TP Introduction will not say more, you can Baidu, Google to go;
The first time using the TP GUI version, the feeling is very convenient, the export format also supports many mainstream;
TP 2.4.5 Download
However, as a result of the subsequent production of some tools, found that they had to use the command line;
Convenient degree of logical batch processing calls;
Then innocently searched: Texture Packer
Ubuntu14.04 + mutt + msmtp configure the command line mail client in linuxInstall software msmtp mutt
apt-get install -y msmtp mutt
Configure msmtp
After the installation is complete, configure msmtp first. The default configuration file varies with the operating system version and can be viewed through msmtp -- version.
# msmtp --versionmsmtp version 1.4.31Platform: x86_64-pc-linux-gnuTLS/SSL library: GnuT
Curl is a File Transfer tool that uses the URL syntax to work in the command line mode. It supports many protocols: FTP, ftps, HTTP, https, Gopher, telnet, dict, file, and LDAP. Curl also supports HTTPS authentication, http post, http put, FTP upload, Kerberos authentication, HTTP upload, proxy server, cookies, user name/password authentication, and resumable download of downloaded files, resumable upload o
"If you don ' t execute your ideas, they die" ~ Roger Von Oech
Related:
Run with elevated Permissions-script to run as Admin. Exec-execute command, returning an object. Run-run a commandJoeware.net-cpau (Create Process as User) like RunAs but with a options to encrypt the password.Equivalent CMD command:shellrunas-run a command under a different user account
%~dp0 In a batch file indicates meaning
'. ' Tb_name '( ID varchar() notNULL, name varchar( ) CHARACTER SET UTF8); One of the benefits of developing a coding method is to enhance the processing of Chinese, which can solve the problem of garbled content in some parts of the table in different tools.1. Specific inquiriesSELECT Content from ForumWHERE content= ' narrowing the gap between rich and poor is a tangled topic, how to shrink? The key is income distribution. The people with great power of discourse, the income dist
Starting with 4.2, Android provides a command line tool settings. This tool is used to help construct the Settingprovider client Agent, which makes it easy to read and set the system settings.But this tool, together with ADB, poses a great threat to Android security. Because the UID is the shell when executing settings through ADB, the shell has a lot of privileges.Of course, the root of the problem is that
the position parameter as an exampleIn the above code, the POS1,POS2,POS3 three positional parameters were added through add_argument, and they constituted a regular expression of a*aa*, where A * represents a match of 0 or more values.In the parameter list in test Example 1, first encountered positional parameter a b C, which coincides with a*aa* pattern matching, that is pos1=[a,b] pos2=c, pos3=[], because a*aa* is greedy matching pattern, that is, as much as possible to get the value, so pos
VMware command line control VM
I haven't used the vmwarevm for a long time. Today I want to install an XP instance for testing. It's too slow to install it with virtualpc. If I don't wait for a long time, I will install it with Vmware, which is much faster than virtualpc.
After the installation is complete, it is important to enable the host operating system to automatically start the specified virtual ma
=15200000000,15299999999cmcc=14700000000,14799999999cmcc=15000000000,15099999999cmcc=18200000000,18299999999cmcc=18300000000,18399999999cmcc=18400000000,18499999999cmcc=18700000000,18799999999cmcc=17800000000,17899999999cmcc=18800000000,18899999999These are the parameters that send fetion need to queryIt is also best to perform the following steps:[Email protected] fetion]# vi/etc/ld.so.confAdd to:/usr/local/fetion[Email protected] fetion]# Ldconfig[[email protected] fetion]#./fetion--sid= your
because the first row is a column name ./mongodump-d test-o/bak/mongodump # mongodump Data backup ./mongorestore-d Test--drop/bak/mongodump/* # Mongorestore Recovery --drop #恢复前先删除 db.t1.find () #查看 # Mongodump Although it can be backed up, the city has the ability to get a real-time view of the data, using the Fsync command to replicate the data directory at run time without damaging the data # Fsync forces the server to write data from all buffers
Because some JSON data formats are to be processed recently, after some searches, we finally found jq, a great tool. Jq allows you to operate JSON directly on the command line, including sharding, filtering, conversion, and so on.
Let's use several examples to illustrate jq's functions:
Beautiful print
If we use a text editor to open JSON, it may sometimes look m
To compile and run a Java file, it is easy to use only two commands:(1) Javac: function: Compile Java file; How to: Javac Hello.java, if it is not wrong, a Hello.class file is generated in the same directory as Hello.java, which is a file that the operating system can use and run.(2) Java: function: Run the. class file; How to: Java Hello, if not error, executes the Hello.class file. Note: There is no need to extend the name after hello.The following example
The nodejs command line parameter processing module uses the commander instance and nodejscommander
It is true that the previous processing was using the built-in process. agrv, which can work, but it is not easy to use, so the tj god wrote a, my god, completely tall:
1. Installation
Copy codeThe Code is as follows:Npm install commander
2. option Parsing
Options with commander are defined with. option () me
toggle selection or [exit][previous][next]>Choose Product Installation Directories:----------------------------------------Middleware Home Directory: [/weblogic/oracle/middleware]Product Installation Directories:1| WebLogic Server: [/weblogic/oracle/middleware/wlserver_10.3]2| Oracle Coherence: [/weblogic/oracle/middleware/coherence_3.7]Enter index number to select OR [exit][previous][next]>--Default, enter:The following products and JDKs would be installed:-------------------------------------
Recently wrote a network module, with the command line Windows comes out debugging information, debugging information a bit more, monochrome slightly monotonous, so took a little time to do the following small modules.The code is very small, the use of the method is extremely simple , I will not repeat, the following examples. Less time, less talk.Have any bug, o
This example tells the greedy snake game C + + command line version of the implementation code, is very classic game. Share to everyone for your reference. The implementation methods are as follows:
As we all know, the snake game is a classic computer game.
The game is described as follows:
1. Greedy snake can be automatic straight forward, or the player can be manipulated b
/*** JeruGraphics v 1.0.**Some examples of dynamic image generation are as follows:ServletCompleted,*In addition, the program is very long and does not think it is too good in terms of practicality or readability.*The code segment is provided here. The command line generates an image file. Is this easier to use?**CreateBufferedImageObject"Image"Put it in this buf
Main (int Argc,char *argv[])1.ARGC is an integer2.ARGV pointer to pointer (can be understood as:char **argv or:char *argv[] Or:char argv[][], argv is an array of pointers )Note: the main () parenthesis is a fixed notation.3. Here is an example to understand the use of these two parameters:Assuming that the program name is prog,When only prog is entered, the parameters that are transmitted by the operating system are:Argc=1, which indicates that there is only one program name.ARGC has only one el
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.