Linux Learning Notes Linux directory Architecture _unix Linux

Linux Directory Architecture /root directory /bin commonly used commands binary file's catalogue /boot store files that must be read when the system is started, including the core (kernel) /boot/grub/menu.lst Grub Settings /boot/vmlinuz kernel RAM

Linux command alias and ln (alias and link command) usage

The alias command is used to set the name of the directive. We can use this command to simplify some of the longer commands. When using alias, the user must use single quotes ' to cause the original command to prevent special characters from causing

Linux to establish the soft Link ln command usage method

Soft links under Linux are similar to shortcuts under Windows Ln-s A B is the source file, B is the link file name, its function is when entering the B directory, actually is the link into a directory As the above example, when we execute the

Lnmp/lamp Install Linux System Web site environment and add site Build station

We also have a lot of Linux VPS host site environment webmaster, do not like to use the Web panel, we will use their own compilation environment or use a more mature one-click Package to deploy the Web site environment. The current use of a lot of a

Linux under uniq command to remove duplicate rows of examples

One, uniq what to do with the The duplicate lines in the text are basically not what we want, so we need to get rid of them. Linux has other commands to remove duplicate rows, but I think Uniq is a more convenient one. When using Uniq, pay

Linux&windows Exp Automatic Backup Tutorial

About the idea:1, divided into different users exp, each user an exp execution file.2, retention policy3, call (1,2) two files with a total file. On Linux /u02/orabak: A directory for storing DMP files/U02/SCRIPTS/AUTOEXP: Directory for storing

Find bulk Delete empty files and empty folder scripts in Linux

svn

Method of bulk deleting empty files (Files of size equal to 0) under Linux The code is as follows Copy Code Find. -name "*"-type f-size 0c | Xargs-n 1 rm-f This also allows you to delete a file of a specified

File and folder operation commands in Linux VPS

File and directory operations: Go to a directory: cd/directory Name Return to Parent directory: CD ... Return to upper Parent directory: CD. /.. Delete File: RM filename Delete directory: RmDir directory name Move or rename a file: MV Old path

Linux uses cacti to monitor network card traffic configuration several examples

Cacti is a set of graphical analysis tools for network traffic monitoring based on PHP, MySQL, SNMP and RRDtool. If you want to use CACTI to monitor the Linux server's network card traffic, you need to install Net-snmp-utils-related packages on the

Linux directory structure and the main contents of the directory detailed analysis _unix Linux

The "/" root directory section has the following subdirectories:The/usr directory contains all the commands, libraries, documents, and other files. These files will not be changed during normal operation. This directory also contains the main

Overview of Linux log file systems _unix Linux

A file system is a system software that manages and organizes data stored on disk drives, guaranteeing data integrity, which guarantees the consistency of the data written to the disk and the content that is subsequently read. In addition to saving

Linux System File Command master Guide _unix Linux

For file commands, we discuss some fairly simple and intuitive management commands here. It only describes the functionality of other, more complex commands, so that when you need to use them, you know that they exist and what they use. This article

Linux Administrator Handbook (8) _unix Linux

Hardware is not certain to be reliableThe software must be unreliable.People aren't sure they're unreliable.and nature must be reliable. This sheet explains why, how, when to do backups, and how to back up the things that are backed up. The

Ten ways to improve Linux system security setting method _unix Linux

Linux is a UNIX-like operating system. In theory, there is no significant security flaw in the design of UNIX itself. For years, the vast majority of security problems found on Unix operating systems exist primarily in individual programs, so most

Linux Administrator Handbook (2) _unix Linux

This chapter describes an important part of the standard Linux directory tree, based on FSSTND file system standards. Outlines a general approach to dividing a directory tree into several separate file systems for different purposes and given

Analysis of compressed files under Linux _unix Linux

For those who have just come in contact with Linux, it will certainly give Linux a lot of different file names to get dizzy. Let's just say, in the case of compressed files, we know that there are only two types of compressed files that are most

Unix wonderful quiz _unix Linux

One: This article answers to the following questions: 1.1 Who will help you to make this FAQ? 1.2 When someone mentions ' RN (1) ' or ' CTime (3) ', what does the number in the scraping mean? 1.3 What is the origin of some strange unix instruction

mkdir and Touch command differences in Linux

first, the purposeThis article describes the new file or folder, delete files, or folder commands under Linux. Touch is able to create new files and mkdir to create new folders. RM is used to delete files or folders. This article will choose the

Linux ALSA sound card driver Four: Control device creation

Statement: The content of this blog by Http://blog.csdn.net/droidphone Original, reproduced please indicate the source, thank you!Control InterfaceThe control interface primarily allows user-space Applications (ALSA-LIB) to access and control

Linux decompression. Tar. tgz. tar.gz. Tar. Files such as Z

. tarUnpacking: Tar xvf Filename.tarPackage: Tar cvf filename.tar DirName(Note: Tar is packaged, not compressed!) )---------------------------------------------. gzDecompression 1:gunzip filename.gzDecompression 2:gzip-d filename.gzCompression: gzip

Total Pages: 5469 1 .... 108 109 110 111 112 .... 5469 Go to: GO

Alibaba Cloud 10 Year Anniversary

With You, We are Shaping a Digital World, 2009-2019

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.