Read about practical guide to linux commands, The latest news, videos, and discussion topics about practical guide to linux commands from alibabacloud.com
program, a normal user can temporarily obtain the root privileges of the user through the sudo command. But you must enter the root user's password.
passwd
Want to change your password? Enter this command in the terminal, which prompts you to enter the current password and then enter the new password.
Remember: The distribution documents you use often can help you. For example, in Ubuntu, the Help section in the command line is a good place to learn these
Linux system task-related commands
Fg, bg, jobs, , ctrl + z are all related to system tasks. Although these commands are rarely used, they are also very practical.
Most frequently usedThis command is used at the end of a command and can be executed in the background.
Ctrl + zYou can put a command that is being ex
Working for two or three years, every day with Linux, but often use the Linux command is like a pen to forget how to use, often look up manuals or to find information online. This series of articles is primarily designed to make it easy for you to access your commands whenever you want. I Caishuxueqian, if there is any mistake in the message can be corrected, for
change the file name in bulkURL commandThe URL is a tool for simple testing of Web Access under the Linux system command line, with a few common options you need to master-X can specify IP and port, omit write hosts, convenient and practical-I can drop the contents of the access, only show the status code,-V can show the detailed process-u can specify user name and password-O (uppercase) direct download pa
~ 3 rows of CPU information; m: Hide/display 4th ~ 5 rows of memory information; 1, I Toggle SMP view: '1' single/separate states; 'I' Irix/Solaris mode 1: single/multi-row Display CPU information; I: irix/Solaris mode switch f, o. fields/Columns: 'F' add or remove; 'O' change display order f: Column display Control; o: column sorting control; f or o adjusted by letter. select sort field Select the sorting column
References
Linux top
Seven interesting Linux Sort commands (2)
In the previous article, we have discussed multiple examples of the sort command. If you miss this article, you can click the link below to read it. As part of the previous article, this article will discuss the remaining usage of the sort command. Together with the previous article, it will serve as a complete guide to t
Guide
Linux has a big impact on our lives. On Linux, however, you should usually use terminal commands instead of just clicking on the launcher image (just like you do on Windows). These 10 basic Linux commands and important
file "Cats" to "dogs", and enter "MV Cats ~/desktop" to move the file "Cats" to the desktop directory without renaming it.9. MoreThe "more" command lets you see more content in one screen at a time.Ten. KillYou want to close a program, which is probably the most efficient way to come. Use the "PS" command to locate the process ID you want to close, and enter "kill" to close the process.One. sudoPart of the reason the Linux system is so secure is that
filetouch [filename]mkdir make directories Create directorymkdir [directory Name]CP Copy a directory or filecp-r [source file or directory] [destination directory]-r Copy Directory, add this option to copy directory-P new directory and file creation times are the same as source filesMV Move cut (move) file, renameMV File1 File3File renamingMV File2 Dir2Moving filesrm Remove Filesrm-r [file or directory]-R plus this option to delete the directory-F will not ask whether or not to confirm the dele
Use of Linux sar commands 1. Common sar command line formats: sar [options] [-A] [-o file] t [n] in the command line, the n and t parameters are combined to define the sampling interval and number of times. t indicates the sampling interval, which is a required parameter. n indicates the number of samples and is optional. The default value is 1, -o file: stores command results in binary format. file is not
The Shell concept : Also known as "shell", acts as a human and kernel (hardware) Translation officer. When the user "tells" the shell, he calls the appropriate program service to perform the work.Bash (Bourne-again SHell): Now the mainstream default characters for many popular Linux systems, including Red Hat systems. Bash is the default character interpreter for most Linux systems.Bash Benefits:1. Save His
The effect is to convert the argument list to small pieces to pass to other commands to avoid the problem of too long argument listXargs is a filter that passes parameters to the command, and is also a tool for combining multiple commands. It divides a data stream into small enough chunks to facilitate the processing of filters and commands. Typically, Xargs read
"l" before the command, easy to remember.Example: LCD lpwd lmkdir2.scpScp:secure copy (remote file copy program) is also a file transfer command based on the SSH security protocol. Unlike SFTP, it only provides file transfer between hosts, without the ability to manage files.Copy local_file to remote directory Remote_folderSCP Local_file [Email Protected]:remote_folderCopy Local_folder to remote Remote_folder (need to add parameter-R recursion)Scp–r Local_folder [Email protected]:remote_folderT
Guide
Linux system, we often use the man command to help see the specific use of this command, man is very powerful, but the English poor classmate with man may not be so handy, naturally appeared the Cheat command, The Cheat command is a simple example that tells you how to use a command, which is created to help system administrators remember common system comman
, run
Service iptables stop -- stop
Service iptables start -- start
However, in practical applications, firewall is disabled to reduce the security of the server.If you telnet the VM's 8080 window in the dos window of the host machine, it will fail. it can be determined that the VM's 8080 window is faulty and should be blocked by the firewall. Modify the firewall settings.
2. modify the/etc/sysconfig/iptables file to modify the firewall configuration
Article Title: Linux User and user group management commands. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Linux is a multi-user mult
storage device here)
There may be a warning box, if you have previously installed the virtual machine, this warning will appear, select Yes, ignore all the data can be
18th Step: Enter host name
19th Step: Configure the Network
20th step: Set time zone, check use UTC time
21st Step: Enter the root user (root) password (in this to remind the installation of child shoes, user password best Remember, I guess you spend a period of time useless will forget, do not believe you can try,
I am a beginner of Linux, the experience certainly is not so comprehensive as Daniel, but I want to put myself in the learning process of all the learning and some of my own sentiment write down.First of all I read the book is "Bird's private food", this is a very good book, but you will find that you are in the process of reading is very boring, because the previous 4 chapters are talking about the principle of computer, for like me a have been expos
Guide
The procedure in progress is called a process. When a program can execute files stored in the store and run, each process is dynamically assigned system resources, memory, security attributes, and the state associated with it. Multiple processes can be associated to the same program, and simultaneous execution does not interfere with each other. The operating system effectively manages and tracks all running processes.
To manage
The Linux operating system has received a lot of attention. The Linux operating system has caught up with Microsoft, so many people learn about the Linux operating system. tr is a very practical tool for the Linux operating system, in fact, almost all things done with tr can
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.