Our traditional method of writing programs is to create a single and fully functional program and try to provide functions that can fully meet the needs in a program. Such an approach will cause huge and complex programs, reduced maintainability. Generally, programs on windows have comprehensive functions and do not need to work with other programs. For example, if two programs require paging, they will develop a paging module, instead of seeking for the shared paging function. In the
' ibase=16;obase=1010; AC ' |BC (Linux)0172> Echo ' ibase=16;obase=1010; AC ' |BC (Unix)Output base is too large172Note here: This error will be reported when executing in Unix, but there will still be results.]$ Echo ' ibase=16; AC ' | Bc172Convert decimal to hexadecimal]$ echo ' ibase=10;obase=16;172 ' |BCAC]$ echo ' obase=16;172 ' |BCACconverting decimal to Binary]$ echo ' obase=2;172 ' |BC10101100Conve
Write Cache command--sync
After starting the UNIX system with the reboot command, the system prompts for an error message and some applications do not work properly. After careful examination of system files, and the initial correct backup to compare, found that some files are indeed corrupted, toss and turn to find the cause of the file is destroyed, and fina
ArticleDirectory
Linux Command Line cheat sheets
Solaris cheat sheets
Debian/Ubuntu cheat sheets
Package management cheat sheets
UNIX cheat sheets
Bash cheat sheets
Awk cheat sheets
Ed cheat sheets
Sed cheat sheets
Gdb debugger cheat sheets
The Linux/Unix System in command lin
There are many commands in the UNIX operating system that can be used to back up files. However, the root file system in the UNIX operating system is a relatively special file. In general, you must uninstall other file systems If you are backing up this type of file. Because the root file system is the ancestor of other filesystems, it backs up files in other file systems at the same time if not uninstalled
Brief introduction
The crontab command is common in UNIX and unix-based operating systems, and is used to set periodically executed instructions. This command reads the instruction from the standard input device and stores it in a "crontab" file for later reading and execution.
Typically, crontab stored instructions
A Unix operating system may paralyze the system after a sudden power failure. At this point, the Unix operating system is not as good as that of Microsoft. In the event of a power failure, the Windows operating system will automatically detect and recover when it is restarted, But Unix will not. We need to manually execute The fsck
(which symlinks), ln ignores the- l and- p options. Otherwise (if making hard links), the last option specified controls behavior when a TARGET is a symbolic Link. The default is to act as if- p was specified.ln examplesln public_html/myfile1.txtCreate a hard link to the file public_html/myfile1.txt in the current directory.Ln-s Public_html/myfile1.txtCreate a symbolic link to the file public_html/myfile1.txt in the current directory.Ln-s Public_html/webstuffCreate a symbolic link to the direct
A Unix operating system may paralyze the system after a sudden power failure. At this point, the Unix operating system is not as good as that of Microsoft. If a power failure occurs, the Windows operating system will automatically detect and restore the system when it is restarted, but Unix won't... A Unix operating sy
Commands for interchange of date, time, and Unix timestamps in Linux Command lines
At work, you often need to get the current Unix timestamp or convert the given timestamp to a date format that we can recognize, on the linux Command Line terminal, you can easily solve the problem by using several commands.
1. convert a
The Iconv command is a file-encoded reload tool that runs on the Linux/unix platform. When we look at the text file in the Linux/unix system shell, we often find that the file is garbled in Chinese, this is due to the encoding of the text file and the current operating system settings, which can be encoded by using the ICONV conversion, to solve the garbled probl
1. Password security
The/etc/passwd file in the UNIX system contains all the information that the system needs to know about each user (the encrypted password may also be stored in the/etc/shadow file).
/ETC/PASSWD contains the user's login name, encrypted password, user number, user group number, user comment, user home directory, and user
The shell program used. Where the user number (UID) and the user group number (GID) are used to uniquely iden
As you know, there are times when it is necessary to terminate all Oracle processes (process) or a specified set of Oracle processes. When the database is "locked" and you are unable to enter Server Manager to "gently" terminate the database, you can terminate all Oracle processes with the KILL command in Unix-one of the common uses of the KILL command.When you need to terminate an Oracle instance (instance
The guy who is familiar with DOS is trying to make UNIX like DOS,
One of them is to set the Unix prompt as $ p $ G. The following describes the method.
The GNU bash (Bourne again shell) is more convenient for different shell settings)And KSh (Korn shell) and tcsh (enhanced version of CSH, CSH in Linux isSymbol connection ). The General Sh (Bourne shell) and CSH settings are cool. One by oneVarious shell se
including sub-directoriesPWD (print working directory)Displays the path of the current directory (path)CD (change directory)Change the current directory(1)..Represents the parent directory to go to the current directory.(2)/Represents the go to root directory.(3)When there is no option, go to the user's home directoryTouch file_nameCreate a new file, modify the file dateFunction: Change the date of the file, do not modify the contents of the file, if the file does not exist, create a new file.M
under the use of Linux/unix, often use the text interface to set up the system or operating system, the author himself in the process of work is also constantly in touch with this command, so forThis special brewing, preparation, began the writing of this article. This paper mainly records some of their usual linux/unix under the operation of
Unix/Linux Command memorandum, unixlinux Memorandum
Arp: The ARP cache contains one or more tables used to store IP addresses and resolved MAC addresses.
// Extract all Bound0 ip and mac Information
Arp-n-I bond0 | awk '$5 = "bond0" {print $1, $3 }'
Sed: used to edit the text in a document or string through a series of commands
// Read a single row of data from/script/ip and print it out.
Sed-n '1p'
ChmodIs a Command Used in UNIX systems to control the user's permissions on files (ChAngeMoDA combination of e-word prefixes) and functions. Only the file owner and the Super User can modify the file or directory permissions. You can use absolute mode to specify the object ACL in symbolic mode.Usage
ChmodUse syntax
$ chmod [options] mode[,mode] file1 [file2 ...]
Use the LS
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.