代码搜索:bash

找到约 5,321 项符合「bash」的源代码

代码结果 5,321
www.eeworm.com/read/339483/12231510

sh nested-loop.sh

#!/bin/bash # nested-loop.sh: Nested "for" loops. outer=1 # Set outer loop counter. # Beginning of outer loop. for a in 1 2 3 4 5 do echo "Pass $outer in outer loop." echo "---------
www.eeworm.com/read/339483/12231548

sh ex72.sh

#!/bin/bash # upload.sh # Upload file pair (Filename.lsm, Filename.tar.gz) #+ to incoming directory at Sunsite/UNC (ibiblio.org). # Filename.tar.gz is the tarball itself. # Filename.lsm is the des
www.eeworm.com/read/339483/12231656

sh alias.sh

#!/bin/bash # alias.sh shopt -s expand_aliases # Must set this option, else script will not expand aliases. # First, some fun. alias Jesse_James='echo "\"Alias Jesse James\" was a 1959 comedy starr
www.eeworm.com/read/339483/12231665

sh file-integrity.sh

#!/bin/bash # file-integrity.sh: Checking whether files in a given directory # have been tampered with. E_DIR_NOMATCH=70 E_BAD_DBFILE=71 dbfile=File_record.md5 # Filename for stor
www.eeworm.com/read/339483/12231704

sh ex24.sh

#!/bin/bash # Faxing (must have 'fax' installed). EXPECTED_ARGS=2 E_BADARGS=65 if [ $# -ne $EXPECTED_ARGS ] # Check for proper no. of command line args. then echo "Usage: `basename $0` phone# tex
www.eeworm.com/read/339483/12231707

sh spam-lookup.sh

#!/bin/bash # spam-lookup.sh: Look up abuse contact to report a spammer. # Thanks, Michael Zick. # Check for command-line arg. ARGCOUNT=1 E_WRONGARGS=65 if [ $# -ne "$ARGCOUNT" ] then echo "Usage:
www.eeworm.com/read/339483/12231799

sh badread.sh

#!/bin/bash # badread.sh: # Attempting to use 'echo and 'read' #+ to assign variables non-interactively. a=aaa b=bbb c=ccc echo "one two three" | read a b c # Try to reassign a, b, and c. echo ec
www.eeworm.com/read/339483/12231802

sh fc4upd.sh

#!/bin/bash # fc4upd.sh # Script author: Frank Wang. # Slight stylistic modifications by ABS Guide author. # Used in ABS Guide with permission. # Download Fedora 4 update from mirror site using rs
www.eeworm.com/read/339471/12232755

gdbline

#!/bin/bash # # $Id: gdbline,v 1.1 2004/08/02 16:27:55 corbet Exp $ # # gdbline module image # # Outputs an add-symbol-file line suitable for pasting into gdb to examine # a loaded module. # cd /sys/m
www.eeworm.com/read/337098/12391225

load

#!/bin/bash if [ "$USER" != "root" ]; then echo "You are not root. Please enter root password now!" su root -c "$0 $*" exit fi echo "flushing hd..." sync echo done. if [ "$(lsmod | grep zc030x)" !