代码搜索:bash
找到约 5,321 项符合「bash」的源代码
代码结果 5,321
www.eeworm.com/read/339483/12231510
sh nested-loop.sh
#!/bin/bash
# nested-loop.sh: Nested "for" loops.
outer=1 # Set outer loop counter.
# Beginning of outer loop.
for a in 1 2 3 4 5
do
echo "Pass $outer in outer loop."
echo "---------
www.eeworm.com/read/339483/12231548
sh ex72.sh
#!/bin/bash
# upload.sh
# Upload file pair (Filename.lsm, Filename.tar.gz)
#+ to incoming directory at Sunsite/UNC (ibiblio.org).
# Filename.tar.gz is the tarball itself.
# Filename.lsm is the des
www.eeworm.com/read/339483/12231656
sh alias.sh
#!/bin/bash
# alias.sh
shopt -s expand_aliases
# Must set this option, else script will not expand aliases.
# First, some fun.
alias Jesse_James='echo "\"Alias Jesse James\" was a 1959 comedy starr
www.eeworm.com/read/339483/12231665
sh file-integrity.sh
#!/bin/bash
# file-integrity.sh: Checking whether files in a given directory
# have been tampered with.
E_DIR_NOMATCH=70
E_BAD_DBFILE=71
dbfile=File_record.md5
# Filename for stor
www.eeworm.com/read/339483/12231704
sh ex24.sh
#!/bin/bash
# Faxing (must have 'fax' installed).
EXPECTED_ARGS=2
E_BADARGS=65
if [ $# -ne $EXPECTED_ARGS ]
# Check for proper no. of command line args.
then
echo "Usage: `basename $0` phone# tex
www.eeworm.com/read/339483/12231707
sh spam-lookup.sh
#!/bin/bash
# spam-lookup.sh: Look up abuse contact to report a spammer.
# Thanks, Michael Zick.
# Check for command-line arg.
ARGCOUNT=1
E_WRONGARGS=65
if [ $# -ne "$ARGCOUNT" ]
then
echo "Usage:
www.eeworm.com/read/339483/12231799
sh badread.sh
#!/bin/bash
# badread.sh:
# Attempting to use 'echo and 'read'
#+ to assign variables non-interactively.
a=aaa
b=bbb
c=ccc
echo "one two three" | read a b c
# Try to reassign a, b, and c.
echo
ec
www.eeworm.com/read/339483/12231802
sh fc4upd.sh
#!/bin/bash
# fc4upd.sh
# Script author: Frank Wang.
# Slight stylistic modifications by ABS Guide author.
# Used in ABS Guide with permission.
# Download Fedora 4 update from mirror site using rs
www.eeworm.com/read/339471/12232755
gdbline
#!/bin/bash
#
# $Id: gdbline,v 1.1 2004/08/02 16:27:55 corbet Exp $
#
# gdbline module image
#
# Outputs an add-symbol-file line suitable for pasting into gdb to examine
# a loaded module.
#
cd /sys/m
www.eeworm.com/read/337098/12391225
load
#!/bin/bash
if [ "$USER" != "root" ]; then
echo "You are not root. Please enter root password now!"
su root -c "$0 $*"
exit
fi
echo "flushing hd..."
sync
echo done.
if [ "$(lsmod | grep zc030x)" !