Grep command series: how to find files based on the file content in UNIX
To complete the course assignments, I wrote a lot of C-language code and saved them as/home/user/c/*. c and *. h. In the UNIX shell window, how can I find a file through a string or word (for example, the function name main?
You need to use the following tools:
[A] grep
under the use of Linux/unix, often use the text interface to set up the system or operating system, the author himself in the process of work is also constantly in touch with this command, so forThis special brewing, preparation, began the writing of this article. This paper mainly records some of their usual linux/unix under the operation of
Unix system commands a lot of, below explain Stty. This command is a common command used to change and print terminal line settings.
1, Stty (set TTY, setting TTY) command to check and modify the current registered terminal communication parameters.
The UNIX system provide
When using a git command that can has a large amount of output (like git log , git diff or git blame ), Git opens the command outpu T in our terminal "pager"; On most modern unix-based systems, the default pager would be ' less '. Learning a few less commands would help us deal with this git command output that opens
A Unix operating system may paralyze the system after a sudden power failure. At this point, the Unix operating system is not as good as that of Microsoft. If a power failure occurs, the Windows operating system will automatically detect and restore the system when it is restarted, but Unix won't... A Unix operating sy
Commands for interchange of date, time, and Unix timestamps in Linux Command lines
At work, you often need to get the current Unix timestamp or convert the given timestamp to a date format that we can recognize, on the linux Command Line terminal, you can easily solve the problem by using several commands.
1. convert a
As a widely used debugger under Unix/linux, GDB not only provides rich commands, but also introduces scripting support: one for existing scripting language support, such as Python, where users can write Python scripts directly, and GDB calls the Python interpreter to execute The other is a command script, in which the user can write GDB commands that GDB has provided or customize, and then run by GDB. In th
About ViVi is the most popular full-screen document editor in the Unix world, and almost any UNIX machine can saywill provide this software. Linux Of course also has, its VI is actually Elvis (copyright question), but they allAlmost. Familiar with the DOS of the document processing, may feel that VI is not good, Unix has developedMany newer, better-used clerical
1. Password security
The/etc/passwd file in the UNIX system contains all the information that the system needs to know about each user (the encrypted password may also be stored in the/etc/shadow file).
/ETC/PASSWD contains the user's login name, encrypted password, user number, user group number, user comment, user home directory, and user
The shell program used. Where the user number (UID) and the user group number (GID) are used to uniquely iden
The following describes how to set the Unix telnet command. We have analyzed some of the commands and codes. Then this code is used as a monitoring program. After the event is triggered, telnet to Sco unix to execute the command and obtain the command result. After several d
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database is "locked" and you cannot enter Server Manager to "gently" Terminate the database, you can use the kill command in UNIX to terminate all Oracle processes-this is one of the common uses of the kill command.To terminate an Oracle instance on a
] ~]#/etc/profile or [[email protected] ~] #source/etc/profileMake the change effective, if there is no error stating the success.Verify that there is data in the log[Email protected] ~]# More/var/log/201107.log2011-07-21 17:29:08 ##### Root PTS/2 (192.168.23.250) # # # # # # # /etc/profileYou can see that there's already data inside.You can also usePrompt_command= ' {date ' +%y-%m-%d%T ##### USER: $USER IP: $SSH _client PS: $SSH _tty # # (History 1 | {read x cmd; echo "$cmd";}) ";} >> $HISTORY
As you know, there are times when it is necessary to terminate all Oracle processes (process) or a specified set of Oracle processes. When the database is "locked" and you are unable to enter Server Manager to "gently" terminate the database, you can terminate all Oracle processes with the KILL command in Unix-one of the common uses of the KILL command.When you need to terminate an Oracle instance (instance
28 Unix/linux Command-line artifactBelow are the 28 Kristóf Kovács collected under the 28 Command line tools (original link), some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. This article is also discussed in Hacker News, you can go to see. I have added the website link and some instructions in th
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
allows you to resume a file download that has been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control,
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
The guy who is familiar with DOS is trying to make UNIX like DOS,
One of them is to set the Unix prompt as $ p $ G. The following describes the method.
The GNU bash (Bourne again shell) is more convenient for different shell settings)And KSh (Korn shell) and tcsh (enhanced version of CSH, CSH in Linux isSymbol connection ). The General Sh (Bourne shell) and CSH settings are cool. One by oneVarious shell se
' ibase=16;obase=1010; AC ' |BC (Linux)0172> Echo ' ibase=16;obase=1010; AC ' |BC (Unix)Output base is too large172Note here: This error will be reported when executing in Unix, but there will still be results.]$ Echo ' ibase=16; AC ' | Bc172Convert decimal to hexadecimal]$ echo ' ibase=10;obase=16;172 ' |BCAC]$ echo ' obase=16;172 ' |BCACconverting decimal to Binary]$ echo ' obase=2;172 ' |BC10101100Conve
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.