Linux perintah lipat
Linux perintah lipat digunakan untuk membatasi lebar berkas kolom.
lipat instruksi membaca isi dari file yang ditentukan akan lebih dari lebar kolom setelah kolom menambahkan karakter tambahan ke perangkat output standar. Jika tidak menentukan apapun nama file atau nama file yang diberikan oleh "-", kemudian lipat instruksi membaca data dari perangkat input standar.
tatabahasa
fold [-bs][-w<每列行数>][--help][--version][文件...]
parameter:
- -b atau --bytes lebar kolom Byte untuk unit, daripada penggunaan nomor baris unit.
- -s atau karakter ruang sebagai --spaces Breaks poin.
- w <jumlah baris per kolom> atau --width <jumlah baris per kolom> Set jumlah maksimum baris per kolom.
- help bantuan online.
- version informasi versi layar.
contoh
Baris file bernama testfile dilipat menjadi lebar 30, gunakan perintah berikut:
fold -w 30 testfile
Sebagai perbandingan, file output testfile pertama adalah sebagai berikut:
$ cat testfile #查看testfile 中的内容 Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security of the entire network needs to be considered rather than just isolated machines. It uses a mix of theory and practical techniques to teach administrators how to install and use security applications, as well as how the applications work and why they are necessary.
Kemudian gunakan lipat perintah display lipat:
$ fold -w 30 testfile #行折叠成宽度为30,显示testfile 文件 Linux networks are becoming mo re and more common, but securi ty is often an overlooked issu e. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networ ked environment, where the sec urity of the entire network ne eds to be considered rather th an just isolated machines. It uses a mix of theory and pract ical techniques to teach admin istrators how to install and u se security applications, as w ell as how the applications wo rk and why they are necessary