scp [email protected]:/opt/mpp/projects/ /opt/misserver
rpm -qa|grep #check rpm installation
rpm -e
ssh -s [email protected] -p 22 netconf #ssh connection to netconf
ls -lR|grep "205.29"|wc -l #count the number of files
find ./ -type f -name "*.*" | xargs grep "symm" #find files by content in ./ drectory
request snmp spoof-trap jnxFruRemoval variable-bindings "jnxFruName=PIC:1x10GE(LAN/WAN)@2/0/0" ###spoof trap in juniper device
keytool -import -alias cacerts -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -file "%JAVA_HOME%\jre\lib\security\maven.cer" -trustcacerts ##import certificate for jvm
netstat -tlnp|grep ##to see what process is using this port
tracert 10.9.186.184 #in NT
Pinging 10.0.44.42 with 32 bytes of data:
Reply from 10.0.44.42: bytes=32 time=33ms TTL=251
操作系统 TTL(Time To Live) LINUX 64 WIN2K/NT 128 WINDOWS系列 32 UNIX系列 255, 每过一个路由至少-1
Useful command line
猜你喜欢
转载自woshizn.iteye.com/blog/1050180
今日推荐
周排行