A Linux guru for beginners.

Source: Internet
Author: User
Tags microsoft edge

http://www.linuxdiyf.com/viewarticle.php?id=168606

A Linux Master for beginners (turn)

Now when a lot of people start to touch the computer, they should see Windows98.
To tell the truth, 98 is already a very humane, packaged very good system of
A person who doesn't have a computer can use it very quickly. So many people have
The impression of "computer" and the ones that are like me first contact is the DOS man is absolutely not
The same. In the age of DOS, if you don't understand the basics of computers, you can't play
Move it, not like many people now CPU is not know anything, but can be flash
Master, pour mm countless. If you are such a person, you want to learn Linux, you have a
Step back to go, why, look down
Let's look at the development of the MS operating system, he has two sets of cores

MSDOS--->dos+win3.2-->win9x/
--->WINXP
WindowsNT3.1---nt4.0-->win2000/

His development is from the dos of this pure character interface to a system developed by the character interface
The kernel plus an Image interface application (Win3.2) to combine the two
As one of the Win95, until now and then the beginning is the graphical interface of NT to become
WindowsXP, his future ambition is to become a. NET on the Internet

Now let's see Linux,linux is just a kernel! This is important, you must
Understand this.
Only one kernel can not form an operating system. Now the Linux operating system
such as Redhat, blue dots, red flags, etc., are used in such a kernel, plus other
Applications (including x). Anything that's called an operating system is
This makes up the following: Kernel + user interface + general application.

Now I'm going to take the MS System and the Linux system to correspond to each other to let everyone more
Understanding Linux

If you have a DOS, then you must know that the whole hard drive after the installation is complete.
The root directory has
Io.sys Msdos.sys Command.com Config.sys Autoexec.bat
A total of 5 files, and C:/dos This directory, very simple. which
Io.sys and Msdos.sys are the kernel of the system, Command.com is the user interface (shell),
Config.sys and Autoexec.bat are configuration files, the C:/dos directory below is the generic application
The system starts by loading the Io.sys and then loading the Msdos.sys with the configuration file settings
Command.com, then a prompt appears, and now you can enter the command. Such as
Copy c:/aaa.txt d:/aaa.txt to copy the file. You can also use the C:/dos directory
Some applications to complete the work, such as editing files with edit, writing basic programs with QBasic.
Then you install a program called Foxpro2.6, which allows you to do some
Database work, and then you install a program called windows3.2 Chinese version
, this program is awesome, you don't have to command the command line now, you can use the mouse to
Action, open File Manager, open C and then open another window D, with the mouse a pull
You can finish copy c:/aaa.txt d:/aaa.txt This command, you just move the index finger a few times
It's no different from the Windows98 now.

OK, Goto Linux

After installing Linux
The root directory has boot,bin,sbin,etc,usr/bin, and several directories
Boot under the Vmlinuz this file, this is the kernel, is currently the world's most powerful hacker
Linus to take the lead in writing that stuff.
The bin has sh, this is the shell (==command.com, user interface)
Because UNIX systems do not have internal commands, it is accurate to say
/bin+/sbin = = Command.com
and/etc = = Config.sys + Msdos.sys
Left/usr/bin = = C:/dos
Of course. Because Linux is much larger than DOS, reahat and red flags have different ways of arranging,
Things in various directories are not regular.
Linux boot is also loaded with VMLINUXZ and then loaded sh (or other shell, such as bash),
Out prompt. Now you can also enter the command. Such as
Cp/aaa.txt/tmp/aaa.txt. You can also use VI to edit the file, using GCC to compile the program
Next you install a program called MySQL, this program can let you do some
Database work, and then you install a program called kde4.0, this program can be a bad
, you don't have to command the command line now, you can use the mouse to operate, open the File Manager,
Open/Reopen another window/tmp, you can complete the cp/aaa.txt/tmp/aaa.txt with one mouse pull
This command, you just moved a few times the index finger and now under the Windows98 is no different.

See here I hope you understand why I say you're going backwards,
Because of the current Linux operating system ==ms Win3.2
But the MS System has gone through the 9X, now XP, a whole two generations behind. Of course, this is from the user interface to say, but it is precisely a lot of people installed Linux is in the X KDE on the east, and nothing else can not get up, why do not get up because you do not have DOS, you do not know that the system can also have such pointers. You first contact is 98, the computer gives you the feeling is to use the mouse to manipulate things, you think the same is the operating system, Linux should be such things. You never thought you were playing Linux, but in fact you're just playing a Linux system.
Program.
So a lot of people put up a few days to say, rely on, Linux is so. It can be said right or wrong.
Linux, you haven't seen what it looks like, what qualifies you to say it?
But KDE, it really is so much, you used 98, now you go to use 3.2 to see what you have
Feel? From the stability, I do not take 98 compared, take 95, if the same job, 951 days crash 1 times
, that x crashes 10 times, and if it is 2000, 20,001 days crashes 1 times and x crashes 100 times.
And 3.2 is the same. But why would I still hear about some Hollywood stunts like that on Linux?
Done with it? In order to attend an important banquet, you can buy a brand-name suit, or you can order a
Set, the custom-made of course more good-looking, but the price is more expensive, the workload is also greater
Designer Suit ==windows System
Custom-made suit ==linux system + Modify system kernel + Modify x code + modify KDE code + specially written stunt software The suit you're wearing now is street-side goods, that is, Reahat clothing factory in order to adapt to all the world's body mass production of dongdong.
Do you understand? If you understand, then you understand that Linux is better than window one aspect, I will not have to talk nonsense

So why does Linux tend to have a relationship with hackers?
Remember I read a book that says, "Linux is made up of a hacker called Linus and a lot of customers on the Internet
Co-authored ". So, how does a system written by hackers have nothing to do with hackers?
Of course, the definition of this "hacker" and now a lot of Chinese people's minds of the "hacker" definition is absolutely different
The former is almost never invaded by other systems, and the latter is an intrusion.

If you are an art worker, you are almost in addition to sleeping on the computer, you always open Photoshop there to engage in, in the art industry, you can also be a master in this industry. But you don't care what you do, how the computer actually helps you do it. A computer is just a tool you create. Like music is a lot of people like to listen to, but you do not care about the music you hear, she from the original singer's mouth to come to be appreciated by you, she is what a matter. But for a hifi enthusiast, that's all she cares about. Now go back to the copy command I just said, and for a hacker, she doesn't care about aaa.txt.
The contents of this file, she is concerned about from C:/aaa.txt to d:/aaa.txt the process, the computer what it did? Now let me ask the person who is reading this post: Copying a file from one place to another is something you must have done, right? But when you do this, do you ever wonder how it's done inside the computer? If your answer is: Gee, I never really thought about it.
Well, you do not have the talent of hackers, you still go to a relaxed moment mixed more promising.
The root of the question is the nature of hackers, at this point, Linux can meet, but Windows cannot,
You press copy c:/aaa.txt D:/aaa.txt on DOS. The copy task is done, but what does the computer do, you know?
You can only accumulate based on your experience, the approximate judgment system how to complete, before you read the copy source code, you can not determine whether your judgment is correct. But the source code of CP on UNIX is basically readily available.
TCP/IP, Linxu can let you stick a stick into the kernel, but windows you can only poke to the Winsock
Apache and system specific communication you can be clear, but IIS and the system of communication you could not know
The relationship between Linux and hackers is here, and the intrusion is not a matter of any kind. Many of the remote vulnerabilities of the attack program is to be compiled on the UNIX system this is true, but the meaning of those programs is to give an example to let you know that you can understand the words, change to win on the same could be compiled.

UNIX and Windows have too many advantages, there are too many places worth you to do, but I can't say just like when you love someone, you can not say what you love him, she has a place worthy of you to love
But, Windows is not garbage, absolutely not, as a tool to use, she is hundreds of times times better than Unix
It seems you should understand why a lot of remote vulnerability Attack program is written in the habit of UNIX, because it can be found that the vulnerability, he is familiar with the system, but also UNIX to make him familiar with the system, he is not consciously using the Unix of the set, but, It's a lot of code that might have been knocked out of windows with UltraEdit.

It seems to be off the topic, I said I want to learn Linux (UNIX) friends a little advice, but said so,
But I think there is no point, I hope you see here already can know what I want to give you the advice is what.


1. Based on your current level, determine how much Linux means to you.
2. Make sure you're playing Linux instead of X
3. Remove the X system and the remaining space is loaded with the source code
4. Do not install the program in a rpm-i way, using your own method of compiling
5. Find a suitable Telnet software, I recommend SECURECRT.
6. If you have only one computer, install VMware. In this way, contact UNIX.
7. Take a look at the post, and once again feel the hidden suggestions in my post
8. In the course of Learning Linux, write down the experience of playing Linux.
9. In the process of playing Linux, how to write Linux how you play the interesting notes
Read (639) | Comments (0) | Forwards (1) |0

Prev: (repost) as a Japanese

Next article: Linux useful commands and configuration summary

Related Popular articles
    • Welcome to CAE Beginner in Chinaunix Blog ...
    • JSP nesting
    • SSH connection to Linux is maintained and reused ...
    • Audio Video chat Development: 9 Sound suggestions ...
    • How to reset Microsoft Edge Browser for wind ...
    • Common Linux Service ports
    • Xmanager 2.0 for Linux configuration
    • "Rootfs build" BusyBox httpd ...
    • OpenWrt in Luci study notes
    • What is a shell?
    • Linux DHCP Peizhi ROC
    • Soft links to Unix files
    • What does this command mean, I'm new ...
    • What does sed-e "/grep/d" mean ...
    • Who can help me solve Linux 2.6 10 ...
Leave something to the owner! ~~ Comment on the hot topic

A Linux Master for beginners (turn)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.