Alibabacloud.com offers a wide variety of articles about linux commands for interview, easily find your linux commands for interview information here online.
File management commands for Linux commands CP, MV, RMCP, copy command: Copying files or directoriesGrammar:CP [OPTION] ... [-T] SOURCE DESTCP [OPTION] ... SOURCE ... DIRECTORYCP [OPTION] ...-t DIRECTORY SOURCE ... CP SRC DEST:SRC is a file: If Dest does not exist: Creates a new target file and copies the SRC to the target file; if dest exists: If Dest is a file:
Common Linux commands (version 2)-file management commandsFile Management commands
Not recommended: Follow books like command book!
There are about 200 Common commands.
File naming rules:
A) All characters except '/' are valid!
B) It is best not to use these characters.
1. space character, Tab character, return charact
Linux common command-permission management command chmodu/g/o +/-/r/w/x change permission user/user group/other user increase/decrease/Grant read/write/execute r4w2x1rwxr-xr -- 754752: rwxr-x-w-question: if other users have 7 permissions on the file... permission management commands for common Linux Commands
Chmod
.② file belongs to group: a user can belong to more than one group, but it can only have one default group . So when a file is created, its owning group can only be the default group that the user belongs to(2) Umask command
Command name
Umask (The user file-creation mask)
Command path
Shell built-in commands
Execute permissions
All Users
Grammar
Umask [-S]-S Displays the
commands about disk space
Command
Function
Mount
Mount File System
Umount
Uninstalling a file system mounted on a mount
Df
Check the disk space of each hard disk partition and the mounted file system
Du
Show file directory and size
Fsck
Mainly to check and repair the Linux file system
Linux svn commands and svn commands
Check whether svn: svnserve -- version is installed
Close svn service: killall svnserve
Create svn Library: svnadmin create/opt/svn/repos
Configure Automatic Start: Put svnserve-d-r/opt/svn/repos in the last line of/etc/rc. d/rc. local.
Start svn: svnserve-d-r/opt/svn/repos
If svn is already running, run it on another port: svn
Summary of commonly used linux commands in ubuntu, and customized tulinux commands
I have been in the lab for nearly a month and barely touched windows. I have been developing it in ubuntu. I would like to summarize the commonly used linux commands.
(0) su and sudo:Get root
interruptCtrl + l--> Clear ScreenCtrl + u--> Cut the previous character of the cursorCtrl + k--> to cut the character after the cursorCtrl + y--> Copy the contents of u/kCtrl + r--> Find recently used commandstab--> command or path completionctrl+shift+c--> replicationctrl+shift+v--> paste40, every night 12 o'clock, packaging site Directory/var/www/html backup to the/data directory (preferably each backup by time to generate a different backup package)Cat a.sh#/bin/bashcd/var/www//bin/tar zcf/d
Why can't I use the ifconfig command in RedHat Linux 5? After I have installed RedHat Linux 5, I use some commands on the terminal, for example, ifcinfig, to view the IP address of the local machine, the system prompts "command not found". What should I do? If the environment variable is not loaded, modify the environment variable as follows: www.2cto.com 1. Afte
In the previous use of the Windows system know that can set permissions for the file, then this permission is set, before the "Linux---User management command," mentioned in the system, the user is mainly to achieve resource sharing, the file permissions in the system is naturally also for the user to set permissions, If no system does not have a user, then set permissions is meaningless, the file permissions is completely "What a user has permissions
Embedded linux engineers interview questions C language basics-general Linux technology-Linux programming and kernel information, the following is a detailed description. I saw an embedded interview on the Internet and suddenly felt very small ...... In the future, I will po
CentOS7 installs the latest version number Awstats, adds alias in httpd.conf, and is able to access the website directly by visiting the URL. is not safe.How to add password to the interview:[[email protected] wwwroot]# htpasswd-bc/home/awstats/wwwroot/.htpasswd AAA 123456[[email protected] wwwroot]# Nano/et c/httpd/conf/httpd.conf #改动 Apache configuration file. Add limit to Awstats: Alias/awstatscss "/home/awstats/wwwroot/css/" Alias/awstatsicons "/h
Common Linux commands (2): ipcs/ipcrm commands, ipcsipcrmIpcs
1. Command Format
Ipcs [resource-option] [output-format]Ipcs [resource-option]-I id
2. command functions
Provide information about the IPC Device
3. Usage
Resource options:
Ipcs-m view system shared memory information
Ipcs-q: view system message queue Information
Ipcs-s: view system semaphore Informati
Linux commands for managing files and directories
Command
Function
Command
Function
Pwd
Show current directory
Ls
View the contents of the directory
Cd
Change your directory
Cat
Display the contents of a file
Grep
Find a character in a file
Cp
Copying files
Touch
Create a fi
;/tmp/mypasswd // open for N in 2 4 6 10 13 15; do line = 'head-$ N $ file | tail-1 'echo $ line> 1 doneexec 3> -// close unset file line
------------------------------------------------------------------------
Pipeline |: sends the output of the first command to the second command for processing.Echo "123456" | passwd -- stdin rehat // This command will give 123456 to passwd for processing, the -- stdin parameter will make 123456 immediately effective as the user's RedHat PasswordLs/etc | tee/
1.which commandWhen entering a Linux command, the shell actually executes the same name command in which directory, we are not known, can be verified using which.2.whereis commandA command similar to which, Whereis is used to retrieve the file associated with a given command.3.apropos commandUse the apropos command to retrieve commands using the keyword. Apropos will use the keyword provided to retrieve the
Built-in commands and external commands under Linux1, the Linux command can be divided into internal commands and external commands:Internal commands are transferred into memory when the system starts, and are resident in memory, so the execution efficiency is high.The exter
number of gateways that must pass before arriving at the destination. The maximum distance accepted by RIP is 15 hops.77. The ping command is used to test network connectivity. The ping command is implemented through the ICMP protocol (Internet Control Information Protocol.78. NFS is used for file system sharing between Unix (/Linux) hosts.79. In Linux, devices are all accessed through special files.80. sh
Common Linux commands (2) -- permission management command 1. command name: chmodwww.2cto.com execution permission: all users function description: change the file or directory permission syntax: chmod [{ugo} {+-} {rwx}] [file or directory] [mod... common Linux commands (2) -- permission management command 1. command n
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.