It's a bit useful to have all sorts of information from the Internet down a long time before the night is over. Here is not know where to get the TXT document, to see that it is very good, the following is the original text.
How to use the common command of Linux big loot management reminder: This post is Haowubai perform the top operation (2009-02-06) Linux Common command use method big loot
1.# represents a privileged user (for example: Root), $ represents a normal user
Boot prompt: Login: Enter user name
Password: Enter password user is the system registered user successfully login, can enter the corresponding user environment.
Exit Current shell, enter: Exit
2.useradd netseek Add a Netseek user
passwd Netseek to Netseek This user to set a password.
(/etc/passwd/etc/group)
Userdel Netseek Delete Account
Userdel-r Netseek Delete the account along with your home directory.
[For more details, see man page, and account management]
3. View commands
Ls-l Display file list
LS-AL-A displays all files and directories (LS-default starts the file name or directory name as ".") As hidden files, not listed)
Ls-al |grep ' ^d ' Display directory
Ls-al |grep ' ^[^d] ' querying all files in a directory that do not contain a directory
Ls-sh (man LS view man help.)
Several file types for Linux:
D indicates that this file is a directory
-Indicates that this file is a normal file
b indicates that this file is a special block device I/o file
c indicates that this file is a special character device I/O file
L indicates that this file is a connection file. The path and name of the file to which it is attached immediately after its file name
The file command determines the document type by probing the file contents
4. creating Files and directories
Touch 1.txt
Cat > 2.txt (Create a file with a directional character, fill in the content, press Ctrl+d to save the content)
mkdir MyWork Set up mywork this directory
5. Copying Files or directories
CP filename1 Filename2
Cp-r dir1 dir2 Copy Directory
The CP-RF parameter f is to delete a target file that already exists without prompting
Cp-i parameters I and f instead, a prompt is given before overwriting the target file that asks the user to confirm that the target file will be overwritten when the answer is Y and is an interactive copy.
6. Delete files and directories (delete files or directories can be done with RM)
RM 1.c//Delete 1.c this file
RM-RF (Force delete file or directory, do not prompt when deleting.)
7. Remove the directory or change the file name
MV [opitons] source file or directory destination file or directory
[Options] Main parameters
-I: interactive operation, if the MV operation will cause an overwrite of the existing target file, the system asks whether to rewrite, asks the user to answer "y" or "n",
This avoids overwriting the file by mistake.
-F: Disables interactive operation. MV operation to overwrite an existing target file without giving any indication, after specifying this parameter the I parameter will no longer work.
MV Hello.. /move the Hello directory or file to the previous level.
8.alias aliases
Alias dir= ' ls-l ' input dir is actually equivalent to performing the ls-l
9. Control of permissions (RWX 421)
chmod +x hello.sh is assigned to executable permissions.
(Details about the control of permissions)
chmod Command Permission Modification usage: chmod one 8 binary number filename (rwx 421)
Eg:chmod u+x Filenmame just want to run for himself, others can only read
Chown netseek.netseek mydir change user group
U: Represents the file owner
G: Indicates the same group of users
O: Indicates another user
A: Indicates all users
Opt is representative of the operation and can be:
+: Add a permission
-: Cancel a permission
=: gives the given permission and cancels the original permission
mode, however, represents the authority:
R: Readable 4
W: Writable 2
X: Executable 1
10.pwd Show current directory full path and change directory
CD Netseek Enter Netseek this directory
CD Exit current directory
Cd.. /go to the top level directory.
CD-Back to last catalog
CD ~ Back to home directory
One. Cat,more,less command
The contents of a file are displayed, and the two commands differ: Cat Prints the contents of the file and the more is displayed.
Less can scroll up and down to view content.
Cat > 1.txt can fill in or copy content, press Ctrl+d to save
Cat 1.c
More 1.c
Head-n filename Displays the contents of the nth row
Tail-n filename Displays the contents of the following n rows
Tail-n 20/var/log/message Show the latest 20 rows of logs
12. Set Linux time and date
Date command ("date MMDDHHMMYYYY.SS")
Date 072412372006.30
Date-s 20:30:30 #设置系统时间为20:30:30
Date-s 2006-7-24 #设置系统时期为2006-7-24
Clock-r #对系统Bios中读取时间参数
Clock-w #将系统时间, such as the time set by date, is written to the BIOS
13. Look for files (Find,grep,awk more please refer to man page or Shell programming topic)
Several introductions:
Find path-name file name
Find/etc-name named.conf
Locate tool to search for files by file name (to establish an index database first through UpdateDB)
Localte named.conf
Whereis is looking for a binary file and will also find its Help file
Which and where are similar, just the set of environment variables we set in the path to find;
14. Avira Process
PS aux
Ps-ef |grep
Kill-9
See which process consumes the most memory
Ps-aux|sort +5n
Put the program in front of the background execution
CP file1 File2 &
& and CTRL + Z you can use & or CTRL + Z to place commands in the background.
FG is a program that is executed in the background and then put back in the foreground.
Jobs
15.DD Command Backup
DD if= "Input_file" of= "Out_file" bs= "block_size" count= "number"
Parameters:
If: is the input file can be a device
Of: The output file can also be a device
BS: Plan the size of a block, if not set, the preset is 512bytes
Count: How many BS means.
DD If=/etc/password Of=/tmp/passwd.bak Backup
16.mount Loading a hardware device
Usage: Mount [parameter] the device load point to load
Eg:mount/dev/cdrom
Cd/mnt/cdrom//Enter the disc directory
U disk:
Mkdir/mnt/usb; (Note: Create mount directory)
Mount/mnt/sda1/mnt/usb; (Note: Mount USB drive)
Now you can use a USB stick, the content in the/MNT/USB directory is the content of the U disk;
When you are finished, use the command to uninstall the USB flash drive.
Umount/mnt/usb
Mount lists all of the system's partitions
Mount-t Iso9660/dev/cdrom/mnt/cdrom Mount Disc
MOUNT-T vfat/dev/fd0/mnt/floppy Mount floppy disk
MOUNT-T Vfat-o IOCHARSET=UTF8,UMASK=000/DEV/HDA2/MNT/HDA2 Mount FAT32 partition
MOUNT-T ntfs-o NLS=UTF8,UMASK=000/DEV/HDA3/MNT/HDA3 Mount NTFS partition
Linux-ntfs project:http://linux-ntfs.sourceforge.net/
Umount/mnt/hda3 Unloading load
Note: Before mounting the device, please fdisk-l look at it first.
17.SU switch to another identity without exiting the login
Usage: SU-L User name (if user name is default, switch to root state)
Eg:su-l netseek (Switch to netseek This user, will prompt for a password), plus-represents a switch to the user's environment variable.
Sudo takes advantage of the permissions he can perform root execution
18.whoami,id,w,lastlog,users,groups
W View User login information
Who view current login user
Last one months user login status
Lastlog check the last logon time for a particular user and format the output of the last logon log/var/log/lastlog
WhoAmI confirm his identity.
ID prints out its UID as well as the GID. (UID: A unique identification of the user identity.) GID: User group identity unique identity. Each user can only have a unique UID and GID.)
Users
Groups users belong to the user group query;
Finger-l Netseek Root
Finger-s or Direct finger
Allows users to query some other user's information
Eg:finger//View the user's usage profile
Finger root//view root information
19. Commands used by the user and execution history
History displays commands used by users in the past
!! Perform the most recent command
20.uname Viewing Linux System Information
Parameter:-A All information-R version number-N Host name
21. Establishing a soft connection
ln [-SF] source target
ln Souce-file Hard-link
LN-SF Source-file Soft-link
s indicates a soft connection, and F indicates that if a file with the same name is in, it will be overwritten.
Note: Hard links cannot be created for a directory, only files can create hard links.
22. View the Catalog
Du-sh directory or file
The default output of the Du-m du system is in kilobytes, with the parameter-m representation in megabytes.
Cat/etc/fstab View a list of partitions
Fdisk-l
Df-h
Df-ah
23. View resources occupied by Linux systems (Top,free,uptime)
Top view background program, monitor system performance
TOP-D 2 new column every two seconds
top-d -2-p3690 View a PID
Top-b-N 2 >/tmp/top.txt The top information 2 times and outputs the result to/tmp/top.txt
Free-m Viewing system memory usage
Uptime shows the current system boot time (see how long the boot, how many people logged in, the past 1,5,15 minutes system load)
24. File than software:
The CMP cmp ("compare" abbreviation) command is used to briefly indicate whether there are differences between the two files, and its use rights are all users
The diff diff command is used for comparisons between two files and indicates the difference between the two, and its use rights are all users
25. Remote operation and File transfer
SSH [email protected]
SCP [Email Protected]:/remote/path/local/path
Scp/local/path [Email Protected]:/remote/path
26. Compiling A/C + + file
Gcc
GCC-V View GCC versions
Gcc-o Test test.c 2>errfile the error message when compiling test.c, redirect the error message to Errfile
27.chattr +i filename Prohibit deletion, chattr-i filename cancellation Forbidden
Lsattr Viewing hidden file properties
28. Automate execution of
at once
Crontab timed loop Execute program
crontab introduction
1 log in as root
2 # crontab-e
3 Join a line
1 */12 * * */usr/sbin/ntpdate pool.ntp.org
minutes (0-59)
hours (0-23)
Date (1-31)
Month (1-12)
Week (0-6)//0 Rep Sunday
29. Shutdown and restart:
Shutwond [-t number of seconds] [-RKHNCFF] time [warning message]
-T number of seconds: sets the delay time (in seconds) between warning and deleting two signals before switching to a different runlevel
-K sends a warning message, but it's not really going to shutdown
-R shutdown this after reboot
-H shutdown this after the boot
-N does not go through init, by the shutdown command itself to do the boot work (not recommended you use)
-F Restarts the fsck command without checking the file system.
-F forced to do the fsck check when re-booting.
-C will cancel the action already being shutdown
Shutdown-h now shuts down immediately, where it is equivalent to a time of 0,halt,poweroff or can be shut down, or directly init 0
Shutdown-h 20:30 system will be on tonight's 8:30 shutdown
The Shutdown-h +10 system automatically shuts down after 10 minutes.
Shutdown-t3-r now reboots immediately, but in warning and deleting processes this room,
Shutdown-k Now ' hey! Go away! Now ... ' A warning message was issued, but no real shutdown was made.
Reboot
Shutdown-r now is almost identical to reboot and is not recommended for reboot execution as follows:
Shutdown-r +30 ' The system Wiil reboot '
Shutdown-r +10 ' hey! Go away! ' The system restarts after 10 minutes.
#sync; Sync Sync Reboot Note: Sync writes data to the hard disk
The halt command is equivalent to shutdown-h now, which means shutting down immediately.
The reboot command is equivalent to Shutown-r now, which means to restart immediately.
30. How to change the start mode runlevel
Vi/etc/inittab
Change 5 to 3, and you can turn it into a character mode after you start.
StartX or init 5 will be able to enter the graphical interface.
RunLevel display the current run level
How to switch to single-user mode
Using Telinit or init (in fact Telinit is just a synbol link to init)
Telinit 1 or Init s, of course telinit S is also possible.
How to make Ctrl+alt+del three-key failure method
#vi/etc/inittab
Add a comment before ca::ctrlaltdel:/sbin/shutdonw-t3-r now #
Then execute #telinit q, the parameter q is to telinit recheck once/etc/inittab
31.TAB Smart Tab key, when you do not know the full name of the file or command is to press the TAB key consecutively.
32.clear Clear Screen
33.DMESG |more Display boot information (view hardware information at system startup)
34. Change the program execution of the excellent grade
Nice set Priority Nice-n-5 VI & Use ROOT to give a nice value of-5 for Execution VI
Renice adjustment already exists priority
35. Module-related commands
LSMOD displays the modules that have been loaded into the system
Depmod analysis of the dependencies of the load-loading system
Modinfo displaying information for kernel modules
Insmod Loading Module
modprobe automatic handling of loading modules
Rmmod Deleting a module
36.chkconfig--list shows the status of various services, and chkconfig can be used to easily manage init scripts.
Several decompression commands for 37.linux
Compress AAA to compress AAA files into AAA. Z
compress-d aaa.z compress aaa.z file into AAA
gzip AAA compression Command
gzip-d aaa.gz extract command
bzip2-z filename compression, ditto plus-d parameter Number decompression
Bzcat filename.bz View Compressed file contents
Tar czvf aaa.tar.gz AAA compress directory AAA into aaa.tar.gz
tar-n ' 2007/03/01 '-ZCVF home The. Tar.gz/home is backed up in home/home compared to the new files in 2007/03/01.
Tar--exclude/home/cao-zxvf myfile.tar.gz/home/*/etc to back up/home,/etc, but do not/home/cao
cd/tmp; TAR-CVF-/etc | tar -XVF-The/etc/is packaged and unlocked directly under/TMP without generating a file. The
Tar zxvf aaa.tar.gz the unzip command.
Tar jxvf aaa.tar.bz2 extract Command
Tar zxvf aaa.tar.gz-c/var/www extract aaa.tar.gz to/var/www directory
Cpio-covb > [File|dev ICE] Backup
Cpio-icduv < [file|device] restore
38. Network Commands
Ifconfig display or set up a network device, you can view the current IP, similar to the ipconfig in Windows
Service Network restart (/etc/rc.d/init.d/network restart) Restart NIC
Ifdown eth0 turn off the NIC
Ifup eth0 Open NIC
Route-n Viewing the routing table
Route add-net 192.168.20.1 netmask 255.255.255.0 Dev eth0
Netstat View network connection status
Netstat-i Display network card operating condition
Netstat-r viewing the host's routing list
Traceroute
Hostname Display host name
HOSTNAME-I Displays the IP of the current host name.
39. System Integration Management menu.
Setup system service Management commands
NTSYSV Setting up System services
40.FDISK/MBR Delete Grub
41. Database Startup
Start MySQL:
Service mysqld Start (/etc/rc.d/init.d/mysqld start)
Mysql-uroot-p Enter the password to operate the MySQL database.
Start Oracle
Su-oracle
$lsnrctl stop
$lsnrctl start
Sqlplus/nolog
Conn/as SYSDBA (connected)
Startup
42. Install the Package
RPM Package Installation:
RPM-IVH xxx.rpm Installation RPM Package
Rpm-qa--last | Less shows installed packages based on installation date
RPM-QA |grep mysql-i Query system installs MySQL package (-I, ignoring case)
RPM-E Removing installed Packages
RPM-E mysql*--nodpes Force removal of related packages
RPM--test Test Installation
Rpm-qi Query MySQL Kit for documentation
RPM-QPL xxx.rpm See what the RPM package contains.
RPM-QC[D] Profiles and profiles
RPM-UVH Upgrade Installation
Rpmbuild--BB Specs/xxx.spec re-installed the Xxx.spec into the RPM package.
Rpmbuild--rebuild packagename.src.rpm to re-compile the. src.rpm into RPM packages.
Source code compilation installation (classic)
./configure Check System Information (./configure--help | More help information, you can see the relevant parameter settings)
Make clean clears the files left before
Make compilation
Make install Installation
Note: Source package installation, the general first unzip the file, the installation process is roughly above a few steps, the general opinion under the pressure of the catalogue (Install,reademe instructions.)
Linux Common Commands-2