, different attributes, smaller files♣ Removal 2.sh has no change, but 3.sh points to an invalid file that is no longer a link.♣ Delete * * The hard-link file takes the same index node number as the source file; the hard link maintains the index node number to preserve the data, knowing that you deleted the last hard-linked file. 10. Commands to view the contents of a file Stat: Provides all state information for a file on a file systemFile: Types of
I've written several articles about how to use the command line interface to manage files on your system, and here are a few basic commands that are common to all distributions.To copy a file or directory to a new location:
CP Path_of_file_1 path_of_the_directory_where_you_want_to_copy/
Copy all files from a directory to a new location (note the slash and asterisk, which indicates all files in
Tag: Pos Post search detects down art ble MRC consistencyVIM basic Commands
Cursor movement
G last lineNG moves to nth row n return cursor moves down n rowsGG First Line
Find and replace
/wordn Repeat previous Find operation N search up: n1,n2s/word1/word2/g from line N1 to section N2 find N1 replace with N2 last behavior $
Delete, copy and paste
X,x backward Delete
Linux CentOS Common Command **************************///Install centos6.6 with GNOME desktopCTRL + C terminates the current commandCTRL + Z PauseExit returnsStart Firefox: Firefox (The role of is placed in the background to do)Get root: Su root or Su-switch to new environmentsudo: Executing commands with Administrator statusID: Get user informationModify User password: passwdShutdown-h now immediately shuts down the machineShutdown-r now restartVie
Tags: first shel bit operation otherwise IDT operation for work ACKLinux Learning Chat (i)--Shell Basic operations and commands(Reproduced please attach this article link--linhxx)1, #!/bin/shPlaced at the beginning of the program, expressed in/bin/sh way to parse.2. Variables1) variable assignment varname= ' xxx ', in addition to variable assignment and in the For Loop statement header, in other cases the v
: Executable Script6.4.1 Ls-lDisplays the details of the files in the directory6.4.2 Ls-aShow files or directories that contain the beginning of the.The files in Linux that begin with. are hidden files6.4.3 Ls-ldDisplay the properties of the directory itself6.4.4 Ls-hShow file size in a friendly way6.4.5 LS-LHSShow files in order from large to small6.4.6 Ls-iDisplaying the inode for a file6.5 CatDedicated to viewing text file contentCat/etc/redhat-release viewing the System release version6.5.1
Linux basic commandsLinux IntroductionKernel Library :. so shared object, windows: dll dynamic link library application Linux basic principles: 1. composed of a single small program with a single purpose; combined with a small program to complete complex tasks; 2. Everything is a file; 3. Avoid capturing user interfaces. 4. Save the configuration file in plain text format. User Interfaces: all user interfac
hint, you can use the above,rm-rf jiangxi/, you can force the deletion without prompting (the command line cannot be recovered)Note: Root in Linux is the real root, it can be executed: RM-RF/ (delete root), so that the Linux "suicide", it will be executed.So we should recommend that the Delete command is : rm-r jiangxi/ This form (even if the file is deleted, also with the-R) 2. File processing commands Copy command :CP Instance: Note here, co
This article tells you about the first 10 of the 30 Basic DB2 operation commands. If you are interested in the first 10 of the 30 Basic DB2 operation commands, you can click the following article to view it, hoping to help you learn it.
This article describes the top 10 basic
save new file name 4, delete text • Small x: Delete a character after the cursor position • Large x: Delete one character before the cursor position n+x (small): Delete the n characters that follow the cursor position n+x (Large): delete the n characters preceding the cursor position DD: Delete the row where the cursor is located n+ DD: Delete the line with the cursor and the five lines below. (from the line where the cursor is located to the next five lines (including the cursor row) 5, copy
Basic usage of vim commands using vi/vim 1. basic concepts of vi there are basically three states: command mode and Insertmode) compared with lastlinemode, Each mode has the following functions: 1) Command Line... basic usage of vim commands using vi/vim 1.
Mysql -- mysql basic operation command: selectDATE_FORMAT (runTime, % Y-% c-% d) fromhdfsPicLogtwherepathlike % liveEpg3 % andcount30andDATE_FORMAT (runTime, % Y-% c-% d) 2013-10-30; change the primary key to primary key auto-increment: altertablehdfsPicLogm
Mysql -- mysql basic operation command: select DATE_FORMAT (runTime, '% Y-% c-% D ') from hdfsPicLog t where path like '% liveEpg/3/%' and count 30 and
Basic concepts and commands for CentOS users and groupsUser Group:Group type:Administrator GroupCommon User GroupSystem GroupLogon Group
Group ID: GroupID and GroupID
(Normal user 1-65536)Administrator group: 0
Common User Group:
System group:
CentOS 5, 6: 1-499
CentOS 7: 1-999
Logon group:
CentOS 5, 6: 500 +
CentOS 7: 1000 +
Name resolution: groupname Resolution Library:/etc/group
Group type: user-center
Basic configurations of Cisco routers and Cisco router configuration commands
En -- enter the privileged mode config t -- enter the global configuration mode wr (OR) -- save the configuration (otherwise, the configuration fails before the power-off)
1. Set the password for entering the vro Console
In global configuration mode, enter line console 0 --- enter the '0' Interface password 123 -- set the password
file from the 512-byte block position represented by the number variable.-C number starts reading the specified file from the byte position represented by the number variable.-F assumes that the input file is a regular file or assumes that the file parameter specifies a FIFO (first in and out),Then the tail command will not terminate after the last specified unit of the input file has been copied, but continueRead and copy additional units from the input file (when these units are available).If
we can find out which program is listening on that port and thus shutting it down.3. One of the 80 ports is monitored by Apache, then the port can no longer be monitored by other applications. (a port can only be monitored by one program).4. The port is divided into the famous port 1-1024, other ports can be assigned by themselves. How Apache goes to configure portsApache software configuration is configured in the httpd.conf file, the file is in the Apache installation directory of the ConfIn
to store the data, but the 122 Byte warehouse in the data kicked off.LRU removal mechanismmemcached Expiration data removal mechanism:When a value expires, it is not removed from memory, so stats statistics, Curr_items still have its information;When the value is taken, determine whether it expires, if expired, return empty, and empty, at this time curr_items is reduced;There have been no get before, will not automatically delete;Use an empty chunk only when a new value occupies its place.This
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.