A master of Linux learning write to Beginners

Source: Internet
Author: User

Turn from: http://www.kuqin.com/linux/20070907/932.html

Now a lot of people start to touch the computer when, see should be Windows98 to tell the truth, 98 is already a very human, encapsulated a very good system a computer ignorant people can quickly use it. So many people on

The impression of a "computer" is quite different from the one that I first contacted as a DOS person. In the DOS era, if you do not understand the basic knowledge of the computer is not to play it, unlike many people now CPU is not know what, but can <!--newszw_hzh_begin--><!--newszw_hzh_end--> Is Flash

Master, dumped mm countless. If you are such a person, you have to learn Linux, you have a way back to go, why, look down

Let's take a look at the development of Ms operating system, he has two sets of kernel msdos--->dos+win3.2-->win9x--->winxp WindowsNT3.1---nt4.0-->win2000/

His development is from DOS this pure character interface system developed to a character interface of the kernel plus an image interface of the application (Win3.2) to the combination of the two integrated Win95, and now again and the first is the graphical interface of NT to become

Windows XP, his ambition in the future is to be on the internet and become. NET now let's see Linux,linux is just a kernel. This is important, and you have to understand that.

Only one kernel does not constitute an operating system. Today's Linux operating systems such as redhat, blue dots, red flags, etc. are all made up of such a kernel, plus other programs (including x). Anything that is called an operating system is constructed like this: the kernel + user interface + general application.

Now I will take MS System and Linux system for each other to let people know more about Linux if you have installed DOS, then you must know that after the installation of the entire hard drive is such a root directory Io.sys Msdos.sys command.com Config.sys Autoexec.bat a total of 5 files, and C:dos This directory, very simple. Where Io.sys and Msdos.sys are the kernel of the system, Command.com is the user interface (shell), Config.sys and Autoexec.bat are configuration files, c:d The OS directory below is when the general application system starts by loading the Io.sys first, then loading Msdos.sys and Command.com according to the configuration file's settings, and then the prompt appears, and now you can enter the command. Copy the file, such as Copy C:aaa.txt D:aaa.txt. You can also use some of the apps in the C:dos directory to do the work, such as editing files with edit and writing basic programs with QBasic.

Then you install a program called Foxpro2.6, this program allows you to do some database work, and then you install a call windows3.2 Chinese version of the program, this program can be very powerful, you do not have to command line at now command, you can use the mouse to operate, open the File Manager, open C Then open another window D, with a mouse pull can complete the copy c:aaa.txt d:aaa.txt This command, you just moved a few times forefinger and now in Windows98 under no two.

OK, goto Linux installed Linux after the root directory has boot,bin,sbin,etc,usr/bin, and so on a few directories

Boot has vmlinuz This file, this is the kernel, is currently the world's most powerful hacker Linus take the lead to write that Dongdong.

There is sh under the bin, this is the shell (==command.com, user interface) because the UNIX system is not internal command this argument, accurately/bin+/sbin = = Command.com and/etc = = Config.sys + Msdos.sys left/usr/bin = = C:dos

Of course. Because Linux is much larger than DOS, reahat and red flags may have different arrangements, and things under various directories are irregular. Linux launches are also loaded with VMLINUXZ, then load sh (or other shell, such as bash), out of the prompt. Now you can also enter the command. such as Cp/aaa.txt/tmp/aaa.txt. can also use VI edit file, with GCC compiler program

Then you install a program called MySQL, this program allows you to do some database work, and then you install a program called kde4.0, this program is very powerful, you do not have to command line command, you can use the mouse to operate, open the File Manager, open/ Then open another window/tmp, with a mouse pull can complete cp/aaa.txt/tmp/aaa.txt This command, you just moved a few times the index finger and now under the Windows98 no different

See here hope you understand why I said you are going backwards, because the current Linux operating system ==ms Win3.2 But Ms System has gone through 9X, now is XP, a full lag of two generations. Of course, it's from the user interface, but it is also a lot of people install a Linux is in X's KDE to engage in the east, and other things can not get up, why can't get up because you have not done dos, you do not know the system can still have such way. You first contact is 98, the computer gives you the feeling is using the mouse to operate things, you think the same is the operating system, Linux should also be such things. You never thought you'd always think you're playing Linux, but in fact you're just playing a program that runs on a Linux system. So a lot of people installed after a few days to say, rely on, Linux so much. This can be said or not to Linux, you have not seen what it looks like, you have any qualifications to say how it is. But KDE, that's really the way it is, you used 98, now you go to use 3.2 to see what you have

Feel. From the stability, I do not take 98 ratio, take 95, if the same work, 951 days crash 1 times, that X will collapse 10 times, if it is 2000, 20,001 days collapse 1 times, X will collapse 100 times. And 3.2 are about the same. But why do you hear that some Hollywood stunts like this are done on Linux? In order to attend an important banquet, you can go to buy a set of brand-name suits, you can also go to order a set of course more fit more beautiful, but also more expensive, more work, and more heavy-brand suit ==windows system custom Suit ==linux system + Modify system kernel + Modify x code + modify the KDE code + Specially written stunt software you are now installed that suit is a street goods, that is, Reahat clothing factory in order to adapt to all the people in the world of mass production of the stuff. Get it. If you understand, then you will understand that Linux is better than window, I also do not have to nonsense, then why Linux is often and hackers to withdraw the relationship. I remember reading a book that says, "Linux is written by a hacker called Linus and a lot of hackers on the Internet." So, a hacker-written system is not related to hackers. Of course, the definition of "hacker" and now many Chinese people in the mind of the "hacker" is a very different definition of the former is almost never invaded other systems, and the latter is the invasion.

If you are an art worker, you are also almost in addition to sleep on the computer, you are always open Photoshop in there to do, in the art of this industry, you can be regarded as a master of the industry. But you don't care what you do, how the computer actually helps you do it. A computer is just a tool you create. Like music is a lot of people like to listen to, but you do not care about the music you hear, she came out from the original singer's mouth to be appreciated by you, she is what is going on. But for a hifi enthusiast, that's all she cares about. Now back to what I just said about the copy command, for a hacker, she doesn't care about the contents of the Aaa.txt file, she is concerned about the process from C:aaa.txt to D:aaa.txt, the computer what it did. Now I'm going to ask the person who is looking at this post: You must have done something to copy a file from one place to another. But when you do, do you ever think about how it's going to do it inside your computer? If your answer is: oops, I really never thought Yes ~ ~ Then, you do not have the talent of hackers, you still go to a relaxed moment to mix more promising.

Root-seeking is the nature of hackers, in this case, Linux can be met, but Windows can not, you press the copy C:aaa.txt D:aaa.txt on DOS. The task of copying is done, but the computer did what you know. You can only rely on the accumulation of your experience, the approximate judgment of how the system is done, before you read the copy of the source code you have no way to determine whether your judgment is correct. But the source code for CP on UNIX is basically readily available.

In TCP/IP, Linxu can let you poke a stick into the kernel, but windows you can only poke the Winsockapache and the system of specific communication you know, but IIS and system communication you can't understand Linux and hacker relationship is here, It has nothing to do with the invasion. Many remote vulnerabilities are being compiled on UNIX systems. That's right, but the original meaning of those programs is to give you a good example of how you can read them and change them to win.

UNIX has too many advantages over windows, there's so much to be worth, but I just can't say it like when you love someone, you can't say what you love, she has a place to love but Windows is not rubbish, absolutely not, as a tool to use, She's hundreds of times times better than Unix. It seems you should now understand why many remote vulnerabilities are written in Unix habits, because he was able to discover the flaw, he was quite familiar with the system, and Unix made him quite familiar with the system, and he unconsciously used the UNIX set, but It's very likely that the code is knocked on Windows with UltraEdit.

It seems to be off the point, I said, to give some advice to a friend who wanted to learn Linux, but said so,

But I don't think it's irrelevant, I hope you see here already to know what I'm going to give you advice.

1. Depending on your current level, determine how much Linux means to you.

2. Make sure you're playing Linux instead of X

3. The X system is unloaded, and the remaining space is loaded with source code.

4. Do not install the program in a rpm-i way, using your own compilation method

5. Find a shared Telnet software, I recommend SECURECRT.

6. If you have only one computer, install VMware. To access Unix in this way

7. Another look at the post, I once again feel the hidden suggestions in my post

8. In the process of learning Linux, the experience of playing Linux is noted

9. In the process of playing Linux, how to get Linux by the funny things you play down

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.