As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database ldquo; locks rdquo, and you cannot enter
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database ldquo; locks rdquo, and you cannot enter
As you know, it is sometimes necessary to terminate all Oracle processes or a specified set of Oracle processes. When the database is "locked" and you ca
In many cases, we need to terminate all Oracle processes ). When the database is "locked" and you cannot enter Server Manager to terminate the database, you can use the kill command in UNIX to terminate all Oracle processes. This is one of the common uses of the kill command.To terminate an Oracle instance on a UNIX server, perform the following steps:Terminate a
In the process of using the UNIX operating system, we often use a variety of problems, such as the system suddenly slowed down, the system is prone to panic or the host of the terminal often appear panic, when we often guess, is hard disk space is too small, or insufficient memory? Is there a bottleneck in I/O, or is there a problem with the core parameters of the system? At this time, we should consider using the system to provide us with the SAR
A Unix operating system may paralyze the system after a sudden power failure. At this point, the Unix operating system is not as good as that of Microsoft. In the event of a power failure, the Windows operating system will automatically detect and recover when it is restarted, But Unix will not. We need to manually execute The fsck
Lienhua342014-10-15ISO C defines the system function for executing a command string in a program. Its statement is as follows,
#include
int system (const char *cmdstring);
The system function calls the fork, exec, and WAITPID functions in its implementation. The system function calls the fork function to create the child process, and then calls '/bin/sh-c cmdstring ' to execute the command
Tags: permissions test content Universal inittab ATI script Run SystemTurn http://blog.itpub.net/23135684/viewspace-668924/Unix general use Method 3, for deploying OSWMethod One:Edit/etc/rc.d/rc.localJoin the command you want to execute.Such as:[email protected] rc.d]# cat rc.local#!/bin/sh## this script. 'll is executed *after* all and the other init scripts.# can put your own initialization stuff in here
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
been interrupted at any time. In addition to supporting general HTTP (s) and FTP protocols, ARIA2 also supports the BitTorrent protocol. This means that you can also use aria2 to download the torrent file.Ttytter EarthquakeTtytter is a Perl-written command-line Twitter-based tool that can do everything other platform clients can do, of course, to support Chinese. Scripting, CLI control, terminal control, and Perl control are the most loved.Earthquak
(which symlinks), ln ignores the- l and- p options. Otherwise (if making hard links), the last option specified controls behavior when a TARGET is a symbolic Link. The default is to act as if- p was specified.ln examplesln public_html/myfile1.txtCreate a hard link to the file public_html/myfile1.txt in the current directory.Ln-s Public_html/myfile1.txtCreate a symbolic link to the file public_html/myfile1.txt in the current directory.Ln-s Public_html/webstuffCreate a symbolic link to the direct
Below is a collection of 28 unix/linux under the 28 command line tools, some are familiar with, some are very useful, some are not known. These tools are very good, I hope everyone knows. In order to facilitate the study, I have a picture, but also added the official website connectionDstat SAR
Iostat, Vmstat, ifstat a triple tool for viewing system performance (I mentioned those three Xxstat tools in the
This article applies to the following topics:
Unix Linux Convert string to command
UNIX Linux Convert strings to command execution
How to convert a string into a command in a Linux sh script
Answer:Use the eval command
The conversion character of the shell command line is \ www.2cto. comecho $ PATH // get the current value of the system environment variable include a file (class) to: 1.4. # ifndef_ALARM _ # define_ALARM _ # endif extract and copy method: (c... for the unix command line, the conversion character of shell command line
a delimiter to sort the 2nd field[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2D:1F:11C:2B:3A:4E:5Use ":" To make a delimiter, sort the 2nd field, sort by number size[email protected] test]# Cat Sort.txt | Sort-t ":"-K 2-nD:1C:2B:3A:4E:5F:11Sort the/etc/passwd files by uid[Loring test]# Sort-t ":"-K 3-n/etc/passwdSort the passwd files in the order of the UID from large to small[Loring test]# Sort-t ":"-K 3-nr/etc/passwdPrint/etc/group in order of GID from small to large[Loring test]# so
including sub-directoriesPWD (print working directory)Displays the path of the current directory (path)CD (change directory)Change the current directory(1)..Represents the parent directory to go to the current directory.(2)/Represents the go to root directory.(3)When there is no option, go to the user's home directoryTouch file_nameCreate a new file, modify the file dateFunction: Change the date of the file, do not modify the contents of the file, if the file does not exist, create a new file.M
accessed in the last 48 hours of the system
Find/-empty # Check for empty files or binders in the system
Find/-group Cat # Check the files in the system that belong to Groupcat
Find/-mmin-5 # files modified in the last 5 minutes of the system
Find/-mtime-1 #查在系统中最后24小时里修改过的文件
Find/-nouser #查在系统中属于作废用户的文件
Find/-user Fred #查在系统中属于FRED这个用户的文件
Find/-name AAA #查在系统中 file named AAA
The following list is a partial condition for searching the characteristics of a file that can be specified by t
ChmodIs a Command Used in UNIX systems to control the user's permissions on files (ChAngeMoDA combination of e-word prefixes) and functions. Only the file owner and the Super User can modify the file or directory permissions. You can use absolute mode to specify the object ACL in symbolic mode.Usage
ChmodUse syntax
$ chmod [options] mode[,mode] file1 [file2 ...]
Use the LS
Plink_path ="C:/plink.exe"'Plink.exe path
Username ="Username"'User name
Password ="Password"'Password
Host ="192.168.0.1"'Unix/Linux server address
Command ="Ls"'Command to be executed
Set oshell = Createobject ("Wscript. Shell ")
'Combine plink commands, including logon and Command Ex
name in sleep is displayedFlags task flag, reference sched.hSort by specified columnTop can be set to sort by an item, by default it is sorted by CPU usage,M, (note upper case), sorted by memory usageP, sort based on percent CPU usageT, sorted by Time/accumulated time.How to end a processEnter the letter k(lowercase), and then enter the PID you want to killOf course you can also run the command directly, kill the PIDTop Other usesOther uses of top, c
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.