Reprinted from: http://blog.9cbs.net/yzhz
Generally, large J2EE applications are constructed in a Linux environment. In the development environment, we can map with local network drives through Samba.
Programmation in the Windows environment. But the last release is still going to the Linux environment, and we have the application management of online web server and database server (
For example, automatic scripting release, etc.), application monitoring (WEB service is normal, the usage of the mysql database), system monitoring (monitoring disk space usage, etc.
The programmer is required to be familiar with the necessary Linux knowledge. Of course, the programmer does not have to be proficient in the entire Linux system. Because of the experience developed, listing Linux knowledge that the programmer must have mastered.
First, Linux basic command 1, user management userDel deletes user account UserAdd Add User Account SU to change the ID of the current user
2, the file directory management LS browse directory, see the file and file name chown in the current directory CHMOD modified file permissions Chown change file owner CP copy file CD Change the current directory MV rename file or mobile file RM delete file or directory PWD Current Directory SCP Remote copy Alias alias
3, other commands ln establish a link behind the file between the contents of the TAIL output file, usually we will view the log of the current program through TAIL -F real-time. Type View a command location path WC View Route Grep Finding Find Find file Date in file content View Date crontab Develop plan tasks, usually used for system monitoring. DF View disk remaining space, you'd better write a script monitoring disk in crontab. More than 90% will send Email to the relevant personnel. PS View Process Status TOP View CPU Usage Kill Termination Process KILLALL JAVA programmer favorite with KILLALL -9 JAVA WVAEW to view login users and what they are doing, or look at the system's LOAD. LOAD is too high, I should find a reason. WHO View the current user's convenient situation TAR decompressed or compressed file Echo console output wget HTTP Access RPM RPM package management
4, redirection, pipe 5, standard output, standard error 6, use / block a special character's meaning 7, regular expression
Second, proficient in the VIM editor.
Third, the shell script under the liunx environment, the writing of Perl scripts In order to manage online server applications, some scripts are often required. The script is written in the following points: 1. Understand the meaning of double quotes, single quotes, and reverse quotation marks. 2, the use of anti-oblique lines. 3, the number of variables left on the left of the shell script not to add $, which is often written for the Perl script. 4, the string is relatively long, when the space is contained, the script is wrong when a parameter is wrong, and the characters are brought by double quotes. 5, master the usage of awk and sed.
Fourth, the basic package installation apache, resin, mysql general step is: Configuremakemake Install
5. The website below related websites is a relatively excellent Linux website, you can go see. http://www.linuxforum.net/
Network most classic command line Select from ShareGood BLOG keyword network most classic command line source network most classic command line - network security worker's killing skills --------------- -------------------------------------------------- ------- 1. The most basic, most common, test physical network
Ping 192.168.0.8 -t, parameter -t is waiting for the user to interrupt the test
2. View DNS, IP, Mac, etc.
A.WIN98: Winipcfg B.Win2000 or above: IPConfig / All
C. JSLOOKUP: See DNS C: /> NSLOOKUP DEFAULT Server: ns.hesjptt.net. Hesjptt.net.cn address: 202.99.160.68
Non-Authoritative Answer: Name: Pop.pcpop.com Address: 202.99.160.212
3. Network letter
NET send computer name / ip * (broadcast) transfer content, pay attention to stop the letter to stop the letter from the network segment Net Stop Messenger, or you can start the messenger service
4. Detect each other computer name, the group, domain, and the current username (the pursuit of working principle)
Ping -a ip -t, only display NetBIOS name nbtstat -a 192.168.10.146 is relatively full
5.NetStat -a Shows all ports of your computer now open
NetStat -s -e is more detailed to display your network information, including TCP, UDP, ICMP, and IP statistics, etc.
6. Detect the ARP binding (dynamic and static) list, display all connected to my computer, display the other party IP and MAC address
ARP -A
7. On the proxy server
Bundle IP and MAC address, solve the IP of the local area network! : ARP -S 192.168.10.59 00 -50-FF-6C-08-75 Remove the iP and MAC address of the NIC: ARP -D NIC IP
8. Hide your computer in the network neighbor
NET Config Server / Hidden: Yes Net Config Server / Hidden: No is open
9. Several net commands
A. Display the current Workgroup Server List Net View, when you use this command without an option, it displays a list of computers on the current domain or network. For example: view shared resources on this IP, you can c: /> net view 192.168.10.8 at 192.168.10 shared resource resource resource resource shared name Type Types -------------------------------------------------- ---------------------- The website service Disk command successfully completed.
B. View user account list NET User C. View network link NET USE, for example: Net Use z: / 192.168.10.8/Movie maps this IP's MOVIE shared directory to a local Z disk D. Record link NET session, for example : C: /> Net session computer username customer type Open free time --------------------------------- ------------------------------------------- / 192.168.10.110 rome windows 2000 2195 0 00: 03: 12 / 192.168.10.51 Rome Windows 2000 2195 0 00:00:39 Commands successfully.
10. Routing Tracking Command
A.Tracert pop.pcpop.com b.pathping pop.pcpop.com In addition to displaying routing, 325S analysis is provided, and the% loss of lost bag is provided.
11. Several orders about sharing security
A. View your machine's shared resource NET Share B. Manually delete shares (you can make a BAT file, boot your own, delete the sharing!) NET Share C $ / D NET Share D $ / D NET Share IPC $ / D NET Share Admin $ / D pay attention to a space after it. C. Add a share: C: / Net Share mymovie = E: / Downloads / Movie / Users: 1 MyMovie shared success. At the same time, the number of limited link users is 1 person.
12. Set static IP in DOS
A. Set static ip cmd netsh netsh> int interface> IP interface IP> set add "Local Link" Static IP Address Mask Gateway B. View IP Setting Interface IP> show address
ARP Displays and Modify the item in the Address Resolution Protocol (ARP) "cache. The ARP cache contains one or more tables, which are used to store IP addresses and their solutions.
Analytical Ethernet or token ring physical address. Each Ethernet or token ring network adapter installed on a computer has its own separate table. If there is no parameters
Used in case, the ARP command will display the help information.
Syntax ARP [-A [inetaddr] [-n ifceaddr]] [-g [inetaddr] [-n ifceaddr]] [-D inetaddr [ifceaddr]] [-s inetaddr
EtherAddr [ifaceaddr]]]]]]
Parameters -a [inetaddr] [-n ifceaddr] displays the current ARP cache table for all interfaces. To display an ARP cache item that specifies the IP address, use ARP -A with an inetaddr parameter, here
INetaddr represents the specified IP address. To display the ARP cache table for the specified interface, use the -n ifceaddr parameter, what IFACEADDR representative
Assigned to the IP address of the specified interface. -N parameter is case sensitive. -G [inetaddr] [-n ifceaddr] is the same as -A. -D inetaddr [ifceaddr] deletes the specified IP address item, which is the INetAddr represents the IP address. For a specified interface, you want to delete an item in the table, please use iFaceAddr
Parameters, the IFACEAddr represents the IP address assigned to the interface. To delete all items, use an asterisk (*) wildcard instead of inetaddr. -S inetaddr etheraddr [ifceaddr] Add IP address inetaddr to the static item of the physical address EtherAddr to the ARP cache. To add a static ARP cache item to the specified interface, use the ifAceAddr parameter, where the IFACEAddr represents the IP address assigned to the interface. /? Display help at the command prompt. Note The IP address of Inetdr and IFACEADDR is represented by a decimal number of decisions with a dot. Physical address EtherAddr consists of six bytes, which are represented by hexadecimal counting and use a linked character (for example, 00-AA-00-4F-2A-9C
). The items added by the -s parameter belong to a static item, which will not timeout in the ARP cache. These items will be deleted if the TCP / IP protocol is terminated.
To create a permanent static ARP cache item, use the appropriate ARP command in the batch file and run the batch text when starting through the Plan Task Program.
Part. This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To display the ARP cache table of all interfaces, type:
ARP -A
For interfaces that the assigned IP address is 10.0.0.99, you want to display its ARP cache table, you can type:
ARP -A-N 10.0.0.99
To add a static ARP cache item parsing the IP address 10.0.0.80 into a physical address 00-AA-00-4F-2A-9C, you can type:
ARP -S 10.0.0.80 00-AA-00-4F-2A-9C
AT plans to run commands and programs on your computer at the specified time and date. The AT command can only be used when the "Plan" service is running. If there is no parameter
Used, AT lists the scheduled commands.
Grammatical AT [/ computername] [{[ID] [/ delete] / delete [/ yes]}]
AT [[/ computername] hours: minutes [/ interactive] [{/ every: Date "[, ...] / next: Date [, ...]}] Command]
Parameter / Computername Specifies the remote computer. If this parameter is omitted, the AT schemes the commands and programs on the local computer. The ID specifies the identification code assigned to the scheduled command. / Delete cancels the scheduled command. If the ID is omitted, all scheduled commands in the computer will be canceled. / YES Removes all inquiry from the system to "Yes" when deleting the programmed event. Hours: minutes Specifies the time of the command run. This time was used in a 24-hour hour (ie from 00:00 [midnight] to 23:59): minutes format. / Interactive allows Command to interact with the user's desktop for users who log in when running Command. / Every: Run the command command every week or monthly designated date (for example, every Thursday, or the third day of the month). Date Specifies the date of running the command. You can specify a week or day (ie, type M, T, W, TH, F, S, SU) or a certain day or day (ie
Type numbers between 1 and 31). Separate multiple date items with commas. If DATE is omitted, AT uses the current day of the month. / Next: Run Command when the next specified date (for example, next Thursday) comes. Command specifies the Windows command to run, program (.exe or .com file) or batch program (.bat or .cmd file). When the command requires the path as a parameter, use an absolute path, which is the entire path starting from the drive letter. If the command is on a remote computer, specify the general purpose of the server and shared name.
Naming Agreement (UNC) symbol, not a remote drive letter. /? Display help at the command prompt. Note Schtasks is a more powerful super-collection command, which contains all the features in the AT command line tool. For all command line plan tasks
You can use Schtasks to replace AT. For more information on Schtasks, see "Related Topics".
When using the AT command to use the AT command, you must be a member of the local administrators group.