Useful command line

scp [email protected]:/opt/mpp/projects/ /opt/misserver

rpm -qa|grep     #check rpm installation
rpm -e

ssh -s [email protected] -p 22 netconf #ssh connection to netconf

ls   -lR|grep   "205.29"|wc   -l #count the number of files

find ./ -type f -name "*.*" | xargs grep "symm" #find files by content in ./ drectory

request snmp spoof-trap jnxFruRemoval variable-bindings "jnxFruName=PIC:1x10GE(LAN/WAN)@2/0/0"  ###spoof trap in juniper device

keytool -import -alias cacerts -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -file "%JAVA_HOME%\jre\lib\security\maven.cer" -trustcacerts ##import certificate for jvm

netstat -tlnp|grep   ##to see what process is using this port

tracert 10.9.186.184 #in NT

Pinging 10.0.44.42 with 32 bytes of data:
Reply from 10.0.44.42: bytes=32 time=33ms TTL=251
操作系统 TTL(Time To Live) LINUX 64 WIN2K/NT 128 WINDOWS系列 32 UNIX系列 255, 每过一个路由至少-1

猜你喜欢

转载自woshizn.iteye.com/blog/1050180