It was almost noon to eat, and then suddenly remembered that samba did not add users. So, he played with Samba.
Samba rinsed installed, think of the window inside the continuous click Next, but also beware of hidden in the corner of the binding software. Linux installation software is too easy, a yum command, installed. So I think that Linux is just for the benefit of lazy people, do not worry about the system will appear in a disorderly, for a mild obsessive-compulsive disorder of me, is a better system.
Recently leisure began to toss Linux, think quite fun, facing the black and black window knocking command, forcing lattice very high. However, Linux is written by foreigners, history is also relatively long, command line of the name is also a great use of lazy people's thinking, are abbreviated shorthand. Many commands are obscure if they are poor English. Fortunately there is my big Baidu and Google in, these problems will be solved. The following is the daily brothers even Linux training
The source of some Linux commands used by the gadget, and the Chinese interpretation. Most of these commands are I can not understand the memory, and Baidu Google jot down, so disorganized, we gather and look.
1.
Setenforce is a Linux selinux firewall configuration command that performs Setenforce 0 shutdown of the SELinux firewall.
The Setenforce command is the result of the word set (set) and enforce (execution) ligatures. Another command Getenforce can view the status of SELinux.
Enforce beauty [? n ' F?? RS] Vt. coercion; coercion; enforcement; enforcement; strengthening
When the Setenforce is closed, it will return to permissive when Getenforce is used.
This premissive word means laissez-faire and indulgent.
2.
Mysqld, memached is the service name of MySQL and Memache. But why do you want to add D after the name of the software? A clever netizen gives an explanation.
D is the meaning of the Guardian process of English Deamon.
English pronunciation is dieman. My understanding is that the dying man needs to be guarded.
3, with chmod a-x filename can cancel all members of the X Execute permission
with chmod u=rwx,g=rwx,o=rw filename, you can set the permissions of each user with precision.
4. Startup script location for all services/ETC/INIT.D
5, Uname-r U is worth the Unixname kernel version. This command can be used to view the actual kernel version.
6, CD switch directory. Changedirectory's abbreviation.
7. The directory where PWD prints. Printworking Directory pwd-p Print non-linked addresses.
8, mkdir-m This m refers to the umask user rights. You can use MKDIR-M 711 filename to force permissions on a file.
9. Mkdir-p create a directory recursively.
10. Cp-p is copied with the properties of the file and does not use the default properties.
11, Cp-r Recursive continuous replication is used to replicate the directory.
12. cp-i if the target file exists, it will ask if it is overwritten.
13, ap-a equivalent to the function of-p-d-r combination. More often used.
14, Cp-l hard links (not commonly used)
15, Cp-r Soft link (not commonly used)
16, MV Move the file or changed the meaning of the move. The MV also has three parameters.
The meaning of-f force coercion. If the destination file exists, it is not prompted to overwrite it directly.
-U prompt Overwrite if the destination file exists.
-U Overwrite if the copied file is new.
I use a few of the above options. Usually change the name with more.
The following is also a common usage. Put multiple files in a folder.
CP test1 Test2 Test3/root/tmp
17. Read a lot of commands to view files. Like cat, TCA, more, I think it's better to use less. humanized design.
The arrangement is very messy. In fact, there is no finishing, just the notes I made when I studied. Look for it when you forget it.
Linux Introductory Training Tutorials Common Linux commands explanation