can hold is 16GB, which is consistent with the file restriction table results. However, this method is not applicable when the block size is 2KB or 4KB, because the block larger than 2KB will be limited by the EXT2 file system itself, and the calculation results and the restriction table.(3) Super blockwhere this block records information about the entire file system, the main records are:Block and the total amount of innode;The number of unused and used innode/block;The size of block and innod
are each:1) Run Level 0: Power off. So init 0 can also be shut down.2) Run Level 3: pure command line mode.3) Run Level 5: Contains graphical interface mode.4) Run Level 6: Reboot.6. Troubleshooting problems with the boot processFirst, the problem of file system error is discussed.There are three scenarios: the root folder is not corrupted, the root folder is corrupted, and the hard disk is broken.Finally talked about forgetting the Rootpassword.Describes the use of the Grub boot loader to reso
memory of the current message to the file, and this file will give the kernel developers to study why the outage. It is not recommended to start kdump.Finally, the user is created and the sound card is installed with other software.4. Multi-boot installation process and techniquesFirst, we talked about a new host with only one hard drive . Install Windows and reload Linux first.Then talk about the old host has more than two pieces of hard disk . It i
Brother Bird's Linux private dishes are divided into two volumes, respectively, the basic article and server chapter.
First of all, I read the background of this kind of books. Bo Master (that is, I ^_^) University of the major is the Linux C language, or called embedded C, the platform used is Linux. By the way, the
can use to switch alt+f1-f7.6. CP file1 file2 : means to assign file1 to file2 and place it in the background. The can throw work into the background without affecting the work to be opened. , when thrown into the background, Bash will be based on this instruction a work number, throw in the background of the biggest advantage is not afraid to be the CTRL + C interrupt.7. Ctrl + Z is temporarily throwing work into the background.Jobs-l: Observe all the current work and PID in bashFG: Take back
;
VI has three modes, the general mode can be transformed to edit and command column mode, but the editing mode and the command column mode is not interchangeable;
Commonly used keys are I, [ESC],: WQ, etc.;
The picture of VI can be divided into two parts, (1) The upper part of this article and (2) The last line of the state + instruction column mode;
The number is meaningful to illustrate the meaning of repeating several actions, such as 5yy for copying 5 lines of meaning;
I
PS: Brother Bird's third edition of private dishes printing problemsThe above meaning: D refers to the directoryFile Owner permissions: R readable w writable, X, can run,Permissions for the same group: R readable, this paragraph has a-number, which means not writable, X is operationalOther non-group permissions: R Readable, this paragraph also has a-number, indicating not writable, X can runThere is a 2 in the back, which means there are 2 files, the
File system Hierarchy? fhs:http://www.pathname.com/fhs/Linux Standard Base? lsb:http://www.linuxbase.org/Tips:Exciting Real bird Brother obituary for distributions is divided into two major systems, one is to use the RPM obnoxious-installed softwareSystems, including Red Hat, Fedora, SuSE, and so on, one of which is the use of Debian'sDpkg obnoxious installation software system, including Debian, Ubuntu, b2
filtered out, otherwise it will not filter, This creates the permissions attribute of the final file, as shown in.In fact, in addition to the above rwx there is a special permission problem, namely: Suid,sgid,sbit.· SUID: Give the user the X-permission location to give S permission, which gives the general user the same permission to use the command as user.· SGID: give s permission to the X permission location of the group Grop to which the folder belongs, so that all files or folders created
: Terminal1. Can use the combination key CTRL+ALT+F1-F6 to switch;2. Start the graphical interface: Use the ALT+F7 key combination or enter at the command prompt: StartX to switch.Vi. GUI (graphical interface):Gnome: Developing with C languageKDE: Developing with the C + + languageXFace: A compact, lightweight operating system for embedded platformsVii. CLI (Command line interface):Bash, CSH, zsh, Ksh, tcshEight, user switch: SU (switch User)1. Full Switchover: su-l2. Return: ExitNine, Password
I've heard of Linux for a long time, but I've never learned Linux from the system. This time in the blog Garden of the Maiden show to Linux, hoping to give themselves to learn Linux a persistent power, adhere to the victory, fighting!In my opinion, before becoming a technology Daniel, blogging is mainly about what you
--"? You can use " chmod u=rwx,g=rx,o=r filename" to set it. Also, if I do not know the original file attributes, and I only want to increase the. BASHRC per-person writable permission for this file, then I can use:ls -al. bashrc-rwxr-xr-x 1395 Jul 4each: chmod A +w ls -al bashrc-rwxrwxrwx 1395 Jul 4 One: BASHRC.And if you want to remove permissions without having to change other existing permissions? For example, to take out the executable permissions of all people:chmod A- xls -al. ba
Linux is a file, bird brother called the archives. Since it's a file, the file has the following features.1. User of the file2. Permissions of the file3. Types of Archives1. User of the fileFiles can be managed, modified, and queried by people of different roles. Roles are divided into the following three types1. Owner of the file: User2. Group: Group3. Other: OthersRoot user has the overriding privileges2.
Linux file management commands in a detailed and continued:I. Copying and moving filesCP:CP SRC DEST-r: Copy directory to file-F: Forced replication-I: Interactive-P: Keep the original file attributes unchanged-A: Archive replication, often used for backupDescription1. A file to a file, multiple files to a directory;2. By default, you can only copy files to the directory, you cannot copy directories to files;3. If no files are in the destination direc
terminate the loop when the condition is established.For...do...doneThis cycle differs from the first two in that the number of cycles is known and the structure is as follows:For variable in content 1 content 2 ...DoEXECUTE statementDoneIn the process of looping, the value of the content n is assigned to the variable to execute the following statement, of course, the expression of the content can be different, otherwise the variable is more difficult to express, for example, with (SEQ 1 100) r
April 9, 2017 22:23:40"Brother Bird's Linux private dish"1. Operating system1.1 What is an operating system? An operating system is a collection of programs used to manage a computer's hardware and software resources to facilitate user use. So that users do not need to understand the role of hardware only need to simple operation to complete complex computing problems. 1.2Kernel Kernel (CORE), is the k
shut down.2) Run Level 3: pure command line mode.3) Run Level 5: Contains graphical interface mode.4) Run Level 6: Reboot.6. Troubleshooting problems with the boot processFirst, the problem of file system error is discussed. There are three scenarios: the root directory is not corrupted, the root directory is corrupted, and the hard disk is broken.Finally, we talked about forgetting the root password . Describes the use of the Grub boot loader to resolve this issue. Copyright NOTICE: This artic
File name, compressed files using gzip in Windows system, can be decompressed with WinRARPackage Command Tar①windows's winrar also supports decompression of tar.gz filenames② parameter:-j Compression/decompression via BZIP2 support-Z Compression/decompression via GZIP support-P Save the permissions and properties of the original file③ View data contents of tar ' File: Tar-jtv-f/root/etc/tar/bz2④ Unpacking: Tar-JXV-f/root/etc/tar/bz2⑤ only unlocks a single file: Tar-jtv-f/root/etc/tar/bz2 | grep
time-I: Inactive time-M: Minimum period of use-M: Maximum lifespan-W: Warning timePractice:
Create a user Mandriva with an ID number of 2002, a base group of distro (group ID 3003), and an additional group of Linux
#:groupadd-g 3003 distro#:groupadd Linux#:useradd-u 2002-g distro-g Linux Mandriva2. Create a user fedora with the full name of Fedora
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.