All the following commands are run under aix6.1.0.0 (the command for viewing AIX version information is oslevel)
1. chown
Reference website
Http://baike.baidu.com/view/1229019.htm
Usage:
Chown BEPs: BEPs/cnaps2/Rel/BEPs/bin/be *
2. passwd file parsing
Website:
Http://www.dzsc.com/data/html/2009-8-5/78085.html
Part of the file:
Root :! : 0: 0: // usr/bin/KSh
Resolution:
User Login Name: logon password: User ID: Group ID: User main directory: Command Interpreter
3. Su
Website
Http://zhidao.baidu.com/question/142357453.html
Application Instance
Su-BEPs-c "CD/cnaps2/src/BEPs/source
Example of Man Su:
Examples
1 to obtain root user authority, enter:
Su
This command runs a subshell with the valid user ID and privileges of the root user. You will be asked for
Root Password. Press end-of-file, CTRL + d key sequence, to end the subshell and return to your original shell
Session and privileges.
2 to obtain the privileges of the Jim user, enter:
Su Jim
This command runs a subshell with the valid user ID and privileges of Jim.
3 to set up the environment as if you had logged in as the Jim user, enter: su-Jim
This starts a subshell using Jim's login environment.
4 to run the BACKUP command with Root User Authority and then return to your original shell, enter:
Su root "-C/usr/sbin/backup-9-U"
This runs the BACKUP command with Root User Authority within root's default shell. You must give the correct Root
Password when queried for the command to execute.
3. ls
Http://blog.csdn.net/freedom2028/article/details/7104014
4. Practical addition of the grep command
4.1 search the text with the wxp character (case-insensitive) in the current directory and mark its row number
Grep-rin wxp *
4.2 search for the row with root at the end of the row in the group file and search for the row with sys at the beginning of the row in the group file.
Note:
'^': Indicates the first row of the matched string,
'$': Indicates the end of a matched string,
Grep root $ Group
Grep ^ sys group
-R recursively traverses all folders in the directory
-I is case insensitive.
-N: Mark the row number of the content
The result is as follows:
Mytest/wxp.txt: 1: wxp
Mytest/wxp.txt: 2: wxp
X.txt: 3: dddddddwxpi
5. VI command Introduction
5.1 jump to the end of a row $
5.2 jump to the beginning of a row ^
5.3 jump to the end line of the file SHIFT + g (this command seems to be the beginning of the line at the end of the file)
5.4 jump to the start line of the file: 0, and press ENTER
5.5 Delete the row where the cursor is located using dd
6. Detailed sources of tar commands: Private Kitchen of laruence (version 3)
Tar Command Parameters
-C create a package file
-T view the file names contained in the package.
-X unpacks or decompresses data
-V displays the file name being processed during decompression.
-F filename-F is followed by the file name to be processed. It is recommended that-F write a parameter separately.
-C specifies the file path to be compressed during compression.
Premise: the file owner in the wxp directory is ibps.
The owner of wxp.tar is root.
The operating system is Aix.
Create an archive file
G2dbt1:/wxp # tar-CV-F wxp.tar ./
A ./
A./301.txt 20 blocks.
A./SML 1 blocks.
A./test
A./test/301.txt 20 blocks.
A./test/SML 1 blocks.
Wxp.tar same as archive file, not archived
View the archive file:
G2dbt1:/wxp # tar-TV-F wxp.tar
Drwxr-XR-x 503 402 0 APR 13 20:17:37 2013 ./
-Rwxr-XR-x 503 402 10240 APR 13 19:34:24 2013./301.txt
-RW-r -- 503 402 11 apr 08 16:21:31 2013./SML
Drwxr-XR-x 503 402 0 APR 13 19:47:20 2013./test/
-Rwxr-XR-x 503 402 10240 APR 13 19:34:24 2013./test/301.txt
-RW-r -- 503 402 11 apr 08 16:21:31 2013./test/SML
Users and user groups of files are also saved during archiving.
Decompress the archive file:
G2dbt1:/wxp/wxp_2 # tar-XV-f ../wxp.tar
X.
X./301.txt, 10240 bytes, 20 media blocks.
X./SML, 11 bytes, 1 Media blocks.
X./test
X./test/301.txt, 10240 bytes, 20 media blocks.
X./test/SML, 11 bytes, 1 Media blocks.
G2dbt1:/wxp/wxp_2 # ls
301. txt SML Test
7 mount command
* The Node (if the mount is remote)
* The object mounted
* The mount point
* The Virtual-file-system type
* The time mounted
* Any mount options
8. Shortcut Key for the file Terminator
CTRL + d
9. FTP
1) Open and IP addresses are connected to the machine where the IP address is located.
2) If the user keeps up with the user name, press enter to prompt the user to enter the password. The password is correct and the host is successfully connected.
3) PWD can view the current directory of the remote host
4) CD allows you to switch the directory of the remote host.
5) switch the local working directory to the Dir directory by using the LCD dir.
6) transfer an object through get.
7). Transfer multiple files in the mget file list
8) binary bin File Transfer
9) Prompt off to disable interaction. For example, if this command is not provided when many objects are uploaded, a file will be uploaded and a message "Y" will be prompted for the next file transmission.
10) Close corresponds to open, and the remote server connection is interrupted.
11) Bye exits the FTP session
10. svmon
Http://www.eygle.com/digest/2009/07/ibm_aix_svmon.html
11. LDD and Nm
LDD lists dynamic dependencies.
NM displays information about symbols in object files, executable files, and Object-file libraries.
12. Ps
-T PID
Displays the process hierarchy rooted at a given PID in a tree format using ASCII art. This flag can be used in combination with the-F,-F,-O, and-l flags.
Ibps_compiler1: // # ps-T 7733438
PID tty time cmd
7733438-CICs
5963870-0: 00 | \ -- cicsrl
6881404-0: 00 | \ -- cicsic
7274532-0: 00 | \ -- cicslm
10485830-0: 00 | \ -- cicsip
10158188-0: 07 | \ -- cicsam
7929960-0: 00 | \ -- cicsas
9240676-0: 07 | \ -- cicsas
9306152-0: 00 | \ -- cicsas
9437246-0: 00 | \ -- cicsas
9502766-0: 00 | \ -- cicsas
9633846-0: 00 | \ -- cicsas
9764914-0: 00 | \ -- cicsas
9830478-0: 00 | \ -- cicsas
9895992-| \ -- cicsas
9961530-| \ -- cicsas
10027068-| \ -- cicsas
10092772-0: 00 | \ -- cicsas
10354758-0: 00 | \ -- cicsas
10420292-0: 00 | \ -- cicsas
10551372-0: 00 | \ -- cicsas
10616912-0: 00 | \ -- cicsas
10682452-0: 00 | \ -- cicsas
12517588-0: 00 | \ -- cicsas
12845266-0: 00 | \ -- cicsas
12976376-0: 00 | \ -- cicsas
12779586-0: 00 \ -- cicsld
13 ln
Purpose:
When we need to use the same file in different directories, we do not need to put a file that must be the same under each required directory. We only need to put it in a fixed directory, put the file and use the ln command link in other directories.
Hard Link
Only applicable to the same file system, and the default ln operation (without any parameters) is hard link. Feature: a file of the same size as the source file will be generated at the position you selected.
Soft link:
The target file of the Ln-S source file can be used across file systems. Features: only an image of a file will be generated at the position you selected, without occupying disk space.
Commonalities:
Both symbolic links and hard links keep the files in sync.
Differences:
In addition to their respective features, the hard link result is that the target file has the same I-node as the source file, and the soft link result is that the target file and the source file have different I-node, if the source file is deleted, the target file of the symbolic link is unavailable.
Sample:
81994-RW-r -- 2 CICs 171027 Jun 07
17: 16 222
81994-RW-r -- 2 CICs 171027 Jun 07 ibps_1
82011 lrwxrwxrwx 1 CICs 3 Jun 20 x-> 111
X will be unavailable