1. UnzipUnzip xx.zip-d XX--Extract Files Xx.zip to Xx,xx folder is new with this operation-D: Local-O: Global2. PathCD xx/xx3. View the listll or LS4. Open FileVI XX5. File operationWhen you open the file, you want to change to edit mode, press "I"
Ls:list, indicating the contents of the specified directory ls [OPTION] ... [FILE] ...
-a displays all files, including hidden files
-a displays all files except, and,,
-l--long Long format list: Displays detailed property
After you start learning Linux, don't think about it in the way that Windows works, because there are really big differences between them, such as the memory management mechanism, the process mechanism, and so on, so the idea of Windows is thrown
Discover Linux has a good command, tree, can put the directory in the form of trees, but also support very powerful parameters.But by default is not with, you have to go to install, first to download its code: http://mama.indstate.edu/users/ice/tree/
First, after openingSecond, go to command line: right mouse: Open in Terminal1. View IP address: ifconfig2. Go inside the network settingscd/etc/sysconfig/network-scripts/3, want to see under: LL4. Edit it vim Ifcfg-eth05. Edit ipaddr=192.168.1.1006,
1. Enter the Yum Source configuration directoryCd/etc/yum.repos.d2. Configure the local Yum sourceVI Centos-media.repo [c6-media]name=centos-$releasever-mediabaseurl=file:///mnt File:///media gpgcheck=0enabled=
Compiling the environment GNU make 4.1# variables are declared in a way that expands when they are needed # looks like a variable preceded by a space is not related to objects= MAIN.O test1.o TEST3.O # Regardless of whether you perform make or do
Mysql-h Host-u user-p passwordWhen the password is! Special characters such as @ # are that Linux cannot directly identify errorsIn this case, you can refer to the following two ways:1.-p not write password, direct enter, and then enter the password
Vertex/, all other directories are under the rootDirectories below the root and subdirectories in the directory are a hierarchical inverted tree structure.650) this.width=650; "src=" Https://s1.51cto.com/wyfs02/M00/99/61/wKiom1lHsKjDp5uaAAC-jRYlMwI44
First, SSH password-free login principleThis is done to build Hadoop cluster operationsMaster (namenode| Jobtracker) as a client, to implement password-free public key authentication, connect to the server salve (datanode| Tasktracker), you need to
The function of the WC (Word Count) command in a Linux system is to count the number of bytes, words, and lines in the specified file, and to display the output of the statistic results.1. Command format:WC [Options] File ...You can also use the
After the end of the company project. The safety test after the pressure test. After the security test, there is a security risk to the data encryption problem in the network transmission.You need to configure SSL.Introduction to the SSL protocol:
Build svn server on linux and svn on linux
1. Check the current version. If not, install it using yum.Rpm-qa subversion
2. InstallationYum install subversion-y2. Create a databaseMkdir-p/home/svn/projectSvnadmin create/home/svn/project3 configure
Centos ios Image File Installation Details, centosios
1. Mount the iOS image (first open the VM and select Virtual Machine ----> Settings --> CD ----> use the ISO image file to open it with browsing)
2. Start interface Selection
3. The following
Linux and linux commands
I. Overview 1. What is an operating system?
The operating system is the intermediary between people and computer hardware. The user cannot directly interact with the computer hardware and can not directly direct the
Dry Goods ~ How to Use powershell, bash, and docker in a project, powershelldocker
This title is straight enough. It's honest enough. Maybe you haven't used all these three items in the project, however, these three things will become the most
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service