Detailed explanation of linux touch command: 1. Command function: Creation and modification timestamps of files or directories 2. Command syntax: touch [options] [file name or directory name] 3. Command parameters: -a only changes the access time of the file. -c or --no-create does not create non-existent files. -d Use the specified date and time instead of the current time -m means to modify the Modify time instead of the Access time -r file Use the timestamp (access, modify) of the specified file to update the timestamp of the file (access, modify) Note: access indicates the time when the file was last accessed (only accessed, no changes were made) modify indicates the time when the file was last modified change indicates the time when the file attributes were last changed, including permissions, size, attributes, etc. -t changes the time to the date specified by the parameter, such as: 07081556 means 15:56 on July 8 4. Usage examples: Create a non-existent file, such as in the /data directory: Modify the access time of the file, such as modifying the access time of westoslinux in the figure above Modify the modify time of a file, such as modifying the modify time of the /data/westoslinux file Use the specified time to change the access or modify time of a file or directory. For example, to change the access time of the file in the figure above to 2012-07-15 08:30:30, to change the modify timestamp, just change the parameter a to m. The above is the detailed content of the detailed explanation of the Linux touch command. For more information, please pay attention to other related articles on 123WORDPRESS.COM! You may also be interested in:
|
<<: The implementation process of ECharts multi-chart linkage function
>>: MySQL partitioning practice through Navicat
for loop The for loop loops through the elements ...
This article shares the specific code of js to ac...
1. Implement a simple triangle Using the border i...
As a front-end novice, I tinkered with the front-e...
This article mainly introduces the wonderful use ...
console.log( [] == ![] ) // true console.log( {} ...
If the field storing the name uses the GBK charac...
Using UNION Most SQL queries consist of a single ...
1. Packetdrill compilation and installation Sourc...
Table of contents Overview first step Step 2 Why ...
This blog post is about a difficulty encountered ...
hash mode (default) Working principle: Monitor th...
In projects, batch operation statements are often...
Basic concepts: Macvlan working principle: Macvla...
1. ip_hash: ip_hash uses a source address hash al...