It turns out that Linux is like this.

Source: Internet
Author: User
It turns out that Linux is like this-general Linux technology-Linux technology and application information. The following is a detailed description. Now, when many people begin to access computers, they should see Windows 98. To be honest, 98 is already a very user-friendly and encapsulated system.
Anyone who knows nothing about computers can use it quickly. In this way, many

The "computer" is very different from the DOS people I first came into contact. In the DOS era, if you do not understand basic computer knowledge
Unlike many people who don't know what the CPU is, they can be Flash masters, dumping numerous MM. If you are such a person, you want to learn Linux, you
There is a long way to go. Why? Let's take a look.

Let's take a look at the development of the MS operating system. It has two kernels: MSDOS ---> DOS + Win3.2 --> Win9X \

---> WinXP WindowsNT3.1 --- NT4.0 --> Win2000/

His development is from the DOS pure character interface system to an application program (Win3.2) that combines the kernel of the character interface with an image Interface
The two Win95 are integrated, and now, at the beginning, the NT of the graphic interface becomes

Windows XP, his ambition in the future is to become. net on the internet. Now let's look at Linux. Linux is just a kernel! This is important.
Solve this problem.

Only one kernel cannot constitute one operating system. The current linux operating systems such as redhat, blue dot, and red flag all use such a kernel.
Other applications (including X. Anything called an operating system is like this: Kernel + User Interface + general applications.

Now I will take the correspondence between MS and linux systems to let everyone know more about Linux. If you have installed DOS, you must know that after the installation is complete
In this way, the root directory contains five files, namely io. sys msdos. sys command.com config. sys autoexec. bat, and the C: \ dos Directory, which is very simple.
Single. Io. sys and msdos. sys are the system kernel, command.com is the user interface (shell), config. sys and autoexec. bat are the configuration files,
Under the C: \ DOS directory, io. sys is first loaded when the general application system starts, and msdos. sys and command.com are loaded according to the configuration file settings.
The prompt appears. Now you can enter the command. For example, copy c: \ aaa.txt d: \ aaa.txt to copy the file. You can also use some applications in the C: \ dos directory
Use a program to complete the work. For example, use edit to edit a file and use Qbasic to write a basic program.

Next, you have installed a program called Foxpro2.6, which allows you to do some database work. Then, you have installed a program called
Windows Chinese Version program, this program can be amazing, you do not need to execute commands in the command line now, you can use the mouse to operate, open the file manager,
Open C and open another window D. You can use the mouse to complete the copy c: \ aaa.txt d: \ aaa.txt command. You just moved the index finger several times and
Windows 98 is no different.

OK. After installing linux in goto linux, the root directory contains boot, bin, sbin, etc, usr/bin, and other directories.

There is a vmlinuz file under boot. This is the kernel, which is the one written by linus, the most powerful hacker in the world.

There is sh in the bin, Which is shell (= command.com, user interface) because there is no internal command in the UNIX system, it is accurate
/Bin +/sbin = Command.com and/etc = config. sys + msdos. sys the rest/usr/bin = c: \ dos

Of course. Because Linux is much larger than Dos, reahat and red flag may have different arrangement methods, and there are no rules for things in various directories. Linux Startup
Run the command to load vmlinuxz, and then load sh (or other shell, such as bash) to the prompt. Now you can enter the command. For example
Cp/aaa.txt/tmp/aaa.txt. You can also use vi to edit files and use gcc to compile programs.

Next, you have installed a program called MySQL, which allows you to do some database work, and then you have installed a program named kde4.0.
Program, this program is amazing. Now you don't have to execute commands under the command line. You can use the mouse to operate it, open the file manager, open/then open another
Window/tmp, you can use the mouse to pull the command cp/aaa.txt/tmp/aaa.txt. You just moved the index finger several times and there is no difference in Windows 98.
Sample

I hope you can understand why I say that you are turning back, because the current Linux operating system = MS Win3.2, but the MS system has passed 9X.
XP is behind two generations. Of course, this is from the user interface, but it is precisely because many people have installed a Linux, and they are engaged in the east and west on X's kde.
It cannot do anything. Why can't it do it? Because you haven't done DOS, you don't even know that the system can do this. What you first came into contact with was
98. The computer gives you the feeling that it is something to operate with the mouse. You think it is also an operating system, and Linux should also be something like this. You never thought about you.
I think you are playing with Linux, but in fact you are playing with only a program running on Linux. Therefore, after several days of installation,
This is true for Linux. This can be said to be true or not to Linux. You haven't seen it yet. What qualifications do you have to say about it? But kde.
You used 98. Now you can use 3.2 to see what you have.

Feeling? In terms of stability, I don't get 98, take 95, if the same job crashes once a day, then X will crash 10 times, if it is 2000
In other words, 2000 crashes once a day, and X crashes 100 times. It is similar to 3.2. But why do I still hear that some Hollywood movie stunt effects are completed on Linux?
? To attend an important banquet, you can either buy a famous suit or make a suit. Of course, the customized suit is better fit, but the price is also higher.
Expensive, with more work required. Brand-name suits = customized Windows System suits = Linux system + kernel modification + code modification X + code modification kde + special stunt Software
The suit you wear now is a street goods, that is, the reahat garment factory to adapt to the mass production of everyone in the world. Do you understand? If you
White, then you will understand a better aspect of Linux than windows, so I don't need to talk nonsense, so why does Linux tend to be related to hackers? Remember me
After reading a book, "Linux is written by linus hackers and many hackers on the Internet ". So how can a system written by hackers
Will it be irrelevant to hackers? Of course, this definition of "hacker" is totally different from the definition of "hacker" in the hearts of many Chinese people. The former is almost never intruded.
Other systems, and the latter has intruded into the system.

If you are an artist, you are also using computers almost all the time except sleeping. You are always using photoShop to do this. In the art industry,
You are also a master in this industry. But you don't care about what you do, how the computer actually helps you. Computer is just one of your creations
Tools. Just like music that many people like to listen to, but you don't care about the music you hear at all. From the original singer's mouth, she came to be appreciated by you.
What is going on. But for an HIFI enthusiast, all she cares about is this. Now back to the copy command I just mentioned, for a hacker, she basically
Without worrying about the content in the aaa.txt file, what does the computer do during the process from C: \ aaa.txt to d: \ aaa.txt? Now I want to ask
Persons who are reading this post below: You must have done this thing by copying a file from one place to another, right? But when you do
Have you ever wondered how the computer completes this operation? If your answer is: Oh, I have never really thought about it ~~ So, you have no
The talent of hackers makes it easier for you to get together.

Root-sourcing is the nature of hackers. In this regard, Linux can meet the requirements, but windows cannot. Press copy C: \ aaa.txt d: \ aaa.txt on dos. Replay
The task is completed, but do you know what the computer has done? You can only judge how the system is completed based on your experience.
Before the source code, you cannot determine whether your judgment is correct. However, the source code of cp on UNIX is basically ready for use.

For TCP/IP, linxu allows you to hack into the kernel, but for windows, you can only hack into winsockapache and the specific communication between the system.
Chu, but the communication between IIS and the system is impossible for you to know that the relationship between Linux and hackers is here, and there is nothing to do with intrusion. Attack Process of many Remote Vulnerabilities
The order is compiled on unix systems. That's right, but the original meaning of those programs is to give an example to make you optimistic. If you can understand it, change it to Win.
Sample can be compiled.

UNIX has many advantages over Windows, and there are too many things worth doing. I just can't say it, just like when you love someone, you can't
Tell me what you love him and where she deserves your love. But Windows is not a spam, it is definitely not. It is used as a tool. It is hundreds of times better than UNIX.
Now you should understand why many remote vulnerability attack programs are written in unix format. The discovery of this vulnerability shows that they are quite familiar with the system,
Moreover, UNIX makes him quite familiar with the system. He does not consciously use the UNIX system. However, the code of UltraEdit is probably used in
Windows.

It seems that I am away from the question. I want to give some suggestions to my friends who want to learn Linux (UNIX), but I have said this,

But I don't think there is a problem. I hope you can see what I want to give you.

1. determine the significance of Linux to you based on your current level.

2. Are you sure you are playing Linux instead of X

3. Unload the X system and install the source code for the remaining space.

4. Do not use the rpm-I Method to install the program.

5. Find a common telnet software. I recommend SecureCRT.

6. If you only have one computer, install Vmware and use this method to access UNIX

7. Read the post again and try again to understand the hidden suggestions in my post.

8. In the process of learning Linux, write down the experience that has been played by linux.

9. In the course of playing linux, let's take a look at how linux is played.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.