Basic LINUX operation commands and basic linux operations
Ls to list files and directories-A: displays all files and directories, including hidden files and directories.-L: displays full attribute information of files and directories.
Cd changes current path(Relative path and data pair path)
Pwd displays the current working file directory
Create a directory u
that developers can submit locally under distributed Each developer machine has a server database backup file record history back to the past multi-share003. Git workflowWorkspaces: code written at work staging area: Staging, helping us save the code as a transition layer to avoid misoperation protect workspace and version area Branch processing version area: Manage version, code action in repository generates version004. Some basic Linux
Basic Linux usage-Basic commands-general Linux technology-Linux technology and application information. For details, refer to the following section. 1. display the content in the current working directory
To know what files or directories are in the current working directory, you must use the "dir" command in the "command prompt" of Windows, and then use the "ls
4. Basic Redis commands-list, basic redis-list1. The list type is implemented using a double linked list. Therefore, if you want to add elements to both ends, the time complexity is O (1 ), the faster the element gets closer to the two ends. However, the cost is that accessing elements through indexes is slow.2. the maximum number of fields that each key can hold
Linux basic commands and linux basic exercises
To enable the Linux operating system, you must log on to the gnome gui as the root user. Select Chinese as the language support.
Use the shortcut key to switch to virtual terminal 2, log on as a common user, and view the system prompt
Use the command to log out of the user logged on to virtual Terminal 2.
Use the
the type of shell the current user is using. The shell is divided into several, introduction:BSH (Bourne Shell) is the first and most well-known Unix shell written by Bourne (Bourne) at/T Unix, referred to as b-sh (read as B-shell or Bourne shell). If you are using the Bourne Shell, the command prompt is often on the terminal (Terminal). The next version of the Bourne shell is the Bourne shell again, calle
Enter your username and password. of course, enter root to obtain all management permissions! You really want to see the pretty graphic interfaces immediately, but maybe I want to disappoint you. Before using the graphic interface, I suggest you master the basic Linux life first.
Enter your username and password. of course, enter root to obtain all management permissions!
You really want to see the pretty graphic interfaces immediately, but maybe I wa
192.168.1.x to connect to the database salesTYPE DATABASE USER ip-address ip-mask METHODHost sales all 192.168.1.0 255.255.255.0 ident Sameuser (indicates that any operating system user can connect with a database user of the same name)8. See so much, come up with a complete example of creating a PostgreSQL database user(1) Access to PostgreSQL advanced users(2) Enable the client program and enter the TEMPLATE1 databasePsql template1(3) Create a usertemplate1=# CREATE USER Hellen with encryped
Beginners may feel inconvenience when they touch Linux, but there is no connection, there is a process of contact with new things, after you have used Linux for some time, you will gradually understand that Linux is as easy to master as Windows.Due to the unfamiliar operation and use of the environment, if you want to fully familiar with the application of Linux we first need to solve the problem is the Linux Common Command proficiency. In this chapter we will introduce the common
+
Add permissions
G
The group where the owner resides
W
Write right
-
Delete permissions
O
The others
X
Executive power
=
is what it calls unique permissions
A
All (U,g and O)
To delete all permissions for a file, enter a command:chmod a-rwx Test.txtTo add permissions to the file owner, enter the command:chmod u+rwx TestYou can also use numbers to indicate
task if you do not want to perform the work in a task transfer on a regular basis, you can execute the crontab–r command to remove all task scheduling. Examples are: [[[emailprotected] rony]$ crontab–r← Delete Work in Task Scheduler [[emailprotected] rony]$ crontab-1← View work in Task Scheduler again No crontab for tony← no task scheduling work nine, packaging, compression and decompression because this is the basic functionality that every Lin
by key, and the length of a key cannot exceed 250 characters. Key cannot contain control characters or white space charactersThird, the orderThere are three types of commands:1. Storage command: Set, add, replace, append, prepend, CAs2, read the command: GET, gets3, the Third kind of command, does not involve unstructured data. The client sends such a command, and the server returns the result of the response1. Expiry timeThere are two types of expir
use bzip2 to compress tar files
To create a tar file, enter the command:TAR–CVF Filename.tar Directory/file/home/mineThe above command puts Directory/file,/home/mine into the archive.To list the contents of a tar file, enter the command:TAR–TVF Filename.tarTo extract the tar file command, enter the command:TAR–XVF Filename.tarThis command does not delete the tar file, but it copies the contents of the archive to the current working directory and preserves any directory struct
option, because you are worried that if you typo, the directory name will become messy.16. Delete "Empty" directory: RmDir17. Display of files and directories: LS18. Copying Files or directories: CP19. Removal of files or directories: RM20. Moving files and directories, or renaming: MV21, get the path of the file name and directory name: Basename,dirname22, starting from the first line to display the contents of the archive: Cat23. Starting from the last line: TAC (can see that the TAC is backw
Oldboy in #替换oldboy. txt become oldboy_python# When the result is output to the screen and will not be written to the file sed ' s/oldboy/oldboy_python/'/tmp/oldboy.txt#使用选项-I, match each line with the first Oldboy replaced by Oldboy_python and write to the fileSed-i ' s/oldboy/oldboy_python/'/tmp/oldboy.txt#使用替换标记g, you can also replace all matchesSed-i ' s/book/books/g '/tmp/oldboy.txt#删除文件第二行Sed-i ' 2d '/tmp/oldboy.txt#删除空白行Sed-i '/^$/d '/tmop/oldboy.txt#删除文件第二行, all rows to the endSed ' 2,
way.
Linux basic network command listI use FreeBSD on a computer network course, but these UNIX commands should also work on Linux.Connectivity
•Ping
•Telnet
7 -- echo port
25 -- SMTP, used to send emails
79 -- Finger ?), Provides information about other users in the network.
ARPARP is used to convert an IP addres
/wKiom1RF-1XRX2AAAABXVh9jvSg017.jpg "title=" CD 555555555555555555557.png "alt=" Wkiom1rf-1xrx2aaaabxvh9jvsg017.jpg "/>CD-: Can be implemented to switch to the first access to the directory, a bit like a TV remote in the back, where "-" indicates the last visited directory--------------------------------------------Features of the Linux file system:1, the file name can use any character except/, but the total length must not exceed 255;2. Strictly case-sensitive----------------------------------
Reprint please indicate the source:http://blog.csdn.net/u011974987/article/details/52695647This article comes from: "Stromxu's Blog" preface
Linux provides a large number of commands that can be used to efficiently perform a large amount of work, such as disk operations, file access, directory operations, process management, file permissions, and so on. Therefore, working on a Linux system requires the use of system-supplied
First, we will introduce the term "console", which is a commonly seen man-machine interface using character operation interfaces, such as DOS. The console command is a command that can be run on the operating system through the character interface. For example, the doscommand is a console command. What we need to know now is the basic Console Commands based on the Linux operating system. Note that, unlike t
directory for third-party programs/proc: Virtual file system for kernel and process information, pseudo file system, kernel mapping file, only in memory, it provides the interface to the operation of accessing system kernel data in the way of file system./sys: Pseudo file system, hardware device information virtual file system interface, and hardware device-related property mapping file, which is the global device architecture, contains all the found registered on various bus of various physica
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.