Vro basic commands:
Router> enable: Enter privileged Mode
Router # disable returns from privileged mode to user mode
Router # configure terminal enters global configuration mode
Router (config) # interface ethernet 1 enters the ethernet port number 1 of the Router
Exit: returns the upper-layer mode.The end is directly returned to the privileged mode.
========================================================
all properties are maintained, equivalent to the-RLPTGOD,-A option followed by a–no-option This means that one of the-rlptgod is closed, for example-a–no-l is equivalent to-rptgod-R subdirectories are processed recursively, primarily for directories, if a single file is not required to add-r, but the transmittedYes directory must be plus-r option-V Print some information, such as rate, number of files, etc.-L reserved Soft link-L treats the soft link as a regular file, and if there is a soft co
--SYSTOHC set the hardware clock to the current system time if one of the times is wrong, we can modify it by the above command. [[email protected] hzh]# Hwclock--hctosys Set the system time corresponding to the hardware time.[[email protected] hzh]# Hwclock--SYSTOHC set the hardware time corresponding to the system time. If two times is wrong, we can set the time ourselves [[email protected] hzh]# hwclock--set--data= "month/day/year: minutes: Seconds"Yum related operations:Yum install Yum check
another file or directory
[Email protected] app]# cp/etc/passwd/app/[[email protected] app]# lspasswd[[email protected] app]# cp-r/etc/sysconfig/network-scripts//app///-r recursively copy directory and all internal content[[email protected] app]# lsNetwork-scripts passwd
RM//delete files and directories
[[email protected] app]# RM-RF *//r Force delete F Delete Directory
MV//change file or directory commands or m
I read some documents and summarized some basic Vim commands suitable for programmers. they are not very complete, but at least practical... All are the most basic vim tutorials. open the terminal under fedora. Input vimfilename to enter the vim // basic file. ..
I read some documents and summarized some
There are three types of user accounts: superuser, common user, and program User Group account: UID for the basic group and additional group user account: the root UID is 0, the program user is 1-499, and the general-a: User account File 1. in the passwd file, configure the row format root: x :... there are three types of user accounts: superuser, common user, and program user.
Group accounts include: Basic
Cygwin basic operation command: ---------------------------- ls # display the current directory file list by default ls-a # display all files, including hidden files ls-l # display file properties, including size, date, symbolic connection, whether it can be read and written, and whether it can be executed ls -- color = never *. so> obj # do not display the text color. Record all so files to the obj file -----------------------------------------------
Docker run--volumes-from db1-v/home/backup:/backup ubuntu tar cvf/backup/backup.tar/dbdata
Start a container data volume using the DB1 container's data volume while creating a new data volume pointing to the host directory/home/backup, compressing the/dbdata directory data to/backup/backup.tar
docker run -v /dbdata --name dbdata2 ubuntu /bin/bash
Docker run--volumes-from dbdata2-v/home/backup:/backup busybox tar Xv
server
git remote add origin [email protected] Github.com:robbin/robbin_site.git # Set up the repository address
Git push-u Origin Master # client First Commit
Git push-u origin Develop # First submits the local develop branch to the remote develop branch, and the track
git remote Set-head Origin Master # Set the remote repository head to the master branch
You can also command settings to trace the remote library and the local library C code
Git branch--set-upstream Master
Label: GDB Basic Commands This article describes common commands for using the GDB debugger. Main content: [introduction] [Example] [other] [introduction]=============GDB is a powerful UNIX program debugging tool released by the GNU Open source organization. If you are doing software under the UNIX platform, you will find that GDB has a more powerful debugging to
,--mount[=-U,--uts[=-I,--ipc[=-N,--net[=-P,--pid[=RM Deletes a container-F,--force=true Force Delete-L,--link=false delete the container's connection, but keep the container-V,--volumes=false delete the container mounted data volumeExport the container, export a container that has been created to a file, regardless of whether the container is in a running state at this time-O,--output= ""# Docker Export 929bf12bc6ea > Centos_6.4_php.tarOther common commandsDocker-h 127.0.0.1:1234-d Modify the s
you can see, Git simply replaces the alias with the corresponding command. However, you might want to execute an external command instead of a GIT subcommand. If that's the case, you can add a symbol to the front of the command ! . It would be useful if you wanted to write some tools for collaborating with Git repositories. We now demonstrate the git visual aliases that will be defined gitk :' !GITK 'There are also aliases, renaming, and so on.Reference: Https://git-scm.com/book/zh/v2/Git-%E5%
,findfind* view command-type (f D)-name "ddd" Search by name-mtime by the modified timeTree view directory StructureXargs is used to give the output of the find/ls to the back processingSEQ Print number sequence echo{1..5}Man view commands and configuration file HelpTouch to create a file or modify the timestamp of a filePWD Displays the current pathVimdiff File Comparison ToolWHOAMI viewing the current command line end userSu Switch User role, note t
basic commands for viewing network performance in a Linux environment because Linux often uses a character interface, and Linux is more powerful, with default routing capabilities, which are equivalent to gateways and routers. The network performance is also relatively stable, and simple configuration. Of course, when configuring the network may occur when the network connectivity is unstable or does not pa
Linux System Foundation commands:Linux is a command line composed of the operation system! Essence in the command line, how the graphical interface grows to what level this principle will not change, the Linux command has many powerful effects: from simple disk operation, file access, to hosting a huge multimedia image and streaming file manufacturing.Install and Login commands: Login, shutdown, hwoulsternbyive, Rekick out, Mount, Umount, ChshDocument
relevant properties of the directory itself, typically used with-L.-R: Reverse mode display-R: Recursive display-rw-r--r--. 1 root root 41364 June Install.log-,d,l,b,c,p,sNumber 1: Number of times a file has been hard linkedLeft Root: Owner of FileRight root: Group of files41364: Siize of filesJune 14 14:32: Last modified time for a fileInstall.log: File nameFile View commands: Cat, TACCat: ForwardCat/etc/fstabCat/etc/fstab/etc/issueTAC: Reverse Orde
1. Xargs Usage Detailed
because many commands do not support | Piping to pass parameters, and there is a need in daily work, there is a xargs command, such as:
find/sbin-perm +700 |ls-l This command is wrong.
find/sbin-perm +700 |xargs ls-l This is the right thing to do.
2.tar Decompression Command Detailed-C: Set up compressed Files
-X: Decompression-T: viewing content-R: Appending files to the end of a compressed archive-U: Updating files in orig
This may be useful-Linux Quick Start, basic commands, C Programming basics, embedded system basics (to)-Linux general technology-Linux programming and kernel information. The following is a detailed description. [I = s] This post was last edited by kkkdang
Linux Quick Start, basic commands, C Programming basics, Emb
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.