Using shell to realize the function similar to windows recycle bin under linux

When using linux, the rm -rf command is often executed, but this command is risky. For example, execute a shell script, which contains the following statements: # script.sh rm -rf $HOME/$SOME_PATH At this time, if the environment variable HOME is caused by a setting_ If the path is empty, all contents in the HOME directory will be cleared di ...

Posted by shilpa_agarwal on Sun, 27 Feb 2022 05:00:05 +0100

[open and closed principle] of design principle

Python wechat ordering applet course video https://edu.csdn.net/course/detail/36074 Python actual combat quantitative transaction financial management system https://edu.csdn.net/course/detail/35475 The design principle is a summary of some experience guiding our code design, that is, "mental method"; Object oriented is our "w ...

Posted by TecTao on Sun, 27 Feb 2022 04:55:26 +0100

[Ji Li 01 group No. 08] SSM framework integration

Python wechat ordering applet course video https://edu.csdn.net/course/detail/36074 Python actual combat quantitative transaction financial management system https://edu.csdn.net/course/detail/35475 [Ji Li 01 group No. 08] SSM framework integration Database preparation This course uses MySQL database. Start MySQL first: sudo service mysq ...

Posted by desmi on Sun, 27 Feb 2022 04:50:24 +0100

Write a script in python to dynamically delete the QQ space for many years

Seriously, when I wrote this script, I didn't understand the basic syntax of python. I can only say that language is not important, just easy to use... As for why I want to delete QQ dynamics, I just don't want to always see those childish words that were sent that year and today. There are many dynamics (although QQ has not been used in recen ...

Posted by jiayanhuang on Sun, 27 Feb 2022 04:28:23 +0100

es 7.x advanced document analysis

Process of document analysis Divide the document into separate entries suitable for inverted indexingUnify entries into a standard format, such as removing tenses from English When the analyzer executes the above contents, it actually encapsulates the above functions into a package Character filter: pass the string through each character ...

Posted by newbtophp on Sun, 27 Feb 2022 04:15:10 +0100

Section 7 of C + + after the initial stage - polymorphism

Our task in this section is to find out the polymorphism catalogue 1, Concept of polymorphism 2, Override (overwrite) of virtual function: 3, override and final in C++11 Keyword override: Keyword: final Comparison: overload, overwrite (override), hide (redefine) 4, Abstract class concept Interface inheritance and implementation inhe ...

Posted by futurshox on Sun, 27 Feb 2022 04:05:10 +0100

[x86 assembly language: Notes from real mode to protected mode] Chapter 8 access and control of hard disk and graphics card

Objectives of this chapter: Simulate the process of loading applications by the operating system, demonstrate the relocation method of segments, and thoroughly understand the segmented memory management mechanism of 8086 processorLearn the program execution mechanism of x86 processor procedure callUnderstand how x86 processors access periphera ...

Posted by ATS16805 on Sun, 27 Feb 2022 03:56:48 +0100

LRU and LFU algorithms (page replacement algorithm)

Difference between LRU and LFUBoth LRU and LFU are page replacement algorithms for memory management.LRU: Least Recently Used (longest time) elimination algorithm. LRU is the page that has not been used for the longest time.LFU: Least Frequently Used. LFU is the page that has been used the least times in a period of time.exampleSuppose the peri ...

Posted by whatwhat123 on Sun, 27 Feb 2022 03:47:14 +0100

SSH secret free automatic connection

1. GeneralFor the use of Linux operating system, the importance of SSH is self-evident. However, you have to enter a lengthy user name @ host IP every time you log in, and sometimes you forget the user name / host IP. It is also a waste of time to check the records again, so this time we need to configure the SSH login configured to the server ...

Posted by jamesp on Sun, 27 Feb 2022 03:43:13 +0100

[Java object-oriented] String, String Constant Pool, String initialization, intern method, common methods of String (interception)

String Used in Java java.lang.String class represents string: Before Java 9, the bottom layer used char [] to store character data Starting from Java 9, the bottom layer uses byte [] to store character dataAll String literals (such as "abc") are instances of the String classOnce a String object is created, its character content ...

Posted by smsulliva on Sun, 27 Feb 2022 03:30:51 +0100