First, prepare
AIX is a UNIX operating system developed by IBM; The command looks similar to Linux;
1. Installation of Putty;putty is a remote login software;
2.ip:121.8.131.125
3. User name: Tguser
4. Password: 9ol.) P:?
ii. Login and logout
1. Login:
SSH root@192.168.0.72
Password: 1qaz@wsx
2. Log out:
(1) Logout
(2) Exit
third, passwd to change the password
Iv. Date Order
1.date: Returns the current date
2.cal: Calendar command
Example:
(1) Cal 2011: Returns a calendar of 2011 years
(2) Cal 10: Returns the calendar of 10 A.D.
(3) Cal 10 2011: Return to October 2011 calendar
v. Clear, Echo, banner command
1.clear: Clear Screen
2.echo: For example, echo Hello world! displays the Hello world! on the screen
3.banner: Returns uppercase text, such as Banner H;
# #
## ###
# #
Vi.. Who, Finger order
1.who: Returns all users logged in the system;
2.who am I: Returns the user information of the current login;
3.finger: Return all user's details;
Seven, mail command
1. Send mail
$ Mail root//send mail to root user
Subject: Meeting//Write header header for meeting
Meeting at 10:00//After the body ends press Ctrl+d
Cc: <ENTER>//press ENTER
In this way, an email is sent to the root user;
2. Receive mail
Enter mail to display a list of incoming messages, enter T 1 if you want to see the first one, or T 2 if you want to view the second letter;
viii. Order of Wall
This command can send a message to any user who opened the terminal, as long as the input
Wall Hello world will be able to send Hello world to any other user who has opened the terminal;
Ninth, talk order
Talk can achieve communication between the two sides;
Talk Xiazdong can send invitations to Xiazdong, waiting for Xiazdong to respond;
10. MESG Command
Allow or deny others to send you messages;
MESG N; refuse to send messages to you;
The default is to allow others to send messages to you;
11. Man Command
Man to show an introduction to the commands allowed in Aix
Application: Man-k Hello; Find the command that contains the keyword hello in the all command introduction and return;
12. Introduction of File system Structure
We can access the file through the name of the directory or the inode.
What we see is the contents of the directory block.
13. PWD Command
Print working directory, which returns the current directory
14. ls Command
1.ls: Returns the full file name of the current directory
Parameters:
-A: Lists all files (including hidden files);
-R: Recursively lists all files and sub-files;
-L: Lists the full file details;
-I: Lists the inode number of the file;
-D: Returns information for the current directory;
Example:
Ls-lia: Returns all files including hidden files, inode numbers, and details;
15, mkdir, rmdir command
1.mkdir: Create a directory;
2.mkdir-p x1/x2/x3: Create multiple directories as directory hierarchy;
X1
|-x2
|-x3
3.rmdir: Delete directory (if this directory is empty);
4.rmdir: Delete the directory hierarchy (provided this directory hierarchy is empty);
16. Touch Command
Touch naming is used to create files;
Example: Touch file, or if a file file already exists, update the modification time, or create the files if there are no file files;
17. CP Command
Used to copy files;
Template
(1) CP source target
(2) CP file1,file2,.... filen target_dir;
Example:
(1) CP file1 File2
(2) CP myfile1,myfile2 Mydir Copy the Myfile1,myfile2 to the Mydir directory;
18. MV Command: Rename or move files
(1) MV Source target
(2) MV File1,file2,.... Filen target_dir;
(1) MV file1 file2 Rename the file1 file to File2;
(2) CP myfile1,myfile2 Mydir move myfile1,myfile2 to the Mydir directory;
19, Cat, PG, more commands
These three commands are the contents of a text file;
1.cat: Display the tail of the file;
2.PG: Start from the beginning, can page back, but not to page forward;
3.more: Start from the beginning, can be backward to page forward;
20. ln command
Link file, divided into hard links and symbolic link;
1. Hard connection: ln sourcefile targetfile; SourceFile hard link to targetfile;
2. Symbolic Link: ln-s sourcefile targetfile; link sourcefile symbol to targetfile;
the difference between hard joins and symbolic Links:
21. RM Command
TEMPLATE:RM File1,file2,.... ;
Parameters:
-I: Prompt before deletion;
-F: Forced deletion;
-R: no prompt before deletion;
22. chmod command
When the input ls-l, you will see a string similar to drwxr--r--, in fact, this is a file permission;
D indicates that the file type is a directory;
File permissions are composed of R (readable), W (writable), x (executable);
Type of person manipulating the file: U (file owner), G (group), O (other person), a (all);
Set file permissions: + (ADD),-(delete), = (Assignment);
D rwx r--r--: The first group of RWX represents the rights of the owner of the file, the second group represents the rights of the Group, and the third group represents the other person's rights;
We can also put rwx in octal,-that is 0, otherwise 1;
RWX represents 111, or 7 of the octal;
R-x represents 101, or 5 of the octal;
Example:
(1) chmod 777 myfile; To set the authority of all to rwx;
(2) chmod go+w myfile; Add g and O to writable permissions;
(3) The effect of chmod a=rwx myfile; (1);