Gradle this article is enough for 09 - initialization with gradle init

Initialization with gradle init Many tools have the initial function of creating a project skeleton, such as the angular front-end framework. Using its cli, you can quickly create a skeleton containing nearly 30 files, which enables you to quickly build a project. maven can also simplify the creation of pom through command-line interaction, whi ...

Posted on Sun, 05 Apr 2020 20:03:19 -0400 by daniel_grant

shell configures mail alert system

Alert System Main Script Place the shell script under/usr/local/sbin/ Create a mon directory to store alert system scripts.Create bin, conf, log, mail, shares in the / mon directory, respectively Create main script under bin main.sh content #!/bin/bash #Written by aming. # Switch to Send Mail or Not export send=1 ...

Posted on Sun, 05 Apr 2020 18:04:45 -0400 by char skd1

Shell commands curl and wget use agents to collect summary of web pages

Linux Shell provides two very practical commands to crawl web pages, which are curl and wget Mi Pu agency As the basic service of big data analysis and research, it has done in-depth research and summary.   curl and wget use agents curl supports http, https, socks4, socks5 wget supports http and https   Shell curl wget example #!/bin/ba ...

Posted on Sat, 04 Apr 2020 04:34:42 -0400 by shrike202

Java Basic Grammar - Common Sorting Algorithms in Arrays

title: Java Basic Grammar(8)-Common sorting algorithms in arrays blog: CSDN data: Java Learning Routes and Videos 1. Basic concepts Sorting: is an important operation in computer program design. Its function is to rearrange a set or sequence of data elements into a sequence ordered by the value of a data item of a data element. Sort Code ...

Posted on Fri, 03 Apr 2020 10:47:46 -0400 by rune_sm

Fourth week user and document management exercise

Fourth week user and document management exercise Practice: 1. Copying the / etc/skel directory to / home/tuser1 requires that the / home/tuser1 and its internal file's Homegroup and other users do not have any access rights. Method 1: [root@192 \]# cp -r /etc/skel/ /home/tuser1 [root@192 \ ]# chmod -R og= /home ...

Posted on Fri, 03 Apr 2020 00:24:57 -0400 by rammac13

getprop and dumpsys commands

After the Android device is connected to the PC, we can do most of the work through the adb command. Next, use getprop and dumpsys to learn some system related information. 1, getprop The principle of this command is very simple. It is to read information from various configuration files of the system. Then these file ...

Posted on Thu, 02 Apr 2020 22:45:04 -0400 by tinyang

Oracle queries the corresponding SQLID according to the system resource consumption of the process

Description: ps aux The third column of the command result is the CPU utilization of the process The fourth column of the command result is the memory usage of the process These two columns can be used as the basis for high system resource consumption of processes The spid of Oracle dynamic performance view v$proce ...

Posted on Thu, 02 Apr 2020 21:13:42 -0400 by versatilewt

Formatted output of Shell

1. Format output with echo 2. Format output with printf 1. Format output with echo Show escape characters [root@yanta ~]# echo "\"This is a test\"" "This is a test" Read variables and display Use the read command to read a line from standard input and assign the value of each field of the input line t ...

Posted on Thu, 02 Apr 2020 11:06:47 -0400 by drayfuss

linux sh: organize some details

Preface I browsed a material about shell programming. While looking up the data and experimenting, I learned some knowledge that I didn't know before. e.g. *help -m is the local search method of linux command help. If you can't find it with man and info before, you have to go online to search. This solution c ...

Posted on Wed, 01 Apr 2020 12:38:02 -0400 by warriors2003

SSH(paramiko module implementation)

The process of SSH authentication is encrypted, but the communication after authentication is clear. Certification process: Host A sends A piece of ciphertext to host B with public key encryption, and host B decrypts the ciphertext through private key and sends it to host A for verification, and the authentication is successf ...

Posted on Wed, 01 Apr 2020 04:54:03 -0400 by mfindlay