The vi editor is a standard editor for all Unix and Linux systems. It is not inferior to any of the latest text editors. Here we just briefly introduce its usage and a few instructions. The vi editor is identical for any version of Unix and Linux systems, so you can learn more about it in any other section about vi. Vi is also the most basic text editor in Linux.
breaks, Windows newline character ^m$WC/ETC/PASSWD the number of rows, words, and characters of a statistic fileWc-l/etc/passwd Statistics file amount of rowsWc-w/etc/passwd Statistics file number of wordsWc-c number of characters in/etc/passwd statistics fileHead-n/etc/passwd Display the first n rows of a file (10 rows by default)Tail-n/etc/passwd Display the following n rows of the file (10 rows by default)more | Less is the content of a split-screen display fileMore Install.log percent displ
remote host rsh f01n03 date ftp transferring files between the local host and the remote host FTP ftp.sp.net.edu.cnNBSP;RCP copying files between the local host and the remote host RCP file1 host1:file2ping sends a response request to a network host ping hpc.sp.net.edu.cn Mail read and send e-mail mailwrite send a message to another user write username PTS/1NBSP;MESG allow or deny receive messages MESG Nkorn Shell commands Command name function Desc
-wu8ircyhwtvo/tmp/ssh-wu8ircyhwtvo/agent.3016/tmp/systemd-private-pkqdal/tmp/systemd-private-pkqdal/tmp/tmp/file2.....F. Search by given file type (-type)Find/-type f/matching file type is normal fileFind/-type d/matching file type is directoryFind/-type L/matching file type is soft connection "-links+n represents a file with a specific hard link, +n represents a file with a hard link number greater than n, and-n indicates a file with a hard-link number less than n"Find/-type b/matching file typ
level)1: Single-user mode2: Multi-user, no NFS (this level is the same as 3 if you do not configure the network)3: Full multi-user mode4: Do not use5: Graphics mode6: Restart (do not set to start the default level)5. The system's login processBIOS boot boot phase: Mount the boot manager from the MBR and run the boot-boot management.Grub as an example starts the boot phase: reads the/boot/grub.conf file and displays the boot menuKernel Stage: Mount the root file systemSys V init initialization p
Basic commands for memcached (installation, uninstall, startup, configuration-related)
-P Listening PortThe IP address of the-l connection, the default is native-D Start memcached service-D Restart Restart memcached service-D Stop|shutdown shut down the running memcached service-D Install installation memcached service-d Uninstall Uninstall memcached service-U Run as (only valid when run as root)-m maxim
Tags: file information data DDD different break tracking define CAL ORM GDB Basic CommandsThis article describes common commands for using the GDB debugger.Main content:IntroductionFor exampleOther Introduction=============GDB is a powerful UNIX program debugging tool released by the GNU Open source organization. If you are doing software under the
The XWindow was so miserable today that we finally returned to the ftp command line (including basic FTP commands)-Linux Enterprise Application-Linux server application information. Here is the details. I want to compile the kernel today. My FC9 cannot go to the Internet. When the new kernel is on XP, the kernel is uploaded to FTP (the lab belongs to the Intranet, you want to download it from FTP to FC. Wel
First, Linux basic commands and how to get helpFormat of the 1.Linux commandCommand + options = parameterA) command: Tell the Linux (UNIX) operating system what to do (execute).b) Option: Describes how the command runs (you can change the function of the command). The options section starts with a "-" character.c) Parameters: Describes what the command affects (a
output.txt This is here doc. Only used to display. The third line.Explanation: "EOF" is just an identification symbol, no special meaning, replaced by the other line.5. With the pipe symbol "|" Compatible with the combination of use(1) First look at an example [emailprotected]:~# passwd Enter new UNIX password: 123456789 // 实际操作中输入密码是不显示的 Retype new UNIX password: 123456789 passwd: password
adding \ Escaping is an error:itcast$ Touch \-hellotouch:invalid Option-- htry ' touch--help ' for more information. Because the various UNIX commands take the command line arguments that begin with the-number as an option for the command, not as a file name. If you do not want to process a file name that begins with a-number, there are two ways to do this:itcast$ Touch./-helloOritcast$ Touch---Hello\ Ther
Linux Security Basics: shell and some basic commands, linuxshell
1. What is shell?Shell is the interface between the user and the Linux operating system.There are multiple shells in Linux, where Bash is used by default.
2. shell Classification(1) bashBash shell is a free version of Bourne shell. It is the earliest Unix shell, including many additional features. B
Linux companies commonly used basic commands must be knownThe basic commands are divided into six parts, which are commonly used in some companies to summarize the following commands:Installation and Logon commands:Login, shutdown, halt, reboot, install, mount, Umount, Chsh, exit, last;File processing commands:File, mk
Unix Command, but an OSX software, remember to run the modified or added driver once.
Text editingNano file nameFor example, edit natit info. plist nano/system/library/extensions/natit. kext/info. after plist editing is complete, use Ctrl + O to save the disk. CTRL + X to exit from another text editing software VI, which is a little odd and easy to use, and in all UNIX-like systems, it is not afraid to go
Under Linux, the PS command is one of the most basic commands for viewing processes running on a system. It provides the current process at the same time, such as user id,cpu usage, memory usage, command name, and so on, it does not display real-time data, such as the top or htop command details. However, even if the functionality and output is simple, but it is still a required process management/monitorin
whose property is rwxr-XR-X will be searched.
-Perm-mode: searches for files whose attributes contain all modes. For example, search-Perm-755. The file whose property is rwxrwxrwx (777) will also be searched.
-Perm + mode: searches for files whose attributes contain any mode. For example, search-Perm + 755. The file whose property is rwx ------ (700) will also be searched.
2. Additional operations.
After the find Command finds out files, it is often necessary to process these files, such as
example: Cd/var/log; Windows is CD c:\windows6, Linux support multi-user login at the same time: Windows is based on DOS operating system, DOS itself is a single user login operating system.7. Linux does not use drive letters: In Windows, the drive letter is used to indicate the driver. All files within Linux are represented by a uniform hierarchy.Iii. several directories commonly used by Linux1./--backslash indicates root directory2./bin--contains user com
Query file type and file Location command)FileRole: View the file type (the file type under Linux does not differentiate after the prefix name)Syntax: file [options] filename=================================================================================[[emailprotected] ~]#file/etc/passwd/etc/passwd:asciitext #文本文档 [[emailprotected]~]#file/etc/etc: directory #目录文档 [[emailprotected]~]#file/bin/ls #二进制文件/bin/ls:elf32-bitlsbexecutable, intel80386,version1 (SYSV),dynamicallylinked (usesshared L
effective, the CP command needs to be preceded by "\", i.e.: # \CP source_file destination_file13.mv:mv-move (rename) filesFormat: MV [OPTION] ... [-T] SOURCE DEST: Single source MobileMV [OPTION] ... SOURCE ... DIRECTORY: Multi-source mobileCommon options:-F,--force: Move the file and force overwrite the file with the same name in the target location;-N,--no-clobber: When moving a file, the source file does not move if it has the same name as the file in the target location;This article from "
Introduced:NFS is the abbreviation for the network file system, which is the web filesystem. A contract for the decentralized file system, developed by Sun, was announced in 1984. The function is to enable different machines, different operating systems to share individual data with each other, so that the application can access the data on the server disk through the network, and it is a way to implement disk file sharing among Unix-like systems.The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.