blank characters at the beginning of the/etc/grub. conf file
[[emailprotected]~]#sed-r‘s#^[[:space:]]+##g‘/etc/grub.conf
2. Replace ID: 3: initdefault: 3 in the/etc/inittab file with 6
[[emailprotected]~]#sed‘s#\(id:\)[0-9]\(:initdefault:\)#\16\2#g‘/etc/inittab
3. Delete blank lines in the/etc/inittab file.
[[emailprotected]~]#sed‘/^$/d‘/etc/inittab
4. Delete the # header in the/etc/inittab file line
[[emailprotected]~]#sed‘s/^#//g‘/etc/inittab
5. De
The Cat (concatenation) command is one of the more commonly used commands in Linux/unix open source systems. We can use the Cat command to create one or more files, view the contents of the file, concatenate the files and output the content to the end device or new files, this article will be an example of the Linux cat commands in some simple ways.The cat (short for "concatenate")
There are two ways to execute SQL commands at the command line. The first is to use the "-e" parameter to specify the SQL statement that needs to be executed, and the second way is through the pipe. The syntax and examples are as follows:
1,
The code is as follows
Copy Code
Mysql_home/bin/mysql-u User name-p password-d database name-
specified file path does not exist when not created;--no-createDo not create any files-M: Modify modify time only;-T STAMP[[Cc]yy] MMDDHHMM[.SS]Date format when time is set: Date [MMDDHHMM[[CC]YY][.SS]]2.bash working characteristics the command execution status return value and command-line expansion are involved in the content and its
Linux Tips-history Command usage: 15 Linux system engineers often use the history command to view system operation history when analyzing system security or fault problems, this article will introduce 15 tips related to the history Command hellip; Linux Tips-history Command usage 15
Regsvr32Process files: regsvr32 or regsvr32.exeProcess Name: Microsoft DLL Registration ServiceEnglish Description:Regsvr32.exe is a processes belonging to the Windows OS and are used to register Dynamic-link libraries and ActiveX control s in the registry.English Description:Regsvr32.exe is used to register and unregister DLLs (dynamic link library) files and ActiveX controls for the Windows operating system.This command-
Have you ever encountered the need to find a specific string or style in the file, but you do not know where to start? Then, ask grep to help you.
Grep is a powerful file mode search tool pre-installed in each Linux release. For whatever reason, if your system is not preinstalled with it, you can easily install it through the system Package Manager (apt-get In Debian/Ubuntu and yum in RHEl/CentOS/Fedora ).
$ Sudo apt-get install grep # Debian/Ubuntu $ sudo yum install grep # RHEL/CentOS/Fedora
I
system has been running
Number of currently logged-in users
The average load in the corresponding last 5, 10, and 15 minutes.
You can use the ' l ' command to toggle the display of uptime.1.2 Tasks:The second line shows a summary of the task or process. The process can be in a different state. This shows the total number of processes. In addition, there are the number of running, sleeping, sto
page for each file in the code project. For example, we run "Gcovr-r" in the directory where the program is located. –html–html-details-o findstackdirection2.html "command, You can see that the findstackdirection2.html file and the findstackdirection2.findstackdirection.c.html file are generated in the current directory. Open the findstackdirection2.html file with the browser, as shown in the following:As you can see, the "findstackdirection.c" text
Sed command details and examples
The query function of the grep command, the stream editing function of the sed command, and the awk (which has now become a programming language) are more powerful text editing commands. in Linux system management, it plays an important and comprehensive role. The following perl program
Note: The red is for my personal opinion compared to the usual amount of parameters.
Introduced
Linux wget is a tool for downloading files, which is used at the command line. This is an essential tool for Linux users, especially for network administrators, who often download software or restore backups from remote servers to a local server. If we use a virtual host, we can only download from t
already know that in most shells, you can combine commands on a single command line by placing a semicolon (;) between commands. This semicolon is a Shell control operator,
Use the control operator to combine two commands to run the second command only when the First Command returns the zero exit status. In other wo
; 115.113.134.3.static-mumbai.vsnl.net.in.28472: P 116:232(116) ack 1 win 964822:08:59.617916 IP 115.113.134.3.static-mumbai.vsnl.net.in.28472 > tecmint.com.ssh: . ack 116 win 64347
For more information about tcpdump usage, see 12 examples of using Tcpdump commands in Linux.
5. Netstat-network status statistics
Netstat is a command line tool used to monitor inbou
12 ip command examples
Year after year, we have been usingifconfigCommand to perform network-related tasks, such as checking and configuring Nic information. HoweverifconfigIt is no longer maintained and abolished in the latest version of Linux!ifconfigThe command has beenipCommand is replaced.
ipCommand andifconfigThe comma
site, I want to browse their own site, The input localhost in the IE geology column is the same as 116.69.106.119, although localhost is parsed to be 127.0.0.1. Fifth line of content: Network Destination netmask gateway Interface metric 116.255.255.255 255.255.255.255 116.69.106.119 116.69.106.119 50 Here the destination address is a local broadcast address, the system for such a packet processing method is to put this machine
MySQL database source command details and examples, mysqlsource
MySQL database source command details and examples
MySQL database source command, which is a Database Import command. The usage of the source
practical examples of ' echo ' command in Linux
by Avishek Kumar Under:linux Commands on:august 21, 2014 translation by Smallliu
The echo command is the most commonly used built-in command for bash shells and C shells in Linux, most typically in scripts and batch files. The effect is to display a
Seven examples of the uniq command: The uniq command in Linux can be used to process repeated lines in text files, this tutorial explains some of the most common usage of the uniq command, which may be helpful to you. The following file test will be used as a test file to explain how the uniq
Linux curl is a file transfer tool that works under the command line using URL rules. It supports file uploads and downloads, so it is a comprehensive transfer tool, but traditionally, the URL is used as a download tool. A, Curl command parameters, there are many I have not used, do not know whether the translation is right, if the wrong place, please correct me.
is a command-line tool for monitoring packet and network interface statistics for access to and from the network. It is a very useful tool that system administrators can use to monitor network performance, locate and troubleshoot network-related issues. #netstat-a|moreactiveinternetconnections (serversand Established) protorecv-qsend-qlocaladdress ForeignAddress Statetcp0 0*:mysql *:* Listentcp00*:sunrpc
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.