Linux commands-Tools for downloading files: wget

The wget in a Linux system is a tool for downloading files, which is used at the command line. For Linux users is an essential tool, we often have to download some software or restore backup from a remote server to the local server. The wget

Linux command details--tar

Tar-this manual page documents the GNU version of Tar, an archiving program designed to store and extract files fro  M an archive file known as a tarfile.  A tarfile may made on a tape drive, however, it's also common to write a tarfile to a normal

Default permissions and hidden permissions for Linux files and directories-umask, chattr, Lsattr, SUID, SGID, sbit, file

File default permissions: Umaskumask0022 umask-sU=rwx,g=rx,o=rxThe default situation is as follows:If the user is created as "file" then the default "no operational (x) permissions", that is, only the RW two items, which is the maximum

Linux common commands 001 ls, mkdir, CD, PWD, RmDir, RM, CP, MV, LN

001_linux common Commands ls, mkdir, CD, PWD, RmDir, RM, CP, MV, LN===================== Body ===============================XXXXXX directory and File command xxxxxx1.lsls [options] [file or directory]Options:-a----show all files, including hidden

Linux Basics----User and file Rights management

User and file Rights Management experiment Introduction1, the creation of Linux, delete users, and user groups and other operations. 2, the file permissions in Linux settings.First, Linux user managementLinux is a multi-user login operating system,

My Linux Bookshelf


Original Address for several years, has been engaged in the development of Linux kernel drive. From the touch of Linux to now, read a lot of Linux books, now think very good part of the list

Mastering the Linux kernel Design (vii): Kernel Timer and timed execution

"copyright notice: respect for the original, reproduced please retain the source:, the article is only for learning exchange, do not use for commercial use " The previous section says that the mechanism of putting the work

How to generate crypt encryption password under Linux

This command is used to generate the password in the crypt format:mkpasswdAfter you enter a command, the program asks for a password and then generates a string in crypt format.If you are using an Apache Web server, you can also use

Linux command Details--date

Date-print or set the system date and timeDisplay the current time in the given FORMAT, or set the system date.Function: Displays the current time in the given format, or sets the system date.Syntax: Date [OPTION] ... [+format]Parameters:-d-sFormat

Two ways to delete outdated files in Linux are described in detail

I. OverviewIn the actual C software development project, different software will generate files in different directories, due to the limited storage space of the disk, developers have to consider the deletion of outdated files in the directory.

"Linux Advanced Programming" (Chapter 11th) System v interprocess communication 1

System V, once also known as the T System V, is one of many versions of the UNIX operating system.Traditionally, System V is considered one of two Unix flavors (the other is BSD). However, with the advent of UNIX implementations that are not based

Mastering the Linux kernel Design (v): The work queue of the lower half mechanism and the choice of several mechanisms

"copyright notice: respect for the original, reproduced please retain the source:, the article is only for learning exchange, do not use for commercial use " another of the lower half of the task force is to postpone the

Modifying the Linux kernel parameters to improve the concurrency performance of Nginx server

====================================================When the Linux nginx reaches a high number of concurrency, the number of TCP time_wait sockets often reaches 20,000 or 30,000, so the server can easily be dragged to death.In fact, we can simply

Linux notes--extended regular expressions, bash scripts-variables, conditional judgments, arithmetic operations

Regular Expressions: There are two classes, one: Basic RegExp two: extended (extended regular expression) their partial metacharacters are different, the meanings are different. grep: Commands that filter text using basic regular expressions or

Linux exec function Family

The fork () function creates a process that is almost identical to the original process (the parent process) through a system call (the child process is a copy of the parent process, which obtains a copy of the parent process's data space, heap,

How to traverse all files under the specified directory under Linux and delete files created before the specified number of days

The script reads as follows:#!/bin/Bashfunctiondelete_file{dir=$1 Days=$[$2-1] forIinch`Find$dir-type F-ctime +$days ' Do RM-RF $i Done} whileRead Line Dodir=`Echo$line |awk '{print $}'' days=`Echo$line |awk '{print $}'' Delete_file $dir$days

Linux under SVN command use Daquan

1. Checkout files to a local directorySVN checkout Path (path isdirectory on the server)Example: SVN checkout Svn:// SVN Co2. Add a new file to the repositorySVN Add FileExample: SVN add test.php (add test.php)SVN add

Linux view CPU and memory usage

During system maintenance, it may be necessary to review the CPU usage at any time, and to analyze the system condition according to the corresponding information. In CentOS, you can view CPU usage by using the top command. After running the top

The Inode for Linux

First, what is the inode?To understand the inode, start with the file storage.The file is stored on the hard disk, and the minimum storage unit for the hard disk is called "Sector" (Sector). Each sector is stored 512 bytes (equivalent to 0.5KB).When

Efficient development experience of multithreaded programming for Linux APIs on Linux platforms have subtle and cryptic differences in the multi-threaded API that corresponds to other platforms, such as Windows. Not paying attention to

Total Pages: 5469 1 .... 219 220 221 222 223 .... 5469 Go to: GO

Alibaba Cloud 10 Year Anniversary

With You, We are Shaping a Digital World, 2009-2019

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.