under the use of Linux/unix, often use the text interface to set up the system or operating system, the author himself in the process of work is also constantly in touch with this command, so for This special brewing, preparation, began the writing of this article.This paper mainly records some of their usual linux/unix under the operation of commands, record an
Functions of Unix/Linuxsync commands
Write cache command -- sync
After the unix system is started with the reboot command, the system prompts an error message, and some applications cannot work normally. After carefully checking the system files and comparing them with the initial correct backup, we found that some files were indeed damaged and we could not fin
between files and devices
File: Determine the type of a document
Stat: View file status
TAC: Output The file contents from the last line, and the cat output is the opposite
Shuf: Random selection of data on a file by row
Comm: Compare an ordered file by row
HD and BVI: Output or edit binary files
Strings: Viewing the contents of a binary file
TR: Character translation or manipulation of characters
Iconv or Uconv: converting encoded strings
Split and Csplit: Partitioning file
3. Accumulated Linux/UNIX operation commands (gzip, jar, tar, find, crontab) and gzipcrontab
In Linux/UNIX, users often use text interfaces to set up systems or operating systems. The author is constantly working on these commands, therefore, this article has been specially developed, prepared, and started. This articl
Sublime selecting tags and their contentsCtrl+shift+a Continuous Press two timesGit undo AddResets the specified file for staging area, consistent with the last commit, but the workspace remains the samegit reset [file]Undo CommitResets the specified file for staging area, consistent with the last commit, but the workspace remains the samegit reset [file]Reset staging area to workspace, consistent with last commitgit reset--hardView git historygit logExit Press the Q keyNpm-saveAnd save-dev can
Summary of Common Unix commands...
Special key combinations:
CTRL + H delete a character from the command line.
CTRL + u delete a row from the command line.
Press Ctrl + D to exit the command and tell the shell that the input is complete.
Ls
Ls-l lists the file information in the directory in detail, sorted by file name.
Ls-T lists the file information in the directory, sorted by the modification date.
Ls-L
FreeBSD is an important branch of UNIX systems, and its commands are mostly common to Linux, and few of them are unique.
1:man online query man ls2:ls Viewing directories and Archives Ls-la3:ln creating a linked file ln-fs/usr/local/apache/etc/httpd.conf/etc/httpd.conf4:more page show more file names5:CD Switch Directory Cd/usr/local/apache6:mkdir creating a new directory Mkdir/usr/temp7:rmdir Deleting
Htop: improved version of top
Last: logon history
W: Current Login User
ID: view User/group representation Information
SAR: Tools for viewing historical system statistics
Iftop or nethogs: view the network utilization of the socket or process
SS: View statistics
Dmesg: startup or system error message
(Linux) hdparm: displays or sets disk parameters.
(Linux) lsb_release: view the release version of the Linux System
(Linux) lshw: View hardware information
Fortune, ddate, and SL: It de
Grep command series: How to Use grep commands in Linux/UNIX
How can I use the grep command in Linux, Apple OS X, and other UNIX-like systems? Can you give me some simple examples?
The grep command is used to search for text, or to search for a file containing a given string or word in a row from a given file. In general, grep displays the matched rows. Use grep t
Today, let's learn about Common Unix shell commands. We all know that Unix shell is not only a user interaction interface, but alsoProgramDesign Language: when the system registers, it will execute a Unix shell command file. profile, which will give a brief introduction to Common c
all connections on an application that supports SOCKET proxy to a remote machine. This is useful for more secure use of public wifi to browse networks and bypass strict firewalls.
5. Enter the password on the local machine once, and then use the ssh key proxy to log on to other remote machines with a security identity without entering your password again.
For more information, see the ssh manual page.
5. mdfind
The unique commands on this mac, of co
Label: Ar strong SP Div on amp BS res File
Collect the decompressed commands here and check them now. Haha
. Tar
Unpack: Tar xvf filename.tarPackage: Tar CVF filename.tar dirname(Note: tar is packed, not compressed !)---------------------------------------------. GZDecompress 1: gunzip filename.gzDecompress 2: gzip-D filename.gzCompression: gzip filename.Tar.gzDecompress: Tar zxvf filename.tar.gzCompression: Tar zcvf filename.tar.gz dirname-----------
After installing the mobile terminal found ping command, the route and other commands can not be used, prompt command not found.Workaround: Install the support packageShell-cmds Package: Contains Killall,mktemp, Renice, Time,which commandNetwork-cmds Package: Contains Arp,ipconfig,netstat,route,traceroute commandInetutils Package: Contains FTP,INETD,PING,RLOGIN,TELNET,TFTP commandAdv-cmds Package: Contains FINGER,FINGERD,LAST,LSVFS,MD,PS commandMobile
(with?) to continue looking until you find it.For the first use VI, there are a few notes to remind:1. When you open a file with VI, you are in command mode, and you want to switch to insert mode to enter text. Toggle method: Click on the letter "i" "Command mode" to enter "Insert Mode", then you can start to enter the text.2, after editing, you need to switch from insert mode to command line mode in order to save the file, switch method: Press the "esc" key.3. Save and exit the file: Enter in
Unix has been used for some time. However, I still ignore some commands. I hope I can find these commands several years ago. LearningUNIX Process CommunicationTutorial.
1. Man ASCII
This command prints the ASCII code table of octal, hexadecimal, and decimal. I couldn't believe that I knew the command a month ago. I always use Google to query ASCII code tables. Th
Commands for interchange of date, time, and Unix timestamps in Linux Command lines
At work, you often need to get the current Unix timestamp or convert the given timestamp to a date format that we can recognize, on the linux Command Line terminal, you can easily solve the problem by using several commands.
1. convert a
experiment 3:unix/linux permissions and file management commands
1. Experimental purposes
Unix/linux permissions and file management commands;
The use of Unix/linux file system;
Other commands related to file system administrati
In Unix/Linux applications, we generally want to run a program in the background, so we usually use at the end of the program to make the program run automatically. For example, we want to run mysql in the background:/usr/local/mysql/bin/mysqld_safe-user = mysql . However, many programs do not want to use mysqld, so we need the nohup command. How can we use the nohup command? Here we will explain some usage of the nohup command.
Nohup/root/start. sh
I am recently working on an iPhone text message upload and download project. After the text message is downloaded, I need to restart the SMS app to view the downloaded text message.
However, in reality, it is impossible for users to restart the sms app, and all of them can only achieve the same effect in the code.
Use unix commands to end the text message process. When the user returns to the text message
[Syntax]: mkdir [-M mode] [-p] Directory name[Note]: This command is used to establish the directory, the access mode of the directory is determined by the mask (umask), requires write permission to its parent directory, the UID and GID of the directory for the actual UID and GID-M Create directory in specified access mode-P establishes all of its nonexistent parent directories when the directory is created[Example]:mkdir tmp creating subdirectories in current directory TMPMkdir-m 777/TMP/ABC wi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.