commands
1. display the current absolute path and run the following command:
Pwd
2. Change the current directory. For example, run the following command:
Cd/etc/yum
The current directory will be changed to/etc/yum.
3. Return to the parent directory of the current directory and execute the following command:
Cd ..
4. Create a directory. For example, run the following command:
Mkdir/usr/tigger
5. Delete the directory. For example, run the following com
parameters (only applicable to IDE devices)
# Dmesg | grep IDE # view the IDE device detection status at startup
Network
# Ifconfig # view the attributes of all network interfaces
# Iptables-L # View firewall settings
# Route-n # view the route table
# Netstat-lntp # View all listening ports
# Netstat-antp # View all established connections
# Netstat-s # View n
The following describes the basic Linux Command df and the du command parameters in linux. I hope this will be helpful for your learning. Df command parameters in linux: the df command parameters in linux are used to view the status information of the Linux File System and d
understand the single-user multi-tasking and multi-user multi-tasking concept;1, Linux Single-user multi-tasking;Single user multitasking; For example, when we log into the system with Beinan, I want to open gedit to write the document, but in the process of writing the document, I feel less music, so open the Xmms to some music, of course, listen to some music, MSN still have to open, want to know what a few brothers are doing now, Like this, I am u
The following 13 commands are the most common file processing commands in Linux.
The following 13 commands are the most common file processing commands in Linux.
1) Linux file processin
=" Image025.png "alt=" Wkiom1l5qzqb2ck-aae02uch_4u103.png "/>(3)hash-d nameDeleteHashNow we will delete the cached pwd in the hash , and the name we need to enter when we delete It is the alias we found with hash-l . 650) this.width=650; "src=" Https://s3.51cto.com/wyfs02/M01/9D/14/wKioL1l5qzuBYp6QAAC5QHVv0zU321.png "style=" float : none; "title=" Image026.png "alt=" Wkiol1l5qzubyp6qaac5qhvv0zu321.png "/>you can see that the PWD is not in the list . then we look at the type of PWD and find that
Reprinted from 70312034(1) Input command(2) execution effect (because it has been updated so that all packages are up-to-date, otherwise the number of packages that need to be updated is displayed)(3) Input command(4) Performance: None (due to the update, the command line during execution to ask whether to download y/n, enter Y to confirm the download, the system will download the package and configuration, waiting time depending on the need to instal
if the compressed file is a very large case.Tar command-Function Description: File package and unpacking.-Command format: tar [parameters] -Common parameters:-F Name: Use name to specify the archive file name or device name.-V: Lists processing details.-C: Used to create a new archive file.-X: Restore the backup file from the archive file.-T: Used to list the file names in an archive file.-Z: Compress files or unzip with GNU Gzip.-Z: Compress files or unzip with compress.-j: Compress files or u
During the learning process of the Linux system, you will know a lot of commands. Remembering these commands will greatly improve your understanding of the Linux system. You may see the grep command. Here we will introduce the knowledge of the grep command.
1. RoleIn Linux,
We all know: The reading of files in the computermemory > Cache > HDDThe alias in Linux is to simplify the input of certain commands, and in the terminal inputaliasCan query the system exists alias, the user can also customize the alias, specifically:Alias aliases = ' Command '[[emailprotected] ~]# alias hist=‘history‘[[emailprotected] ~]# hist 1 alias hist=‘
1. display file information ls list-L long to View Details-D. view directory properties.-A all: view all files, including hidden files.Drwxr-XR-x 2 root Root 4096 Jul 4 12:582 indicates the size of the group file to which the number of hard links belongs. It is not the exact creation time or last modification time.A data block contains 512 bytes. The file system is the smallest unit for data storage.The sma
of timestamps for-gnu/linux files:Mtime: Last Modification Time (LS–LT)CTime: State Change Time (LS–LC)Atime: Last Access Time (LS–LU)Attention:1. CTime is not a file creation time.2. Overwriting a file will change all three classes of time: Mtime, CTime, and Atime.3. Changing the access rights or the owner of the file will change the CTime and atime of the file.4. Reading a file will change the atime of t
In linux, ifconfig, shutdown, and other commands cannot use the _ enable Shell command Java code. why cannot I use the ifconfig command in RedHatLinux5? after installing RedHatLinux5, I use some commands on the terminal, such: ifcinfig view local machine...
In linux, commands
Differences between linux su and sudo commands: linuxsusudo commandsI. Use the su command to temporarily switch user identities1. Conditions and power of su
The su command is a tool for switching users. How can this problem be solved? For example, if we log on as a normal user beinan, but want to add a user task and execute useradd, The beinan user does not have this permission, and this permission is exact
Linux screen commands and screen commands
I. background
The system administrator often needs to remotely log on to the Linux server through SSH or telent, and often runs tasks that take a long time to complete, such as system backup and ftp transmission. Generally, we open a remote terminal window for each of these tas
Permission management command:
1. chmod [changethe permissions mode of a file]:/bin/chmod
Syntax: chmod [{ugo} {+-=}{ rwx}] [file or directory name] // intuitive
E.g. chmodu + wx filename
Chmodo-x filename
Chmodg = rwx filename
Or: chmod [mode = 421] [file or directory] // recommended
Number of the permission pair:
R-4
W-2
X-1
E. g. rwxr-xr -- 754
Rw-r-x -- x 651.
752rwxr-x-w-
Chmod777 dir1 // set the directory dir1 to have all permissions for
Tags: Specify make unzip should parameter nbsp Create automatic and[BZIP2]Bzip2 Compress the file into bz2 format and delete the original file.Suitable for large file compression-D Extract-Specifies the compression ratio. -KKeep the original fileRelated Commands bunzip2[BUNZIP2]BUNZIP2 Decompression *.bz2Related Commands bzip2[Bzcat]Bzcat View bz2 's File contentsRelated
We can use the Find command on Linux or Unix systems to query all (all) hidden filesSyntax: recursively find and List all (all) hidden files on Linux/unixThe basic syntax is as follows:[Root@dabu.info ~] #find/The text/pieces/clip
In Linux, the grep command is a powerful text search tool that uses regular expressions to search for text and print matching lines.
In Linux, the grep command is a powerful text search tool that uses regular expressions to search for text and print matching lines. Grep stands for Global Regular Expression Print, which indicates the Global Regular Expression version. its permission is granted to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.