Course connection: Basic Linux File Operation Management
Copy files and directories
Cp source file (folder) target file (folder)
You need to rename a copy in the same working directory.
-R: copy a folder
-V: displays detailed
Adding users to Windows requires at least five interfaces, and a Linux Command is done. Is this the first rule for efficient people to work. This article does not give you a bunch of parameters and options, so you will not be able to understand
LAMP environment compilation (on) -- preparations before Compilation
I. Introduction
1. Why should I build Apache, PHP, and MySQL on Linux?
1) their running efficiency on Linux is higher than that on Windows
2) some modules are only developed for
Reprinted please indicate the source: http://blog.csdn.net/guoyjoe/article/details/20647553
1. Configure and install VNC[Root @ guodb2 Disk1] # yum install vnc *
2. Set the VNC Password
[Root @ guodb2 Disk1] # vncserver
You will require a
The read command is used to read text from the keyboard or standard input. Read user input in interactive form. The "Enter key" is used as the end by default.
It is generally used in automated sh scripts.
# Read Password $ read-s var # display
Linux network settings (on)
I. Internet addressing Process
1. Comparison of TCP/IP and OSI Reference Models
TCP/IP physical layer: Nic OSI physical layer: Nic
OSI data link layer: MAC address
Network Layer: IP, ICMP, ARP
Transport Layer: TCP,
When to use xargs
We can use pipelines to redirect the stdout of one command to the stdin of another command. For example
Cat foo.txt | grep "bar"
However, some commands can only accept data in the form of command line parameters, but cannot
Many of my friends do not know how to set the root permission of Ubuntu 13.04 after installing and upgrading ubuntu 13.04. This article will introduce the steps for setting the root permission in detail. New friends can take a look ~
Login to 13.04
Summarizes the usage of some Linux/Unix commands.
Communication:
Ftp File Transfer Protocol
Login logs on to Unix
Mailx reads or sends emails
Rlogin logs on to remote Unix
Write talk to other terminals
Telnet to another system
Vacation automatically
1. swap OverviewSwap partition, that is, Swap zone. The role of Swap space can be simply described as: when the physical memory of the system is insufficient, a part of the physical memory needs to be released, for the currently running program. The
To use temporary files, consider the following:Ensure that the file names of temporary files do not conflict with each other.Ensure that the contents of temporary files are not peeked, deleted, or modified by other users or hackers.The mkstemp and
Auxiliary data (ancillary data)You can call the sendmsg and recvmsg functions to send and receive messages using the msg_control and msg_controllen members in the msghdr structure.
Another name for auxiliary data isControl information).
Cmsg_level;
Original article: http://www.111cn.net/sys/CentOS/58387.htm
CP uses the SSH protocol for file transfer in Linux, but I do not have this command for the minimal installation of CentOS 6.3.
The Code is as follows:
[Root @
Problem description
Solution:Use the gparted software to route this to the ubuntu system. Step 3, use the grub repair technology to fix the damaged grub.
Procedure:
Step 1:Draw a piece under win7
Log on to win7 and choose> (right-click) --> (select
# Include bzero (* bcopy (* src, * bcmp (* ptr1, *-equal, non-0-not equal
Bzero sets the number of bytes in the target to 0;
Bcopy moves the specified number of bytes from the source to the target;
Bcmp compares any two byte strings. If the
Compile a complete set of interface functions required by TCP client and server programs:
The family parameter indicates the protocol family, which is also known as the Protocol domain ). Therefore, some books declare the following:
AF_xxx and
You cannot specify a password in the command line for ssh login. The emergence of sshpass solves this problem. Sshpass is used for non-interactive SSH password verification. It is generally used in sh scripts and does not need to be entered again.
As the saying goes, it will sooner or later be paid back. The Linux Account owed by the university should be paid back now. After I finished studying Linux in college, I almost never touched it again. I have handed it all back to my teacher. Now we
Gdb debugging
Note:-g must be added to the Gcc compilation options.
Exit GDB: quit or Ctrl + d
Debugging process:
1. view files
Command:(Gdb) l
2. Set breakpoints
Command:(Gdb) B row number
Note: up to 17th rows are stopped, and 17 rows
Sort
The sort command sorts the rows in the File specified by the File parameter and writes the result to the standard output. If the File parameter specifies multiple files, the sort command connects these files and sorts them as one File.
Sort
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service