<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>grep &#8211; moneyslow.com</title>
	<atom:link href="https://moneyslow.com/tag/grep/feed" rel="self" type="application/rss+xml" />
	<link>https://moneyslow.com</link>
	<description>making money with technology</description>
	<lastBuildDate>Sat, 09 Nov 2024 04:03:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>
	<item>
		<title>grep出现报错binary file matches</title>
		<link>https://moneyslow.com/grep%e5%87%ba%e7%8e%b0%e6%8a%a5%e9%94%99binary-file-matches.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Thu, 08 Aug 2024 00:36:32 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[grep]]></category>
		<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=18822</guid>

					<description><![CDATA[grep出现错误]]></description>
		
		
		
			</item>
		<item>
		<title>利用grep和prce2grep的正则方法来处理截取html源代码文件内容</title>
		<link>https://moneyslow.com/%e5%88%a9%e7%94%a8grep%e5%92%8cprce2grep%e7%9a%84%e6%ad%a3%e5%88%99%e6%96%b9%e6%b3%95%e6%9d%a5%e5%a4%84%e7%90%86%e6%88%aa%e5%8f%96html%e6%ba%90%e4%bb%a3%e7%a0%81%e6%96%87%e4%bb%b6%e5%86%85%e5%ae%b9.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Thu, 30 Mar 2023 11:39:19 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[awk]]></category>
		<category><![CDATA[grep]]></category>
		<category><![CDATA[html]]></category>
		<category><![CDATA[prce2grep]]></category>
		<category><![CDATA[shell]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=16102</guid>

					<description><![CDATA[shell截取html源代码标签]]></description>
		
		
		
			</item>
		<item>
		<title>grep出多个条件的行</title>
		<link>https://moneyslow.com/grep%e5%87%ba%e5%a4%9a%e4%b8%aa%e6%9d%a1%e4%bb%b6%e7%9a%84%e8%a1%8c.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Tue, 27 Aug 2019 02:47:48 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[find]]></category>
		<category><![CDATA[grep]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[正则]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=9088</guid>

					<description><![CDATA[例子： 找出ok：开头，并且包含$1的行。 再次grep包含$1的行，包括其前一行，打印出来，带颜色 egrep -E "^ok:&#124;$1" *.psef&#124;grep -B 1 $1 --color 放到一个sh文件里，比如寻找xxx，执行： ./youscript xxx]]></description>
		
		
		
			</item>
		<item>
		<title>grep与正则表达式基础</title>
		<link>https://moneyslow.com/grep%e4%b8%8e%e6%ad%a3%e5%88%99%e8%a1%a8%e8%be%be%e5%bc%8f%e5%9f%ba%e7%a1%80.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Thu, 25 Apr 2019 07:25:16 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[centos]]></category>
		<category><![CDATA[grep]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[regex]]></category>
		<category><![CDATA[正则]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=8621</guid>

					<description><![CDATA[1 命令：grep2 格式：grep [option] "pattern" filename3 选项：4 -v：反向选择5 -i：忽略大小写6 -n：显示行号7 -c：统计行数8 -o：仅显示匹配到的字符串9 -w：匹配整个单词10 -q：不输出任何信息11 -A 2：after 显示后2行12 -B 3：before 显示前3行13 -C 3:context 前后各3行14 -e：实现多个选项间的逻辑关系15 grep -e root -e mail /etc/passwd16 -E：相当于egrep，用于使用拓展的正则表达式17 -F：相当于fgrep，不支持正则表达式复制代码正则表达式（Regular expression）什么是正则表达式Regular expression（正则表达式）是由一类特殊字符及文本字符编写的模式，其中有些字符（元字符）不代表字符的字面意义，而表示控制或通配功能。那些程序支持正则表达式grep，sed，awk，vim，less，nginx，varnish在man中查询我们可以在正则man手册中查找正则的用法man 7 regex正则表达式的分类基本正则表达式扩展的正则表达式元字符的分类字符匹配，匹配次数，位置锚定，分组基础RE(用于grep)字符匹配1 . 匹配任意单个字符2 [] 匹配指定范围内的任意单个字符3 [^] 匹配指定范围外的任意字符匹配次数：用在要指定的次数的字符后面，用于指定前面的字符出现的次数复制代码1 * 匹配前面的字符任意次（包括0次）2 .* 任意长度的任意字符3 \? 匹配前面的字符0次或一次4 \+ 匹配前面的字符至少一次5 \{n\}　　　 匹配前面的字符n次6 \{m,n\} 　　匹配前面的字符至少m次，最多n次7 \{,n\} [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>linux下用netstat和lsof发现恶意进程和链接并匹配grep出公网外网ip地址</title>
		<link>https://moneyslow.com/linux%e5%8f%91%e7%8e%b0%e6%81%b6%e6%84%8f%e8%bf%9b%e7%a8%8b%e5%92%8c%e9%93%be%e6%8e%a5%e5%b9%b6grep%e5%87%ba%e5%85%ac%e7%bd%91ip%e5%9c%b0%e5%9d%80.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Wed, 24 Apr 2019 10:08:59 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[grep]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[lsof]]></category>
		<category><![CDATA[互联网赚钱]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=8608</guid>

					<description><![CDATA[The malicious files are being identified by the two powerful commands given below. 1)Netstat: -The command # netstat –an is used to show the all the current network connections currently in use along with the port numbers. Make sure to execute the command in root privilege. 2)Lsof: lsof is one of the best useful utility [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
