1. Change file or directory permissions: chmodchmod [{Ugoa} {+-=} {rwx}] [file directory] [mode=42] [file or directory]Digital representation of permissions: R---4 w---2 x---1 rwxrw-r--:764chmod u+x Test.listChmod-r 421 TestDir-R Recursive modification: all users under directory and directory have permissions2. Change the file or directory owner: chownchown [user] [file or directory]: chown Bob fengjie.list3. Change the owning group of the file or dir
implement the interface command, there are three specific commands:1 Public classEngineerImplementsCommand {2 Public voidExecute () {3 //Do Engineer ' s command4 }5 }6 7 Public classProgrammerImplementsCommand {8 Public voidExecute () {9 //Do programmer ' s commandTen } One } A - Public classPoliticianImplementsCommand { - Public voidExecute () { the //Do politician ' s
entire file to process them. However, a real log file usually contains a large amount of content, so you have to consider this situation. In this case, you should consider filtering out some content and pass the content after Cat and sort to the filtering tool through pipelines. Grep
Grep, egrep, fgrep-print the text line matching the condition
Suppose we are only interested in orders for the patterns of Enterprise Architecture book. With grep, we can limit the output of orders cont
recover the SYSVOL directory and Active Directory directory service on the domain controller.
8. Debug mode
At startup, debug information is sent to another computer through a serial cable.
If you are or have already used Remote Installation services to install Windows on your computer, you can see additional options related to restoring or recovering the system using Remote Installation Services.
Practi
Document directory
Cat
Sort
Grep
Cut
Sed
Uniq
Find
Less
Every programmer, at a certain point in his career, will always find that he needs to know some Linux knowledge. I am not saying that you should be a Linux expert. I mean, you should be proficient in implementing Linux Command Line tasks. In fact, I have learned the following eight commands and can basically complete any task that needs to be completed.
Note: Each of the following
Every programmer, at a certain point in his career, will always find that he needs to know some Linux knowledge. I am not saying that you should be a Linux expert. I mean, you should be proficient in implementing linux Command Line tasks. In fact, I have learned the following eight commands and can basically complete any task that needs to be completed.
Note: Each of the following commands is described in
ArticleDirectory
Cat
Sort
Grep
Cut
Sed
Uniq
Find
Less
EachProgramAt some point in your career, you will always find that you need to know some Linux knowledge. I am not saying that you should be a Linux expert. I mean, you should be proficient in implementing Linux Command Line tasks. In fact, I have learned the following eight commands and can basically complete any task that needs to be completed.
Note: Each of
ordinal (not PID) of the command being executed in the background through the jobs command.BG: a command that pauses in the background changes to continue execution. If there are multiple commands in the background, you can use BG%jobnumber to bring up the selected command,%jobnumber is the ordinal (not PID) of the command being executed in the background through the jobs command.Kill processKilling a program that has already started is the same as t
, ChgrpCHGRP: Modifying a file groupChgrp GROUPNAME file .... (Change the directory itself only)-R recursive modification (modifying the genus Group of directories and their internal files)--reference=/path/to/somefile file ... Set the owner of the file to theThe genus of somefile (not required to designate a group)===========================================================================================30, chmodchmod: Modify the file's user rightschmod MOD
different. When the destination directory is present, the entire source directory is copied to the target directory. Example four: copy of Log.log Create a link file log_link.log command:CP-s Log.log log_link.log output: [[email protected] test]#CP-s Log.log log_link.log[[email protected] test]# lllrwxrwxrwx1Root root7 Ten- - the: -Log_link.logLog.log-rw-r--r--1Root root0 Ten- - -: -LOG.LOGDRWXR-xr-x6Root root4096 Ten- - on: -scfdrwxrwxrwx2Root root4096 Ten- - -: -test3drwxrwxrwx2Root root4
8. Basic Redis commands-management-persistence-RDB, redis-rdb1. Redis supports two methods of Persistence: RDB and AOF. It can be used separately or in combination.2. The rdb a and RDB modes are the default persistence methods adopted by Redis, which are completed through snapshots. When certain conditions are met, Redis automatically takes snapshots of all data in the memory and stores them on the entire h
connecting to the server disconnects, the server side also exits.Server-side:?
1
$ nc-l 2389
Client:?
12
$ nclocalhost 2389^C
Server-side:?
12
$ nc-l 2389$
In the above example, the server side also exits immediately when the client disconnects.We can use the-K parameter to control that the server does not exit because the client disconnects.Server-side:?
1
$ nc-k -l 2389
One, by setting "System Configuration" restart into Safe mode
This requires access to the system, the ability to open the Control Panel, or the Start screen, or to run commands.
The following are only the ways to enter the system configuration by running the command (easiest and fastest):
At the same time click on Windows Start +r button, pop-up Run Command box, in the box to enter "Msconfig" and return
, the cast type is the interface Command (command) It.next ()). Execute (); }}Thus, the caller basically only deal with the interface, not specific implementation of the interaction, which also embodies a principle, interface programming, so that in the future to add a fourth specific command, you do not have to modify the caller Testcommand in the code.Understand the core principle of the above code, in use, should each have their own method, especially in how to separate the caller and the sp
, etc.
This will allow you to paste your favorite content into a different register to spare
Want to paste somewhere, directly to move the cursor to a place, press the ' AP can, and so on, b,c ... Registers, etc.
In the current screen
H jumps to the first line
M jumps to the middle row
L jump to the last line
15.
Table 8-2 Delete Commands
Delete command action
D l deletes the current character (sa
edit state after Press W is a word back. Note that if you press ESC in edit State, Exit and then enter: W return, which is saved. 2,: Q is an exit, and when there are no unsaved changes, it will use 3,: q! is out and not saved. 4, u can cancel the modification just now, Ctrl+r can cancel the modification that you cancel. Note: The command with: number is ESC first, then: Command carriage return execution, without:, is ESC and then enter execution. 5, forget what is currently editing the fi
refer to the following table
...........................
............................
1.10Working with source codeSee python example below: http://orgmode.org/worg/org-contrib/babel/languages/ob-doc-python.htmldef foo (x): if x>0: return x+1 else: return x-1return foo (5) G
C-c ' Enter exit code block edit
C-x c-s writing code blocks from the edit area
2Emacs Basic Operations2.1Emacs Lookup
C-s C-s Find the nex
Just installed the Linux virtual machine, using the VI command to try to modify the IP configuration, the result is garbled. Configuration IP file content itself is not garbled, mainly VI editing command line prompt garbled, for example, press I is the insertion mode, the result is garbled elevation, not prompt insertion.Workaround: Modify the contents of the/etc/sysconfig/i18n fileChange Lang to lang= "en_US" on the internet. UTF-
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.