activate IP routingHostname show hostname of systemHost www.example.com lookup hostname to resolve name to IP address and viceversa (1)nslookup www.example.com lookup hostname To resolve name to IP address and viceversa (2)IP link Show Show link status of all interfacesMii-tool eth0 Show link status of ' eth0 'Ethtool eth0 Show statistics of the network card ' eth0 'Netstat-tup Show all active network conn
recorded, it is possible to enter the log records directory, file deletion or file modification, it is necessary to upload these files to the Log collection server in a timely manner, preferably a background real-time monitoring process, the directory under the file changes, Directly trigger the synchronization operation, the file timely synchronization to the Log collection server, the network also has all the records in real-time through the log pr
Tags: ICA view CPU--top CPU release ASE BSP 4.01. View Cpu:top2. View current Linux version: Name-aTo view the currently running kernel version: Cat/pro/versionView release information: Cat/etc/issueView all information above: lsb_release-a3. View the system disk under Linux: df-lLinux common Commands (iii) View inform
A. Linux modification profile file changed the wrong way, restore the method in the change, the
problem, in addition to the CD other than the basic command can not be used,
Even VI can not use, the Internet check the next, with export path=/usr/bin:/usr/sbin:/bin:/sbin:/usr/x11r6/bin,
and then you can use the command,Speed with VI to change the profile back, return to normal. shell commands are basical
Send the SIGHUP signal. You can use the following signal.
# kill -HUP pid
Completely kill the process
# kill -9 123456
Kill all processes of a specified user
# Kill-9 $ (ps-ef | grep hnlinux) // Method 1: filter out the hnlinux user process # kill-u hnlinux // method 210. cat command
The cat command is used to connect an archive string and send it to the Basic output (screen or add> fileName to another archive)Permission
administrator-M: Specifies that the group member and-a use almost-R: Remove password-r: Restrict user login group, only members in group can join the group with NEWGRPGpasswdgroupname : If the system has a Peter account, the account itself is not a member of the GroupName group, use NEWGRP need to enter a passwordLet the user temporarily join the group, and then the file group created by Peter will be groupname. So this way you can temporarily let Peter build the textUse other groups instead of
Unzip file-Z DecompressionExample: TAR-ZXVF Japan.tar.gz11. Compress files or directories: Zip, compressed after file name *.zipZip option [-r] [filename after compression] [file or directory]-R: Compressed directory12. Unzip the. zip file: UnzipUnzip [compressed file]13. Compressed files: bzip2, compressed after file name *.bz2BZIP2 option [-K] [file]-K preserves source files after generating compressed files14. Unzip:bunzip2BUNZIP2 option [-K] [compressed file]-K retain original file after de
Help commands for common linux commands and common linux commands
1.TypeThe difference between built-in and external commands
2.BashEnter bash to use help in bash.
3.Help lsLs is an external command, help can only view the bui
Linux notes (6) Help commands and user management commands for common Linux commands(1) man
The man command is used to obtain help information of a command or configuration file. The original English meaning is manual, and the path is/usr/bin/man. Its Syntax format is:
Man [
Linux learning notes (5) file search commands for common Linux commands and Common commands for learning notes(1) find
The find command is used for file search. Its path is/bin/find. Its Syntax format is:
Find [search range] [matching condition]
1)-name: search by file name,
Help for Umask:[Email protected] ~]# help Umaskumask:umask [-P] [-S] [mode] file mode mask.Note:help can also be used to view assistance for Shell programming if, case, while, and so on .(6) UseraddThe useradd command is used to add a new user , where the path is/usr/sbin/useradd, with the syntax format:useradd [user Name](7) passwdThe passwd command is used to set the user password , where the path is/USR/BIN/PASSWD, in the syntax format:passwd [user Name]Note: Passwords must conform to th
Linux commands-linux File and permission management commands-linux permission management
1. ubuntu tips:
In ubuntu, you can press ctrl + alt + t to open the terminal, and press ctrl + shift + t to open the second terminal.
Adjust the font in ubuntu terminal
Font increase: ct
(1) linux beginners: linux concepts and Common commands, common linux commandsLinux introduction:
Linux is a free, free, and open source operating system. It is also the most famous example of open-source software. Its main purpose is to establish a Unix-like compatible prod
Common commands for Linux enterprises and Common commands for linux Enterprises
Common Linux Enterprise commands
Command
Function Description
Online query and help command
Authoritative guide to Common commands in Linux and Common commands in linux
1 online query and help commands (2)1. manman [Option] [command]: View Command help, command dictionary, more complex info, but not commonly used. # Man cd-A: displays
Detailed explanation of ln commands in linux commands (creating soft links and hard links) and ln commands
Ln is another important command in linux. Its function is to create a synchronous link for a file in another location, which can be soft link or hard link. Soft links a
Learn about basic Linux commands: df commands and du commands-general Linux technology-Linux technology and application information. For more information, see the following. Df command
This interface is used to view the status in
understand the single-user multi-tasking and multi-user multi-tasking concept;1, Linux Single-user multi-tasking;Single user multitasking; For example, when we log into the system with Beinan, I want to open gedit to write the document, but in the process of writing the document, I feel less music, so open the Xmms to some music, of course, listen to some music, MSN still have to open, want to know what a few brothers are doing now, Like this, I am u
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.