represented as 2So the permission to manipulate this file is represented by a value of 662Change permissionssudo chmod [u belongs to user g belongs to group O Other User a All users] [+ Increase permissions-reduce permissions] [r W x] directory nameFor example: There is a file filename, the permission is "-rw-r----x", the permission value is changed to "-rwxrw-r-x", with a numeric representation of 765sudo chmod u+x g+w o+r filenameThe above example can be represented by a numerical valuesudo c
instructions we use, ls,cd,pwd.The shell translates the instructions we send into a language that the kernel can understand, and then implements the instructions.We interact with the Linux kernel through the shell!The format used for commands in Linux systems is:command [options] [parameters]such as: Ls-a/HomeIndicates that all files are listed in the/home directoryLS stands for command list ' list '-A description command ls, listing all files/Home D
statement.mysql> exitbye[[emailprotected] ~]# mysql-uroot-p-s/tmp/mysql.s Ock//Use sock login, only for local connection, equivalent to "mysql-uroot-p123456" Enter password:welcome to the MySQL monitor. Commands End With; or \g.your MySQL connection ID is 4Server version:5.6.36 mysql Community Server (GPL) Copyright (c), Oracle and /or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or itsaffiliates. N
Vi (Vim) keyboard chart and its basic commands
Vi (Vim) keyboard chart and its basic commands:
Go to vi
Vi filename open or create a file and place the cursor at the beginning of the first line
Vi + n filename open the file and place the cursor at the beginning of line n
Vi + filename open the file and place the curso
I read some documents and summarized some basic Vim commands suitable for programmers. they are not very complete, but at least practical... All are the most basic vim tutorials. open the terminal under fedora. Input vimfilename to enter the vim // basic file. ..
I read some documents and summarized some
There are three types of user accounts: superuser, common user, and program User Group account: UID for the basic group and additional group user account: the root UID is 0, the program user is 1-499, and the general-a: User account File 1. in the passwd file, configure the row format root: x :... there are three types of user accounts: superuser, common user, and program user.
Group accounts include: Basic
and it is very expensive, but Linux is completely free, and the source code is completely open. We can get such a very good operating system with almost no penny, which is really great for users. Linux is based on Unix, so there are many and powerful Linux commands, but it is precisely because of this that many Linux users are blocked, now few people are willing to operate those black and white screen inte
Docker run--volumes-from db1-v/home/backup:/backup ubuntu tar cvf/backup/backup.tar/dbdata
Start a container data volume using the DB1 container's data volume while creating a new data volume pointing to the host directory/home/backup, compressing the/dbdata directory data to/backup/backup.tar
docker run -v /dbdata --name dbdata2 ubuntu /bin/bash
Docker run--volumes-from dbdata2-v/home/backup:/backup busybox tar Xv
server
git remote add origin [email protected] Github.com:robbin/robbin_site.git # Set up the repository address
Git push-u Origin Master # client First Commit
Git push-u origin Develop # First submits the local develop branch to the remote develop branch, and the track
git remote Set-head Origin Master # Set the remote repository head to the master branch
You can also command settings to trace the remote library and the local library C code
Git branch--set-upstream Master
all properties are maintained, equivalent to the-RLPTGOD,-A option followed by a–no-option This means that one of the-rlptgod is closed, for example-a–no-l is equivalent to-rptgod-R subdirectories are processed recursively, primarily for directories, if a single file is not required to add-r, but the transmittedYes directory must be plus-r option-V Print some information, such as rate, number of files, etc.-L reserved Soft link-L treats the soft link as a regular file, and if there is a soft co
,--mount[=-U,--uts[=-I,--ipc[=-N,--net[=-P,--pid[=RM Deletes a container-F,--force=true Force Delete-L,--link=false delete the container's connection, but keep the container-V,--volumes=false delete the container mounted data volumeExport the container, export a container that has been created to a file, regardless of whether the container is in a running state at this time-O,--output= ""# Docker Export 929bf12bc6ea > Centos_6.4_php.tarOther common commandsDocker-h 127.0.0.1:1234-d Modify the s
you can see, Git simply replaces the alias with the corresponding command. However, you might want to execute an external command instead of a GIT subcommand. If that's the case, you can add a symbol to the front of the command ! . It would be useful if you wanted to write some tools for collaborating with Git repositories. We now demonstrate the git visual aliases that will be defined gitk :' !GITK 'There are also aliases, renaming, and so on.Reference: Https://git-scm.com/book/zh/v2/Git-%E5%
,findfind* view command-type (f D)-name "ddd" Search by name-mtime by the modified timeTree view directory StructureXargs is used to give the output of the find/ls to the back processingSEQ Print number sequence echo{1..5}Man view commands and configuration file HelpTouch to create a file or modify the timestamp of a filePWD Displays the current pathVimdiff File Comparison ToolWHOAMI viewing the current command line end userSu Switch User role, note t
basic commands for viewing network performance in a Linux environment because Linux often uses a character interface, and Linux is more powerful, with default routing capabilities, which are equivalent to gateways and routers. The network performance is also relatively stable, and simple configuration. Of course, when configuring the network may occur when the network connectivity is unstable or does not pa
Linux System Foundation commands:Linux is a command line composed of the operation system! Essence in the command line, how the graphical interface grows to what level this principle will not change, the Linux command has many powerful effects: from simple disk operation, file access, to hosting a huge multimedia image and streaming file manufacturing.Install and Login commands: Login, shutdown, hwoulsternbyive, Rekick out, Mount, Umount, ChshDocument
relevant properties of the directory itself, typically used with-L.-R: Reverse mode display-R: Recursive display-rw-r--r--. 1 root root 41364 June Install.log-,d,l,b,c,p,sNumber 1: Number of times a file has been hard linkedLeft Root: Owner of FileRight root: Group of files41364: Siize of filesJune 14 14:32: Last modified time for a fileInstall.log: File nameFile View commands: Cat, TACCat: ForwardCat/etc/fstabCat/etc/fstab/etc/issueTAC: Reverse Orde
1. Xargs Usage Detailed
because many commands do not support | Piping to pass parameters, and there is a need in daily work, there is a xargs command, such as:
find/sbin-perm +700 |ls-l This command is wrong.
find/sbin-perm +700 |xargs ls-l This is the right thing to do.
2.tar Decompression Command Detailed-C: Set up compressed Files
-X: Decompression-T: viewing content-R: Appending files to the end of a compressed archive-U: Updating files in orig
Although Linux and WindowsNT2000 are the same multi-user systems, there are many important differences between them. For many administrators who are used to Windows
Although Linux is a multi-user system like Windows NT/2000, there are many important differences between them. For many administrators who are used to Windows, there are many new challenges to ensure the security and reliability of the Linux operating system. This article focuses on Linux system security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.