Some small exercises of Shell under Linux
Brief answer
1. Count the number of files under / var/log.
find /var/log/ ! -type d |wc -l
//Or l l - R / var / log / | egrep "^ [SL -] [RWX -] {9}" | WC - L
3. Write a script to judge which ip address is currently online in the 192.168.1.0/24 network, and which ip address can be ping ...
Posted by Moon-Man.net on Fri, 12 Jun 2020 21:16:01 -0700
[C x.net addendum] 04: reflections you have to know
It will take about three minutes to read this article.
In general, reflection is used to dynamically obtain information such as object types, properties, and methods. Today, I'll take you to play with reflection to summarize various common operations of reflection and find out if there's anything you don't know.
Get members of type
The GetM ...
Posted by shalinik on Thu, 11 Jun 2020 01:13:22 -0700
Detailed explanation of linux shell command line options and parameter usage
Detailed explanation of linux shell command line options and parameter usage
In bash, there are three ways to handle command line arguments
- direct processing: use $1, ,...,$n for parsing
- getopts: the case of a single character option (for example: - n 10 -f file.txt Etc.)
- getopt: can handle single character options or long opti ...
Posted by b-ware on Mon, 08 Jun 2020 21:20:15 -0700
Simple command line implementation based on STM32
Simple command line implementation based on STM32
Hi,long time no see. I looked at the atomic usmart and lwip official shell, and found that they all had one thing in common. After identifying the first command, I began to find the callback, and did not count the argc and argv. There are also many peo ...
Posted by warrenk on Sun, 07 Jun 2020 19:42:38 -0700
2019-2020-2 network countermeasure technology 20174326 principle and practice of EXP3 in Danzeng liecuo
2019-2020-2 network countermeasure technology 20174326 principle and practice of EXP3 in Danzeng liecuo
1. Experimental environment
One PC, installed with win10 system, as the target machine for actual measurement
kali virtual machine installed as attack machine
The kali virtual machine is installed with the vector evaluation
...
Posted by stokie-rich on Mon, 01 Jun 2020 05:04:07 -0700
Using Spring Shell to quickly develop your own command interaction window
Spring Shell
Sometimes, in order to facilitate the development and testing of the server, it does not need a beautiful user interface, just use a simple command window. As follows:
Here is a quick, convenient, easy-to-use and simple interactive command window development component Spring Shell
Yes, it's in spring ecology again.
Source address ...
Posted by AlexP on Wed, 27 May 2020 21:09:04 -0700
CentOS? 7.6 install Redis 6.0.1 and enable auto start
background
Alibaba cloud's ECS server just bought is going to set up a website of its own. First install the Redis service.
Download Redis
Download address: https://redis.io/download
Current version of Redis 6.0.1
Upgrade gcc
#Check whether the gcc version is above 5.3. CentOS 7.6 installs 4.8.5 by default
[root@liukai-ecs-01 system]# gcc -v
# ...
Posted by blueguitar on Thu, 14 May 2020 07:56:20 -0700
Groovy learning -- running groovy script embedded in JAVA
Recently, a data statistics system has been designed. There are hundreds of data statistics dimensions in the system, and the indicators of these data statistics may be adjusted at any time. If the API design of data statistics is implemented one by one based on Java coding, the workload is large and the maintenance cost is high. Finally, it is ...
Posted by djroki on Wed, 13 May 2020 02:16:26 -0700
2020 WANGDING cup Re WP
Test file: https://lanzous.com/b07rlg5gd
Misc
Sign in
After answering the question and entering token, it is visible in the console.
flag{32c7c08cc310048a8605c5e2caba3e99}
crypto
boom
First MD5 decryption
46e5efe6165a5afb361217446a2dbd01 to get en5oy
Then solve the equations: x=74,y=68,z=31
Solving ...
Posted by Axariel on Tue, 12 May 2020 17:56:00 -0700
Detailed Tests Test for Automated Operations and Maintenance Tool Ansible
Ansible Tests Details and Use Cases
Host Planning
Add user account
Explain:
1. Login accounts used by operations and maintenance personnel;
2. All businesses are placed under / app / in the "home directory of yun users" to avoid the disorder of business data;
3. This user is also used by ansible because almost all production en ...
Posted by cjdesign on Thu, 07 May 2020 09:49:48 -0700