What a Linux expert writes to beginners-post-

Source: Internet
Author: User

Http://news.csdn.net/n/20060609/91497.html


Now, when many people begin to access computers, they should see Windows 98. To be honest, 98 is already very user-friendly, A well-encapsulated system allows anyone who knows nothing about computers to use it quickly. In this way, many

The "computer" is very different from the DOS people I first came into contact. In the DOS era, if you do not understand the basic knowledge of the computer, you will not be able to play with it. Unlike many people who do not know what the CPU is, but can be flash experts, dumping numerous mm. If you are such a person and want to learn Linux, you have to go back. Why.

Let's take a look at the development of the MS operating system. It has two kernels: msdos ---> dos + win3.2 --> Win9x/

---> WINXP windowsnt3.1 --- NT4.0 --> Win2000/

His development is from the DOS pure character interface system to an application program (win3.2) that combines the kernel of the character interface with an image interface, and then combines the two windows 95 systems, now, at the beginning, the nt of the graphic interface has become

Windows XP, his ambition in the future is to become. net on the Internet. Now let's look at Linux. Linux is just a kernel! This is important and you must understand it.

Only one kernel cannot constitute one operating system. Currently, Linux operating systems such as RedHat, blue dot, and red flag all use such a kernel and other applications (including X. Anything called an operating system is like this: Kernel + User Interface + general applications.

Now I will take the correspondence between the MS system and the Linux system to let everyone know more about Linux. If you have installed dos, then you must know that the entire hard disk has Io under the root directory after the installation is complete. sys msdos. sys command.com config. sys autoexec. bat contains five files and the C:/DOS directory. Io. sys and msdos. sys is the system kernel, command.com is the user interface (Shell), config. sys and autoexec. bat is the configuration file. Under the C:/DOS directory, the IO is first loaded when the application system starts. sys, And then mount msdos according to the configuration file settings. sys and command.com, and then the prompt appears. Now you can enter the command. For example, copy C:/aaa.txt D:/aaa.txt to copy the file. You can also use some applications in the C:/DOS directory to complete the work, such as editing files and writing basic programs using QBASIC.

Next, you have installed a program called foxpro2.6, which allows you to do some database work. Then, you have installed a program named windows3.2 Chinese version, this program is amazing. Now you don't have to execute commands under the command line. You can use the mouse to operate it. Open the file manager, Open C, and open another window. D, the copy C:/aaa.txt D:/aaa.txt command can be completed with a mouse pull. You just moved the index finger a few times, which is no different from Windows 98.

OK. After installing Linux in GOTO Linux, the root directory contains boot, bin, sbin, etc, usr/bin, and other directories.

There is a vmlinuz file under boot. This is the kernel, which is the one written by Linus, the most powerful hacker in the world.

There is SH in the bin, Which is shell (= command.com, user interface) because there is no internal command in the Unix system, to be accurate,/bin +/sbin = command.com and/etc = config. sys + msdos. sys/usr/bin = C:/DoS

Of course. Because Linux is much larger than DOS, reahat and red flag may have different arrangement methods, and there are no rules for things in various directories. When Linux is started, it loads vmlinuxz and SH (or other shells, such as Bash. Now you can enter the command. For example, CP/aaa.txt/tmp/aaa.txt. You can also use VI to edit files and use GCC to compile programs.

Next, you have installed a program called MySQL, which allows you to do some database work, and then you have installed a program named kde4.0, which is amazing, you do not need to execute commands in the command line now. You can use the mouse to open the file manager, open/, and then open another window/tmp, the command CP/aaa.txt/tmp/aaa.txt can be completed with one mouse pull. You just moved the index finger several times and now it is no different under Windows 98.

I hope you can understand why I say that you are turning back, because the current Linux operating system = Ms win3.2, but the MS system has passed 9x, and now it is XP, it lags behind two generations. Of course, this is from the user interface, but it is precisely because many people have installed a Linux system and are engaged in the east and west on the KDE of X, and nothing else can be done, why can't you do it? Because you haven't done dos, you don't even know that the system can do this. At first, you came into contact with 98. The computer gave you the feeling that you were operating with the mouse. You think that is also an operating system, and Linux should be like this. You have never thought that you are playing with Linux, but you are actually playing with a program running on Linux. Therefore, many people have completed installation for a few days, but Linux does. This can be said to be true or not to Linux. You haven't seen it yet. What qualifications do you have to say about it? But KDE does. You have used 98. Now you can use 3.2 to see what you have.

Feeling? In terms of stability, I don't get 98, take 95, if the same job crashes once a day, then X will crash 10 times, if it is 2000, 2000 crashes once a day, and X crashes 100 times. It is similar to 3.2. But why do I still hear that some Hollywood movie stunt effects are completed on Linux? To attend an important banquet, you can either buy a famous suit or make a suit. Of course, the customized suit is better fit, but the price is more expensive, workload is also more famous brand suit = Windows system customized suit = Linux system + modify system kernel + modify x code + modify KDE code + specially written stunt software your current suit street goods, that is, the reahat garment factory is designed to adapt to mass production of all people around the world. Do you understand? If you understand that Linux is better than windows, I don't need to talk nonsense. Why does Linux tend to be related to hackers? I remember reading a book, "Linux is written by a Linus hacker and many hackers on the Internet ". So how can a system written by hackers be irrelevant to hackers? Of course, this definition of "hacker" is totally different from the definition of "hacker" in the minds of many Chinese people. The former is almost never intruded into other systems, and the latter is always intruded.

If you are an artist, you are also using computers almost all the time except sleeping. You are always using Photoshop to do this. In the art industry, you are also a master in this industry. But you don't care about what you do, how the computer actually helps you. Computers are just a tool you have created. It is like music that many people like to listen to, but you don't care about the music you hear at all. From the original singer's mouth, she came to be appreciated by you. But for an hifi enthusiast, all she cares about is this. Now I have just mentioned the copyscript. For a hacker, she does not care about the content in the aaa.txt file. What does the computer do in the process from C:/aaa.txt to D:/aaa.txt? Now let me ask the person who is reading this post: You must have done this thing by copying a file from one place to another, right? But when you do this, have you ever thought about how the computer completes your operation? If your answer is: Oh, I have never really thought about it ~~ So, you don't have the talent of hackers at all, and you still have a bright future for easy mixing.

Root-sourcing is the nature of hackers. In this regard, Linux can meet the requirements, but Windows cannot. You can press copy C:/aaa.txt D:/aaa.txt on DOS. The task of copying is completed, but do you know what the computer has done? You can only judge how the system is completed based on your experience. You cannot determine whether your judgment is correct until you have read the source code of copy. However, the source code of CP on UNIX is basically ready for use.

In terms of TCP/IP, linxu allows you to stick to the kernel, but in Windows, you can only stick to winsockapache and the specific communication between the system, however, you cannot know the relationship between Linux and hackers through communication between IIS and the system. It has nothing to do with intrusion. Many remote vulnerability attack programs need to be compiled on Unix systems, which is correct, but the original meaning of those programs is to give an example to make you optimistic about it. If you understand it, the change can also be compiled on win.

Unix has many advantages over windows, and there are too many things worth doing. I just can't tell you what you love when you love someone, she has something worth your love. But windows is not spam, it is definitely not. It is used as a tool, she is hundreds of times better than Unix. It seems that you should now understand why many remote vulnerability attack programs are written in UNIX habits. Because this vulnerability can be found, it shows that he is quite familiar with the system, moreover, Unix makes him quite familiar with the system. He does not consciously use Unix. However, however, most of the Code is written by using ultraedit in windows.

It seems that I am away from the question. I want to give some suggestions to my friends who want to learn Linux (UNIX), but I have said this,

But I don't think there is a problem. I hope you can see what I want to give you.

1. determine the significance of Linux to you based on your current level.

2. Are you sure you are playing Linux instead of X

3. Unload the X system and install the source code for the remaining space.

4. Do not use the rpm-I Method to install the program.

5. Find a common Telnet software. I recommend securecrt.

6. If you only have one computer, install VMware and use this method to access Unix

7. Read the post again and try again to understand the hidden suggestions in my post.

8. In the process of learning Linux, write down the experience that has been played by Linux.

9. How can I remember the interesting things about Linux during Linux?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.