynamic link library cannot be found by the system prompt. OK, you find that the path to the dynamic library has not been added to Ld_library_path. However, after the addition, the system still indicates that the dynamic
1. Environment variables
Linux system under the implementation of the relevant commands, the system will first find the command in this directory, set the environment variable is to tell the system in addition to the directory to find in the context of the setting of the directory to find the environment variables, this is the role of environmental variables;
2. Setting Environment variables
Use export instruction, set environment variable, open/ETC/.BASHRC file, increase export path=;
1.
Copy Code code as follows:
namespace Bak\ba\ba;
Function Bab () {
echo "BI";
}
namespace KKK;
function K1 () {
echo "K1";
}
\bak\ba\ba\bab ();//Use a different namespace under the KKK namespace, note the previous \
Use \bak\ba\ba as b;//is still under the KKK namespace, but the following methods are correct when using aliases
#use Bak\ba\ba as b;//
-server2. Define SERVER_ID,ID values cannot be the sameMasterServer-id=1Slaveserver-id=23. Modify the MySQL configuration file (/etc/my.cnf) by adding the following:MasterServer-id=1Log-bin=binlog# # #启用二进制日志Slaveserver-id=2Relay_log=/var/lib/mysql/mysql-relay-binRelay_log_index=/var/lib/mysql/mysql-relay-bin.index4. After the change, restart the MySQL service "Guthrie after":/etc/init.d/mysqld restart5. On master, go to MySQL to do the following:Mysql>Grant Replication Slave on * * to '
Tags: Linux Recycle Bin Script sourceConvert RM command to MV Command, cannot use the-R parameter, will report an error, because the MV command does not have the-R parameter, the following is the method:
Create a hidden folder in the user's home directory ~/.trash as the garbage collection station[[emailprotected] shellXT]# mkdir -p ~/.trash
Write a script
#设置别名, RM is delete file, RL is view Recycle Bin, ur is recovery fileAlias rm= ' Trash 'Alias Rl= ' Trashlist 'Alias ur= '
)Allocates an Date object and initializes the object to represent the specified number of milliseconds since the standard base time, known as the epoch, or January 1, 1970 00:00:00 GMT.
void
settime (longtime) sets this date object to represent the point in time of January 1, 1970 00:00:00 GMT after the timestamp millisecond.
Strin G
toString ( ) converts this Date object to the following form of String
LST: print (Line.strip ())5. Cyclic reading, this method is the best, every time a row of content, no memory overflow problemf = open ("Ccc.txt", mode= "R", encoding= "Utf-8") for line in F: print (Line.strip ())Read the file handle must close F.close ()Three, write mode (W,WB)When writing, if there is no file, the file is created, and if the file exists, the original content is deleted and then written to the new contentf = open ("xxx", mode= "W", encoding= "Utf-8") f.write ("Asdf") F.fl
-xxx. u-yyy{} Do not use layout to control modules or components, modules and components should be separate from the layout. . m-xxx. f-xxx{}.m-xxx. s-xxx{} do not redefine or modify or add a defined feature class selector and skin class selector through a module or other class. . m-xxx. Class. class. class{} do not write selectors too verbose, which can add additional file sizes and limit too small a range of selectors so that the tree structure is too restrictive to apply. The proposal i
NOOP no action, server should respond OK
QUIT End Session
RSET reset session, current transfer canceled
Mail from specify Sender address
RCPT to specified recipient address
General SMTP session There are two ways, one is direct mail delivery, that is, for example, you want to send e-mail to zzz@163.com, then directly connected to the 163.com mail server, the letter to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.