Ten commands required for Linux commands and ten commands for linux
Linux has now become the most popular Operating System in the software industry. Mastering Linux has become a required professional skill for every developer.In order to help you learn, I hope you can master the ten commands that you must master when
Common Linux commands-permission management commands-Other permission management commands, and common command permission management
Command name: chownEnglish: change file ownership
Command path:/bin/chown
Syntax: chown [user] [file or directory]
Function Description: Change the owner of a file or directory.
Example: chown shenchao fengjieChange the owner o
Command name: ChownEnglish: Change file ownershipCommand path:/bin/chownSyntax: chown [user] [file or folder]Description of the function: Change the file or folder of the entire personExample: Chown Shenchao FengjieChange the file Fengjie the whole person is ShenchaoCommand name: CHGRPEnglish: Change file group ownershipCommand path:/BIN/CHGRPSyntax: chgrp [user] [file or folder]Function Description: Change the group to which the file or folder belongsExample: Chown lampbrother FengjieChange fil
if the compressed file is a very large case.Tar command-Function Description: File package and unpacking.-Command format: tar [parameters] -Common parameters:-F Name: Use name to specify the archive file name or device name.-V: Lists processing details.-C: Used to create a new archive file.-X: Restore the backup file from the archive file.-T: Used to list the file names in an archive file.-Z: Compress files or unzip with GNU Gzip.-Z: Compress files or unzip with compress.-j: Compress files or u
very large case.Tar command-Function Description: File package and unpacking.-Command format: tar [parameters] -Common parameters:-F Name: Use name to specify the archive file name or device name.-V: Lists processing details.-C: Used to create a new archive file.-X: Restore the backup file from the archive file.-T: Used to list the file names in an archive file.-Z: Compress files or unzip with GNU Gzip.-Z: Compress files or unzip with compress.-j: Compress files or unzip with bzip2.-use Example
ThumbInstruction Set
The thumb command can be seen as a subset of arm commands in the form of compression. It is proposed for the code density [1] and has a 16-bit code density. Thumb is not a complete architecture and cannot expect the processing program to execute only thumb instructions rather than arm instruction sets. Therefore, the thumb command only needs to support general functions. If necessary, you can use a complete arm instruction set. F
I. Differentiate the arm instruction set from the thumb Instruction Set first.The thumb command can be seen as a subset of arm commands in the form of compression. It is proposed for the code density problem. It has 16-bit code density, but it is not as efficient as arm commands. thumb is not a complete architecture. It cannot expect processing to only execute thumb instructions, but does not support arm in
Interview Questions: common linux commands and common linux commands
Command for displaying directories and files
Ls: Command Used to view all folders.
Dir: command Tree used to display the specified folder and Directory: list the directory content in a Tree chart
Du: displays the directory or file size.
Modify directory, file permissions, owner, and array commands
10 of the python third-party Library Series-commands library, python-commandsWe are talking about using the commands module to execute Linux shell commands. When we use Python to write O M scripts, we often need to execute linux shell commands, the commands module in Python
Common Linux shell commands and shell commands
I. Basic commands
1. Shut down immediately and restart again. Execute the following command:
Shutdown-r now or reboot
2. Shut down immediately and execute the following command:
Shutdown-h now or poweroff
3. Wait for two minutes to shut down and restart again. Execute the following command:
Shutdown-r 2
4. Wait for 2
Sed commands for file operations, sed commands for detailsFile Modification in a simple shell script in Linux1. Introduction to SedSed is an online editor that processes a row of content at a time. During processing, the currently processed rows are stored in the temporary buffer, called patternspace. Then, the sed command is used to process the content in the buffer. After processing, send the buffer conte
Linux commands-common file operation commands
Original works of Lin bingwen Evankaka. Reprinted please indicate the source http://blog.csdn.net/evankaka
Abstract: This article focuses on Linux commands-common file operation commands with examples
Ls
This command is often used to display the files in the current directo
, including TCP, UDP, ICMP and IP statistics, etc.
6. Detect ARP Bindings (dynamic and Static) list, show all connected to my computer, display the other IP and MAC address
Arp-a
7. On the proxy server side
Bundled IP and MAC addresses to address local area network misappropriation ip!:
Arp-s 192.168.10.59 00-50-ff-6c-08-75
Unbind the IP of the NIC from the MAC address:
ARP-D Network card IP
8. Hide your computer from a network neighbor (let others see you!)
NET config Server/hidden:yes
Common CentOS commands and common centos commands
// Linux common command query link: http://linux.chinaitlab.com/special/linuxcom/
I. View cpu using common CentOS commands
More/proc/cpuinfo | grep "model name"Grep "model name"/proc/cpuinfo[Root @ localhost/] # grep "CPU"/proc/cpuinfoModel name: Intel (R) Pentium (R) Dual CPU E2180 @ 2.00 GHzModel name: Intel (R
Built-in and external commands in Linux
1. linux commands can be divided into internal commands and external commands:
Internal commands are transferred to the memory at system startup, Which is resident memory, so the execution efficiency is high.
External
Common commands in Linux (1) and Common commands in linux
Address:Http://www.cnblogs.com/archimedes/p/linux-commands1.html, Reprinted, please specify the source address.Ls command
Ls is used to list the contents of a directory. It is one of the most commonly used commands. The format of ls is as follows:
Ls [Option] [directory name or file name]
Main parameters:
http://blog.csdn.net/pipisorry/article/details/44681081Little TricksDirect view of Linux shell commands and explanations in the command lineMans commandHelp commands for better use under Linux-cheat#pip Install cheat$cheat Tar[better use of Linux help command-cheat]Copy, paste on the command lineIn the Ubuntu Terminal window, the shortcut keys for copying and pasting need to be added shiftCopy: Ctrl+shift+c
Introduction to three AngularJS commands that can improve user experience, and angularjs commands
1. profile picture
To display a profile picture in your application, you need to use your email address to convert the address to lowercase and use md5 to encrypt the string. Therefore, it is wise to use commands to achieve this and reuse it.
/* * A simple Gravatar
Common Linux commands (version 2) and common linux commandsPermission management commands
1. chmod [change the permissions mode of a file]:/bin/chmod
Syntax: chmod [{ugo} {+-=}{ rwx}] [file or directory name] // intuitive
E. g. chmod u + wx filename
Chmod o-x filename
Chmod g = rwx filename
Or: chmod [mode = 421] [file or directory] // recommended
Number of the permission pair:
R-4
W-2
X-1
E.g. rwxr-xr --
The following describes the most common Linux commands for linux cd.
Linux cd commands are the most common commands in linux. We need to use these commands almost all the time.The cd command is also available in DOS. It has the same functions as the linux cd command, but there are also differences. Let's explain it bel
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.