fields specify when the command will runminutes (0-59)hours (0-23)Date (1-31)month (1-12)Day of the week (0-6, of which 0 stands for Sunday, as if 7 also represents Sunday)The 6th field is a string to execute at an appropriate time. Example:#MIN HOUR Day MONTH DAYOFWEEK COMMAND#每天早上6点10分6 * * * Date#每两个小时0 */2 * * * Date#晚上11点到早上8点之间每两个小时, 8 in the morning.0 23-7/2,8 * * * Date#每个月的4号和每个礼拜一到礼拜三的早上11点0 4 *
Linux curl is a file transfer tool that works under the command line using URL rules. It supports file uploads and downloads, so it is a comprehensive transfer tool, but traditionally, the URL is used as a download tool. A, Curl command parameters, there are many I have not used, do not know whether the translation is right, if the wrong place, please correct me.
these packets are drop.For example:(1) Add a rule to the input chain to match the established connection or the new connection established by the established connection. That is, all TCP response packets are matched.#iptables-A input-m state–state related,established(2) Add a rule to the input chain to match all connection request packets from the non-eth0 interface.#iptables-A input-m State-–state new-i!eth0As another example, for FTP connections you can use the following connection tracking:(
decompression program. They have a lot of parameter options, here are just a brief introduction, still examples of its use:# Zip All.zip *.jpgThis command compresses all. jpg files into a zip package# Unzip All.zipThis command is to extract all the files in the All.zip.2) for. rarTo process. rar files under Linux, you
the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store all the settings in the file file, using the crontab file
Linux ftp command parameters are frequently used. Because it is almost the most frequently used command on the Internet. Therefore, it is very important to understand how to use this command, because a large number of internal commands of linux ftp
of the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store all the settings in the file file, using the crontab fi
One, uniq what to do with the
The duplicate lines in the text are basically not what we want, so we need to get rid of them. Linux has other commands to remove duplicate rows, but I think Uniq is a more convenient one. When using Uniq, pay attention to the following two points1, when manipulating text, it is typically used in combination with the sort command, because Uniq does not check for duplicate rows
The ping command in Linux is a commonly used network Command. it is usually used to test the connectivity with the target host. we often say, "ping a machine, check if it is on. "If you cannot open the webpage, you will say," You should ping the Gateway address 192.168.1.1 first"
It sends an ICMP ECHO_REQUEST packet to the network host (send ICMP ECHO_REQUEST to
In addition to basic operations like searching for files in a directory structure, you can also use the find command to perform some practical operations to make your command line easier.
This article will introduce 15 Linux find commands that are useful for beginners and laruence.
First, create the following empty file under your home directory to test the follo
Tags: linux command bash linux command line file name PAC space append different row15 Examples of mastering the Linux command line historyWhen you use
is executed from the time of the minute to the minute of the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store a
the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store all the settings in the file file, using the crontab file
hour, and the remainder of the analogyWhen the F1 is a-B, it is executed from the time of the minute to the minute of the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to
the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store all the settings in the file file, using the crontab file
the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store all the settings in the file file, using the crontab file
the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store all the settings in the file file, using the crontab file
the hour, and the F2 is a-B indicating that it is executed from the first to the first, and the remainder of the analogyWhen F1 is */n, it is performed once every n minutes, and F2 is */n for every n-hour interval, with the remainder of the other analogyWhen F1 is a, B, C,... A, B, C,... Minutes to execute, F2 for a, B, C,... The time indicated that the first, B, c ... Hours to execute, and the rest of the analogyThe user can also store all the settings in the file file, using the crontab file
Document directory
1. Use Netcat in the server-client architecture
2. Use Netcat to transfer files
3. Netcat supports timeout Control
5. Disable reading data from standard input in Netcat
6. Force the Netcat server to be started
7. configuring the Netcat client will not exit because of EOF
8. Use Netcat to process UDP protocol
Netcat or NC is a network tool kit for debugging and checking in Linux. It can be used to create TCP/IP connections
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.