Linux commands [will be enriched in the future]

Source: Internet
Author: User

All the following commands are run under aix6.1.0.0 (the command for viewing AIX version information is oslevel)

1. chown

Reference website

Http://baike.baidu.com/view/1229019.htm

 

Usage:

Chown BEPs: BEPs/cnaps2/Rel/BEPs/bin/be *

 

2. passwd file parsing

Website:

Http://www.dzsc.com/data/html/2009-8-5/78085.html

Part of the file:

Root :! : 0: 0: // usr/bin/KSh

Resolution:

User Login Name: logon password: User ID: Group ID: User main directory: Command Interpreter

 

3. Su

Website

Http://zhidao.baidu.com/question/142357453.html

 

Application Instance

Su-BEPs-c "CD/cnaps2/src/BEPs/source

 

Example of Man Su:

Examples
1 to obtain root user authority, enter:

Su

This command runs a subshell with the valid user ID and privileges of the root user. You will be asked for
Root Password. Press end-of-file, CTRL + d key sequence, to end the subshell and return to your original shell
Session and privileges.
2 to obtain the privileges of the Jim user, enter:

Su Jim

This command runs a subshell with the valid user ID and privileges of Jim.
3 to set up the environment as if you had logged in as the Jim user, enter: su-Jim

This starts a subshell using Jim's login environment.
4 to run the BACKUP command with Root User Authority and then return to your original shell, enter:

Su root "-C/usr/sbin/backup-9-U"

This runs the BACKUP command with Root User Authority within root's default shell. You must give the correct Root
Password when queried for the command to execute.

3. ls

Http://blog.csdn.net/freedom2028/article/details/7104014

4. Practical addition of the grep command

4.1 search the text with the wxp character (case-insensitive) in the current directory and mark its row number

Grep-rin wxp *

4.2 search for the row with root at the end of the row in the group file and search for the row with sys at the beginning of the row in the group file.

Note:

'^': Indicates the first row of the matched string,
'$': Indicates the end of a matched string,

Grep root $ Group

Grep ^ sys group


-R recursively traverses all folders in the directory

-I is case insensitive.

-N: Mark the row number of the content

The result is as follows:

Mytest/wxp.txt: 1: wxp
Mytest/wxp.txt: 2: wxp
X.txt: 3: dddddddwxpi

5. VI command Introduction

5.1 jump to the end of a row $

5.2 jump to the beginning of a row ^

5.3 jump to the end line of the file SHIFT + g (this command seems to be the beginning of the line at the end of the file)

5.4 jump to the start line of the file: 0, and press ENTER

5.5 Delete the row where the cursor is located using dd

6. Detailed sources of tar commands: Private Kitchen of laruence (version 3)

Tar Command Parameters

-C create a package file

-T view the file names contained in the package.

-X unpacks or decompresses data

-V displays the file name being processed during decompression.

-F filename-F is followed by the file name to be processed. It is recommended that-F write a parameter separately.

-C specifies the file path to be compressed during compression.

Premise: the file owner in the wxp directory is ibps.

The owner of wxp.tar is root.

The operating system is Aix.

Create an archive file

G2dbt1:/wxp # tar-CV-F wxp.tar ./
A ./
A./301.txt 20 blocks.
A./SML 1 blocks.
A./test
A./test/301.txt 20 blocks.
A./test/SML 1 blocks.
Wxp.tar same as archive file, not archived

View the archive file:

G2dbt1:/wxp # tar-TV-F wxp.tar
Drwxr-XR-x 503 402 0 APR 13 20:17:37 2013 ./
-Rwxr-XR-x 503 402 10240 APR 13 19:34:24 2013./301.txt
-RW-r -- 503 402 11 apr 08 16:21:31 2013./SML
Drwxr-XR-x 503 402 0 APR 13 19:47:20 2013./test/
-Rwxr-XR-x 503 402 10240 APR 13 19:34:24 2013./test/301.txt
-RW-r -- 503 402 11 apr 08 16:21:31 2013./test/SML

Users and user groups of files are also saved during archiving.

Decompress the archive file:

G2dbt1:/wxp/wxp_2 # tar-XV-f ../wxp.tar
X.
X./301.txt, 10240 bytes, 20 media blocks.
X./SML, 11 bytes, 1 Media blocks.
X./test
X./test/301.txt, 10240 bytes, 20 media blocks.
X./test/SML, 11 bytes, 1 Media blocks.
G2dbt1:/wxp/wxp_2 # ls
301. txt SML Test

7 mount command

* The Node (if the mount is remote)
* The object mounted
* The mount point
* The Virtual-file-system type
* The time mounted
* Any mount options

8. Shortcut Key for the file Terminator

CTRL + d

9. FTP

1) Open and IP addresses are connected to the machine where the IP address is located.

2) If the user keeps up with the user name, press enter to prompt the user to enter the password. The password is correct and the host is successfully connected.

3) PWD can view the current directory of the remote host

4) CD allows you to switch the directory of the remote host.

5) switch the local working directory to the Dir directory by using the LCD dir.

6) transfer an object through get.

7). Transfer multiple files in the mget file list

8) binary bin File Transfer

9) Prompt off to disable interaction. For example, if this command is not provided when many objects are uploaded, a file will be uploaded and a message "Y" will be prompted for the next file transmission.

10) Close corresponds to open, and the remote server connection is interrupted.

11) Bye exits the FTP session

10. svmon

Http://www.eygle.com/digest/2009/07/ibm_aix_svmon.html

11. LDD and Nm

LDD lists dynamic dependencies.

NM displays information about symbols in object files, executable files, and Object-file libraries.

12. Ps

-T PID

Displays the process hierarchy rooted at a given PID in a tree format using ASCII art. This flag can be used in combination with the-F,-F,-O, and-l flags.

Ibps_compiler1: // # ps-T 7733438
PID tty time cmd
7733438-CICs
5963870-0: 00 | \ -- cicsrl
6881404-0: 00 | \ -- cicsic
7274532-0: 00 | \ -- cicslm
10485830-0: 00 | \ -- cicsip
10158188-0: 07 | \ -- cicsam
7929960-0: 00 | \ -- cicsas
9240676-0: 07 | \ -- cicsas
9306152-0: 00 | \ -- cicsas
9437246-0: 00 | \ -- cicsas
9502766-0: 00 | \ -- cicsas
9633846-0: 00 | \ -- cicsas
9764914-0: 00 | \ -- cicsas
9830478-0: 00 | \ -- cicsas
9895992-| \ -- cicsas
9961530-| \ -- cicsas
10027068-| \ -- cicsas
10092772-0: 00 | \ -- cicsas
10354758-0: 00 | \ -- cicsas
10420292-0: 00 | \ -- cicsas
10551372-0: 00 | \ -- cicsas
10616912-0: 00 | \ -- cicsas
10682452-0: 00 | \ -- cicsas
12517588-0: 00 | \ -- cicsas
12845266-0: 00 | \ -- cicsas
12976376-0: 00 | \ -- cicsas
12779586-0: 00 \ -- cicsld

13 ln

Purpose:

When we need to use the same file in different directories, we do not need to put a file that must be the same under each required directory. We only need to put it in a fixed directory, put the file and use the ln command link in other directories.

Hard Link

Only applicable to the same file system, and the default ln operation (without any parameters) is hard link. Feature: a file of the same size as the source file will be generated at the position you selected.

Soft link:

The target file of the Ln-S source file can be used across file systems. Features: only an image of a file will be generated at the position you selected, without occupying disk space.

Commonalities:

Both symbolic links and hard links keep the files in sync.

Differences:

In addition to their respective features, the hard link result is that the target file has the same I-node as the source file, and the soft link result is that the target file and the source file have different I-node, if the source file is deleted, the target file of the symbolic link is unavailable.


Sample:

81994-RW-r -- 2 CICs 171027 Jun 07
17: 16 222
81994-RW-r -- 2 CICs 171027 Jun 07 ibps_1
82011 lrwxrwxrwx 1 CICs 3 Jun 20 x-> 111

X will be unavailable

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.