The linux cd command is one of the two commands with the highest usage in Linux. The other is ls, of course ), I have never known the tips for seeing a linux cd command two days ago.
Cd-# Go Back To The Last directory. I didn't know this technique. It seems to be useful and I have omitted a lot of input.
Cd! $ # Input
We all know: The reading of files in the computermemory > Cache > HDDThe alias in Linux is to simplify the input of certain commands, and in the terminal inputaliasCan query the system exists alias, the user can also customize the alias, specifically:Alias aliases = ' Command '[[emailprotected] ~]# alias hist=‘history‘[[emailprotected] ~]# hist 1 alias hist=‘history‘ 2 type hsit 3 type hsitory
/wKioL1ngdcbD03vBAAEB-2zmOQ4645.png "style=" float : none; "title=" Linux relative path and absolute path, CD command, create and delete directory, rm command 858.png "alt=" Wkiol1ngdcbd03vbaaeb-2zmoq4645.png "/>The!tree command can run the last hit of the tree at the beginning of the command:650) this.width=650; "src=" Https://s5.51cto.com/wyfs02/M00/08/61/wKiom1ngeIDygNeYAAdaqhJPvhA132.png "style=" float : none; "title="
Built-in and external commands in Linux
1. linux commands can be divided into internal commands and external commands:
Internal commands are transferred to the memory at system startup,
During the learning process of the Linux system, you will know a lot of commands. Remembering these commands will greatly improve your understanding of the Linux system. You may see the grep command. Here we will introduce the knowledge of the grep command.
1. RoleIn Linux,
In linux, ifconfig, shutdown, and other commands cannot use the _ enable Shell command Java code. why cannot I use the ifconfig command in RedHatLinux5? after installing RedHatLinux5, I use some commands on the terminal, such: ifcinfig view local machine...
In linux, commands
provided, allowing users to log on multiple times from the console at the same time. The choice of the virtual console can be achieved by pressing the Alt key and a function key, usually using the F1-F6 for example, after the user login, click the Alt-F2 key, the user can see "login:" prompt, the user sees the second Virtual Console. Then you just press the Alt-
The shell command in Linux is usually the execution step: the user enters the command in the terminal, the system kernel reads the value of the environment variable in the current user's environment variable path The value of the variable is the path of the command, the command path is more than one, The system then matches the command file to find from left to right in these paths until it is found and executed, and when the command is executed, the
Scp commands for Linux learning and XCOPY commands for Windows 1. basic concepts scp commands are used for communication between Linux and Linux hosts, simply put, a linux host can use
attempted to connect to the system.
2. Format
1ast [-n] [-f file] [-t tty] [-h node] [-I-IP] [-1] [-y] [1D]
3. Main Parameters
-N: Number of output records.
-F file: specifies that the file is used as the log file for query.
-T tty: only the logon status on the specified virtual console is displayed.
-H node: only the logon status on the specified node is displayed.
-I IP: only the logon status on the specified IP address is displayed.
-1: use an IP
; network operations commands: ifconfig, IP, ping, netstat, Telnet, ftp, route, Rlogin, rcp, finger, mail, nslookup; system security-related commands: passwd, Su, Umask, Chgrp, chmod, Chown, chattr, sudo ps, who; other commands: Tar, unzip, Gunzip, Unarj, Mtools, man, Unendcode, UUDecode. Login2. UseLogin's role is to log on to the system, and its us
=" Image025.png "alt=" Wkiom1l5qzqb2ck-aae02uch_4u103.png "/>(3)hash-d nameDeleteHashNow we will delete the cached pwd in the hash , and the name we need to enter when we delete It is the alias we found with hash-l . 650) this.width=650; "src=" Https://s3.51cto.com/wyfs02/M01/9D/14/wKioL1l5qzuBYp6QAAC5QHVv0zU321.png "style=" float : none; "title=" Image026.png "alt=" Wkiol1l5qzubyp6qaac5qhvv0zu321.png "/>you can see that the PWD is not in the list . then we look at the type of PWD and find that
When writing operations scripts in Python, it is often necessary to execute the commands of the Linux shell, the commands module in Python is dedicated to invoking the Linux shell command and returning the status and results, here are the 3 main functions of the commands mod
When writing operations scripts in Python, it is often necessary to execute the commands of the Linux shell, the commands module in Python is dedicated to invoking the Linux shell command and returning the status and results, here are the 3 main functions of the commands mod
line interface CTRL+ALT+SHIFT+F13. #ifconfig See if you use the NIC, Vi/etc/sysconfig/network-scripts/ifcfg-eth0 modify the NIC configuration. Set the BOOTPROTO=DHCP. Remove ipaddr, we use the automatic acquisition of IP and DNS. (If there is no clear can refer to above (I. 4))4. #service Network restart//restart network. This way the Linux virtual machine will be able to surf the Internet. Let's test it.#ping www.baidu.com//command line input, you
Never use Linux commands! | Linux China, linux ChinaYou only need a stupid move. You can even destroy a company worth billions of dollars, Just Like Apache Struts without patching. -- Steven Vaughan-Nicolas
In this article, navigate to rm-rf/11% faster fork bomb 39% faster junk data rewrite hard disk 47% faster erase h
In Linux, the grep command is a powerful text search tool that uses regular expressions to search for text and print matching lines.
In Linux, the grep command is a powerful text search tool that uses regular expressions to search for text and print matching lines. Grep stands for Global Regular Expression Print, which indicates the Global Regular Expression version. its permission is granted to all users.G
Differences between linux su and sudo commands: linuxsusudo commandsI. Use the su command to temporarily switch user identities1. Conditions and power of su
The su command is a tool for switching users. How can this problem be solved? For example, if we log on as a normal user beinan, but want to add a user task and execute useradd, The beinan user does not have this permission, and this permission is exact
We use the Accton command to turn process statistics on or off, and if not with any parameters, it means to turn off process statistics. Its main parameters are as follows:(1)-V or--version, indicating that the version information is displayed and exited.(2)-H or--HELP, print help information.In the Linux system to start process statistics must use the Accton command, and must use the root identity to run, the Accton command in the form of Accton file
Common Linux commands (6) -- Network Communication commands 1. command name: writewww.2cto.com execution permission: all users function description: send information to another user, with CTRL + D as the concluding remarks: write lt; user name gt; root sends information to the luxh user [root @ l...
Common Linux
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.