Linux Whois command installation and use, linuxwhois command Installation
Everyone knows how to view the details of a domain name,They all go to the whois server to query,Like http://whois.chinaz.com
In fact, there is a whois command in Linux,However, jwhois must be installed. Take CentOS as an example:
Installation:
[
In CentOS, you cannot use the setup command-bash: setup: command not found.
This problem occurs because the Minimal installation mode does not install the setuptool software.Solution: Use the yum source to directly download and install or download the setuptool package installation # install setuptoolyum install setup
When an ext2 file system error occurs, use the fsck. ext2 command to try to fix it.SyntaxFsck. ext2 [-acdfFnprsStvVy] [-B [-I Parameters: -A automatically repairs the file system without asking any questions. -B -B -C: Check whether damaged blocks exist in the specified file system. -C -D displays the instruction execution process in detail to facilitate troubleshooting or analyzing pro
The Linux file command is used to identify the file type.Using the file command, we can identify the file type.SyntaxFile [-beLvz] [-f Parameters:-B: When listing the identification results, the file name is not displayed.-C displays the instruction execution process in detail to facilitate troubleshooting or analyzing program execution.-F-L displays the category of the file to which the symbolic connection
FTP allows users to download files stored in the remote host, but also upload files to the remote host placement. TFTP is a simple text-mode FTP program that uses instructions similar to FTP.
Grammar
TFTP [host name or IP address]
Operation Instructions:
Connect: Connecting to a remote TFTP server
Mode: File transfer mode
Put: Upload file
Get: Downloading Files
Quit: Exit
Verbose: Display detailed processing information
Tarce: Show Package path
Status: Displaying c
Printer work that has not yet been completed is placed in the printer's storage column, which can be used to cancel work that is not normally sent to the printer. Since each printer has a separate storage column, you can use the-P command to set the printing machine that you want to function. If not set, the system preset printer is used.
This command checks to
The resize command allows you to set the window size of the virtual terminal.
Grammar
Resize [-cu][-s
Parameters:
-C Even if the user environment is not C shell, also use C shell instructions to change the size of the window.
-S
-U even if the user environment is not Bourne shell, also use Bourne shell instructions to change the window size.
Insta
Mouseconfig for the mouse Setup program, you can automatically set the relevant parameters, or users can also use the interactive mode provided by themselves set the mouse. Mouseconfig is a command of Red Hat Linux.
Grammar
Mouseconfig [--back][--emulthree][--help][--expert][--kickstart][--noprobe]
[--test] [--device
Parameters:
--back Displays the Back button on the settings screen instead of the
When SendMail receives a letter to send to XXX, it is sent to another user based on the contents of the aliases file. This feature can create a user who is only valid within the letter system. For example, mailing list will use this function, in mailinglist, we might create a mailinglist called redlinux@link.ece.uci.edu, but in fact there is no user named Redlinux. The actual aliases file is the content of the letter sent to this user to the mailing l
Because of the work needs, the build of our software is written in makefile, but now we use ant for automated building, so we need to use ant syntax to call the MAKEFILE file. Here I am doing this. The build. xml file here is as follows:
The MAKEFILE file is as follows:
Targets:@ Echo "Hello make! "PWDDu
@ Echo "test is OK! ">/Ci/opt/cruisecontrol-bin-2.7.3/projects/maketest/test.txt
According to th
The Linux passwd command is used to change the user's password.SyntaxPasswd [-k] [-l] [-u [-f] [-d] [-S] [username]Required parameters: -D. Delete the password. -F force execution -K updates can only be sent after expiration -L stop account use -S: Display password information -U: enable an account that has been stopped -X: Set the password validity period. -G: change the group p
The Aumix (audio mixer) command sets the signal strength of each sound device and the device that specifies playback and recording.
Grammar
Aumix [ -123bcilmoprstvwwx][(+/+) Strength][pqr][-dfhilqs]
Parameter description: [ -123BCILMOPRSTVWWX] is the channel parameter, used to specify the channel of the device, [PQR] can be used to specify the playback or recording device; [-dfhilqs] is the instruction parameter. Without any parameters, Aumix will
The Linux renice command is used to reassign one or more stroke (Process) precedence (one or more will be based on parameters).
Note: Each stroke (Process) has a unique (unique) ID.
Use Rights: All users.
Grammar
Renice priority [[P] pid ...] [[G] pgrp ...] [[-u] user ...]
Parameter description:
-P PID assigns a stroke's ID to the precedence sequence of the PID
-G PGRP Specifies the precedence of
You can use the groupmod command to change the group identifier or name.SyntaxGroupmod [-g Parameters: -G -O reuse the group ID. -N InstanceModify group nameRoot@w3cschool.cc ~ # Groupadd linuxsoRoot@w3cschool.cc ~ # Tail-1/etc/groupLinuxso: x: 500:Root@w3cschool.cc ~ # Tail-1/etc/groupLinuxso: x: 500:Root@w3cschool.cc ~ # Groupmod-n linux linuxsoRoot@w3cschool.cc ~ # Tail-1/etc/groupLinux: x: 500
Perform a telnet command to open the terminal phase and log into the remote host.
Grammar
Telnet [-8acdeffklrx][-b
[-s
Parameter description:
-8 allows the use of 8-bit character data, including input and output.
-a attempts to automatically log into the remote system.
-b
-C does not read the. telnetrc file in the user-specific directory.
-d boot debug mode.
-e
-e filters out characters.
Linux: Wonderful use of the-comm command and the comm commandParameter: // assume a, B, and AB intersection # comm [options] textA textBoptions: 1. This indicates that a removes the overlapping AB intersection; 2. indicates that B sets remove the AB overlapping part; 3. indicates that AB intersection overlaps the part; ------------------------------------1 indicates that a sets remove the AB overlapping par
More basic instructions is to press the blank key (space) on the next page to display, press the B key will be back to a page, but also search the function of the string (similar to VI), the use of the documentation, please press H.
Grammar
more [-DLFPCSU] [-num] [+/pattern] [+linenum] [fileNames ...]
Parameters :
-num the number of rows displayed at a time
-d prompts the user, in the screen below the display [press spaces to continue, '
202.102.48.141 bytes = 32 time = 6 ms TTL = 252
Ping statistics for 202.102.48.141
Packetssent = 4 bytes ED = 4 lost = 00% loss
Approximate round trip times in Milli-seconds
Minimum = 5 msmaximum = 33 msaverage = 16 Ms
It indicates that the operation is normal and access to the Internet is normal. Otherwise, the host file (Windows/host) is faulty.
Note: Ping is disabled on the DNS server after the shock wave, that is, ICMP protocol is disabled.In this way, you can
Did you ever get an "access Denied (Permission denied)" error when using the Linux command line? This may be because you are trying to perform an operation that requires root permissions. For example, the following shows an error that occurs when I try to copy a binary file into a system directory.Shell denial of accessSo how do you solve this error? Very simple, use the sudo command.Run the
C # Assembly series 01, use NotePad to write C # And IL code, use the DOS command to compile the assembly, and run the program,
This article describes how to compile C # And IL code and use the "VS2012 developer command prompt" to compile the code into an assembly and run th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.