1. terminal is a wonderful thing, at first it's low Yan value, high difficulty may make us discouraged.But after getting started, you'll find that the terminal command line is so powerful that it feels like a fly. Is this feel, double son cool ~
file View File Types1 , command formatfile [options] File ...2 , command functionsThis command is used to identify file types and to identify the encoding format of some files. It is to get the file type by looking at the header information of the
View the space usage of Linux partitions[[Email protected] /]# df -hl File System capacity used available used% mount point/dev/mapper/ Centos-root 18g 855m 17g 5% /devtmpfs 479m 0 479M 0%
View Linux partition space usage[[Email protected] /]# df -hl File System capacity used available used% mount point/dev/mapper/ Centos-root 18g 855m 17g 5% /devtmpfs 479m
The NL command in Linux is much like the cat command, but the NL command will hit the uplink, which is a less commonly used command, with the small part below to learn about this little-known NL command.The NL command is used in a Linux system to
Say we have installed QT programs and we want to run Qtcreator from the command line.What we are need here are only-put a soft link to the qtcreator we have just installed. Here is some simple precedures.
Once the QT program was installed, open
msgsnd function int msgsnd (int msqid, const void *MSGP, size_t msgsz, int MSGFLG); -- function: Add a message to the message queue -- parameter MSQID: Message Queuing identification code returned by the Msgget function MSGP: is a
I was Old boy education ops student Su Zhenda, I know in these months will be very tired but I will persist, change oneself let people around me have a new understanding, although in these months study will be very tired but I prepared. I believe
Various operators and test judgements are used in logical control statements, seehttp://iyull.blog.51cto.com/4664834/1884528Condition Judgment--ifSingle Branch if statementif judgment condition; thenStat3ment1Stat3ment2...FiDual-Branch If
HA (Highly available high avaiilable) clusterWEB1 provides services, if the 1 main outage, 2 ready to be enabled immediately, so that there is no impact on the user side.Configure the one Mind jumper to pass the information when the schema is in
1. Get the memcached Packagewget http://www.memcached.org/files/memcached-1.4.33.tar.gzLink address can be viewed in memcached.org2. Unpack the package TAR-ZXVF memcached-1.4.33.tar.gz3. Go to unzip directory CD memcached-1.4.334. Install./configure
Transferred from: http://www.ruanyifeng.com/blog/2009/10/5_ways_to_search_for_files_using_the_terminal.htmlThere are many ways to do this in Linux. Foreign website Linuxhaxor summed up five commands, you can see yourself know a few. Most programmers,
Linux system has 7 runlevel (runlevel)RunLevel 0: System down state, system default RunLevel cannot be set to 0, otherwise it will not start normallyRunLevel 1: Single User working status, root privilege, for system maintenance, remote login
Rm-f *.sh 2, Grep-rn "enng" * Find file content contains enng files (note: The file name has Xian will not be queried)Find. ! -name "*.sh" to find files with file suffix name not shFind. -type d-name abc* Find a directory starting with ABCFind:paths
Based on Marco Linux beginner 03-01 finishing 1. Directory Management
Ls
Cd
Pwd
Mkdir
RmDir
Tree
2. File Management
Touch
Stat
File
Rm
Cp
Mv
Nano
3. Date and Time
Inter-process communicationProcess communication between two hosts --process communication between a socket host -- pipeline (anonymous pipe, named pipe)--System V interprocess communication (IPC) includes system V Message Queuing, System V
Inux Tail command is used in accordance with the requirements of the final part of the specified file output to standard equipment, usually the terminal, popular speaking, is to put the last few lines of a file to the terminal, assuming that the
Linux server does not allow the installation of any anti-virus software, the manual analysis of the virus can be from the following characteristics points to consider.Feature one: Viewing the system will generate redundant unknown
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service