extundelete to recover data, briefly introduce the knowledge about the inode. Under Linux, you can view the Inode value of a file or directory through the "Ls-id" command, for example, to view the Inode value of the root directory, and enter:
Therefore, the inode value of the root directory is 2.
When you use Extundelete to
Linux, as a multi-task and multi-user operating system, may be used by multiple users within the same period of time, and user management is directly related to the security of the entire system, users need to emphasize and protect password management and account file management. Linux User management is mainly divided into two aspects: password management and us
links when copying-P: Keep links when copying-L: Copy link instead of file pointed to by this linkMoving MV for filesSyntax format MV [option] SRC DESTDescription: The destination file can only be one, and when the destination file is a directory, the source file is moved to that directory.When the target
Linux By default the file system used for the Ext2,ext2 file system is indeed efficient and stable. However, with the application of Linux system in the key business, the weakness of Linux file system is gradually revealed; the ex
command compresses test2.txt into an already existing test.zip.Zip-u test.zip Test.txt checks test.txt for updates and, if the file has changed, compresses the test.txt back into Test.zip. Otherwise, compression is not performed.Zip-d Test.zip Test2.txt will be test.zip, test2.txt deleted.
3, unzip used to extract the zip file.
General usage. Zip Test.zip decompression Test.zip
Zip Test.zip *.p
Linux file management must be knowledgeFirst, the File View Class command①less options parameters (file name) Split screen display of file contents (view to end of file does not exit, press Q to exit) shortcut keys
Detailed steps for restoring a mysql database through the binlog file on Linux: binlogmysql
I. binlog Introduction
The server's binary log records all the operation logs for adding, deleting, and modifying the database (provided that binlog is enabled on the server), and the execution time of these operations is also included. To display the binary content, run the mysqlbinlog command.
Purpose 1: master-sla
source, upgrade destination
RM Command
Grammar
RM [-fir] File or directory
-F: That means force, ignoring nonexistent files, without warning messages;-I: Interactive mode, the user is asked whether action-R: Recursive deletion before deleting. Most commonly used in the deletion of the directory. This is a very dangerous option ...
MV Command
Grammar:
MV [-FIU] source destination
MV [options] source1 source2 source3 ... directory
Options and Param
, the next directory and subdirectories have-R can be done,An easy to use image with the-m parameter, namely:Wget-m-NP ftp://xxx:xxx@xxx.com/xxx
Instance
Download 192.168.1.168 first page and display download information Linux wget-d http://192.168.1.168 download 192.168.1.168 First and do not display any information wget-q http:// 192.168.1.168 download all files contained in the filelist.txt link wget-i filelist.txt
Download to the specified dire
, if the file name is in file:host or [email Protected] , which represents the data from the remote host reading the backup file
-bblock size >
The size of each dump record chunk, in bytes, if the size of the media block is not specified,restore automatically detects the size of the media chunk
-R
specifying where to recover
the file system block size is 4k.
The limitation of the Ext2 file system is that when the data is written incorrectly, the system needs to check the disk to spend a lot of time when it starts to recover, so there is a ext3,Ext4 This type of log file system. These file syste
program code can recognize it.
In GCC, we can declare a reference to an external function as a weak reference by using the Extended keyword "__attribute__ (weakref)", such as the following code:
1 __attribute__ ((weakref)) void foo ();2 int Main ()3 {4 foo ();5}6
We can compile it into an executable file and GCC does not report a link error. But when we run this executable file, a run-time error occurs.
Linux file and directory permissions are mainly controlled by the standard Linux file permissions and Control access list (ACL) two blocks. In general, standard file permissions have met most of our needs, but one of the limitations of this is that restricted access to
Analysis of common Linux File Management commands
1. What are the file management commands on Linux? Common usage and related examples.
(1) Directory management commands-- Ls: list content in a specified directoryFormat: ls [OPTION]... [FILE]...-A: displays all files, includ
July 29, Marco Linux study on the fifth day, the main content of study:First, the index nodeSecond, hard links and soft linksIii. Redirection and pipingIv. Users and user groups
First, index node
A node (an index node) is a table item that contains information about the file (metadata), including:File type, permissions, Uid,gidNumber of links (pointing to the number of path names for this
Creating partitions or new file systems in Linux usually means one thing: Install the Gnome Parted Partition editor (GParted). This is the only way for most Linux users. However, have you ever considered creating these partitions and filesystems at the terminal? Of course! Here's how!
Use Cfdisk to create a basic Linux
Label:
Basedir = Path
Use the given directory as the root directory (the installation directory).
Character-sets-dir = Path
Gives the directory where the character set is stored.
DataDir = Path
Reads the database file from the given directory.
Pid-file = filename
Specify a file that
We know that Linux has a mind "everything is a file (including hardware)", this is a basic document management experienceFile system structure elementsFile system and directory structureFeatures of Linux files:
File names are case sensitive
To. The opening file
specific symbols between commands. In particular, the syntax for these symbols is as follows:> file1The above command executes Command1 and then stores the output in File1.Note that any content that already exists within the file1 will be replaced by new content. If you want to add new content to the end of the file, use the >> operator.InstanceExecute the following who command, which redirects the full output of the command to the user
library files required by the system program, similar to the shared library DLL file for Windows.
8./lost+found in the ext2 or ext3 file system, when the system crashes unexpectedly or the machine shuts down unexpectedly, some file fragments are produced here. When the system starts, the Fsck tool checks here and repairs the corrupted
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.