LINUX study notes 1--LINUX system commands

Source: Internet
Author: User
1. interface switch: a) enter the character interface: press ctrl + alt + F1: 1. first you need to enter the user login, enter the user name and password, sign: login2. note: F1-F6 is a character interface, so as to achieve multi-task User B) enter the graphical interface: press ctrl + alt + F7c )...

1. interface switching:

 

A) enter the character interface: press ctrl + alt + F1:

 

1. First, you need to log on to the user and enter the user name and password, with the flag: login

 

2. note: The F1-F6 is a character interface to achieve multi-user multitasking

 

B) enter the graphical interface: press ctrl + alt + F7

 

C) the command line statement for program suspension and exit: ctrl + c

 

2. suffix: the suffix after the instruction represents some specific meanings, and each instruction is different.

 

A)-r: Directory operations

 

B)-f: No reminder, indicating forced

 

C)-I: Set a reminder for the operation

 

D)-p: you can create multiple layers.

 

E)-a: indicates an implicit file.

 

3. configuration command: alias can configure the command itself

 

A) [root @ pact ~] # Alias

 

A) alias cp = 'CP-I'

 

A) alias l. = 'ls-d. * -- color = tty'

 

A) alias ll = 'ls-l -- color = tty'

 

A) alias ls = 'ls -- color = tty'

 

A) alias mv = 'MV-I'

 

A) alias rm = 'rm-I'

 

A) alias vi = 'vim'

 

A) alias which = 'Alias |/usr/bin/which -- tty-only -- read-alias -- show-dot -- show-tilde'

 

A) [root @ pact ~] #

 

4. user differentiation: the superuser is #, and the common user is $

 

A) Super User: root

 

5. add User: useradd user name

 

A) the corresponding user directory will be added to the home directory.

 

6. change user password: passwd user name

 

7. Switch User: su user name

 

A) a super user switches to a common user without a password,

 

B) a password is required for normal users to switch to other users.

 

8. shut down: shut down

 

9. copy the file: space in the target position of the cp Source File

 

A) the source file should be a file in the current directory.

 

B) the target location should be specific: otherwise, it is under the current directory by default. if it is under the current directory, it is considered to be renamed.

 

10. copy Directory: space in the target position of the cp-r source file

 

A) only copy all the files in the folder without folders

 

11. move: a space in the middle of the target location of the mv source file

 

A) the target location should be the specific address; otherwise, the name will be changed.

 

12. change the name: a space in the middle of the target name of the mv source file name

 

13. delete: rm

 

A) delete the directory: rm-r

 

B) delete files without notice. force delete: rm-f

 

14. Directory:

 

A) create a directory: mkdir

 

B) create multiple sub-directories: mkdir-p

 

C) change the working directory: cd

 

D) return to the original Directory: cd-

 

E) view the current path: pwd

 

15. File:

 

A) display directory File: ls

 

B) display the hidden File: ls-

 

C) change the file to an implicit File: change the file name and add it to the front.

 

16. Packaging: Packaging and compression

 

A) file suffix: Package File:. tar compressed file:. gz

 

B) packaging: files whose names need to be packaged after tar cvf packaging

 

1. C indicates creation, v indicates details, and f indicates files. you can use man to understand the specific usage of commands.

 

C) unpack: tar xvf

 

D) package compression: tar cvzf

 

E) decompress the package: tar xvzf

 

F) decompress: unzip

 

17. file access permissions

 

A) permission for displaying files: ls-l

 

B) there are three different types of users who can access files or directories: File owners, users in the same group as the owner and other users. The owner is generally the creator of the file.

 

C)-rw-r -- 1 root 483997 Ju1 l5 17: 3l sobsrc. Tgz

 

D) note that there are 10 locations in total. The first character specifies the file type. if the first character is a horizontal line, it indicates a non-directory normal file. Each of the nine characters after a group of Three Represents the permissions of the three types of users. If it is d, it indicates a directory. R indicates read-only, w indicates write, x indicates executable, and x indicates that this permission is not granted.

 

E) change permission: chmod [who] [+ |-| =] [mode] file name

 

1. u indicates the file owner.

 

2.g indicates the users in the same group as the file owner.

 

3. o indicates "other users ".

 

4. a indicates "all users ". It is the default value of the system.

 

5. + add a permission

 

6.-cancel a permission.

 

7. = Grant the given permission

 

18. View space usage

 

A) View disk usage: df

 

B) View disk usage in kb: df-k

 

C) view the directory usage: du

 

D) view the directory usage in B: du-B

 

19. network configuration: Only super users can do this.

 

A) configure the IP address: ifconfig eth0 192.168.0.1

 

B) disable the eth0 Nic: ifconfig eth0 down

 

C) restore the eth0 Nic: ifconfig eth0 up

 

20. view the network status: netstat

 

A) view all network listening ports in the system: netstat-

 

21. software installation

 

A) install the file named "tftp": rpm-ivh tftp. rpm

 

B) list all installed rpm packages: rpm-qa

 

C) uninstall the rpm package named "rpm-e name"

 

22. Mount: The file is stored in a directory in LINUX, which is generally in the mnt directory.

 

A) mount the optical drive to the/mnt Directory: mount/dev/cdrom/mnt

 

B) cancel mounting the optical drive to/mnt: umount/mn

 

23. search for files:

 

A) there are spaces between the find path-name'filename '.

 

B) Fuzzy search: find the file "find.-name 'co * '" starting with "co" in the current directory and its subdirectories *'

 

C) exact search: find the file named test in the current directory and its subdirectories: find.-name 'test'

 

24. search for strings:

 

A) in the current directory and its subdirectories, find the file containing the file string: grep "file".-rn

 

B) view all ports used for tftp: netstat-a | grep tftp

 

25. dynamically view CPU usage: top

 

26. View processes: View all processes in the system: ps aux

 

27. kill process: kill-s SIGKILL 4096

 

28. help: man

 

29. computing program Running time: time. file name

 

30. view the current time: date

 

From the column of Ainemo

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.