Many of the most common commands in Linux must be mastered, and here I share some of the basic commands I learned when I started Linux, hoping to help you.
This is I will be the book on the bird in the collation, I hope not to involve copyright
Solemn statement: Without my permission, not for commercial or non-commercial reprint and use, if necessary, please contact: yrj1978@hotmail.comIntroductionWhy do you write this note:1, the Chinese version of the book translation is too rubbish to
Vmstat is a very useful Linux system monitoring tool that uses the Vmstat command to get information about processes, memory, memory paging, blocking IO, traps, and CPU activity.
First, the preface
It is clear from the name that we can see that
2>&1 use
A related knowledge
1 By default, the standard input is the keyboard, but it can also come from a file or pipe (pipe |).
2) By default, the standard output is a terminal (terminal), but can also be redirected to a file, pipe or post
Network Literature Reference Method one:
"U disk installation redhat Enterprise Linux Server 5.1" written in 2009-03-17 14:53
With the help of UNetbootin, you can quickly make your u disk into a similar startup disk function.
First download
1, the Linux system just installed, switch not to root permissions, this is because there is no reason to create the password. Input command: sudo passwd, follow the prompts to set the UNIX password. This is the password when you switch to root.
First of all to say what is archiving and archiving, everyone under windows are ARJ WINZIP or RAR, such as software to package the software process compression, the same Linux inside also have similar software their suffix name is *.tar
1. Enter the red Hat Linux as 5 system installed under the VirtualBox, click "Install Enhancements" under the "Device" menu to see Vboxadditions_3.1.6_59338.iso in the CD-ROM of the Linux system
2. Go to CD and execute installation
Original source: http://www.dnwx.cn/system/wz877.asp
Because of its "free" and "open" features, Linux has spawned hundreds of different distributions. The so-called distribution, is in the Linux kernel packaging some software, such as our common
The following instructions are reproduced directly in the Frankie author.
How to run Frankie Linux LiveCD from the hard drive
1. All content on the disc is copied to a FAT32 partition [e.g. D:/frankie, note file name must be less than 8 letters in
1 Explanation of virtual memory:
The core concept of virtual memory is that the memory address used by the code is not related to the physical address.In user space, the virtual address a of a process points to different physical memory, not to the
TFTP is the simplest network protocol used to download remote files, which is based on the UDP protocol. The TFTP development environment of embedded Linux includes two aspects: one is the Tftp-server support of embedded Linux host and the other is
See how much the FTP default port is
Sometimes we need to look at the default port for a service, it's good to do under Linux, no need to search the Internet, the direct view of the "/etc/server" file can meet the demand. There is a mapping
# ID # Displays the ID of the current user and user group
# who shows user information for the current login system
#su change user identity
[root@localhost/] #su chenlly
[chenlly@localhost/]
#cat/ETC/PASSWD Archives
one of the implementations of Linux multi-timer
Time management is the main task of computer system. In time management, often use the timer to deal with things: such as the use of the TCP Protocol Timer management packet timeout, video display in
实验环境[[email protected] ~]#cat /etc/centos-releaseCentOS release 6.10 (Final)[[email protected] ~]#cat /etc/redhat-release CentOS Linux release 7.5.1804 (Core)Linux UsersRoot User: Superuser, with the supremacy of privileges,Normal User: Created by
There are many data backup tools under Linux, the most used is Rsyns (remote synchronization)Synchronizing Remote data like SCPSynchronizing Local data like CP[Email protected]:~# rsync/etc/passwd/tmp/1.txtCopy the/etc/passwd file to/tmp and rename
Use the which command to find the absolute path to the file
This command is more commonly used, such as finding the absolute path of bin, Python, vim, find, and cat[Email protected]:~# which find /usr/bin/Find [email protected]-172-31-8-212:~#
1. Brief introductionAs we all know, the Linux system is a typical multi-user system, different users are in different positions and have different permissions.To protect the security of the system, the Linux system has different permissions for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service