1. Generate the key.The Ssh-keygen command is used to generate key pairs, basic options:
-t specifies the key type (RSA,RSA1,DSA,ECDSA).
-p Specifies the passphrase.
-f Specifies the name of the generated key file.
-C Add a
find/root/-type f-name "Test1.txt" |xargs CatXargs put the previous result in the back one to deal withDelete command:Find/root/data-type f-exec rm-f {} \;Find + path + "-type" + type + "-exec" + process + Find result {}\;find/root/data/-type
Linux User-related profiles
Linux primarily uses user profiles to view and modify user information
etc/passwd
First field: User nameSecond field: Password flag (indicates that the user has a password, the password is placed
Files and directoriesCd/home Enter '/home ' directory 'Cd.. Return to the top level directoryCd.. /.. Return to the top level two directoryCD into the personal home directoryCD-Return to the last directoryPWD Display work pathls to view the files in
LinuxCrond Scheduled Task exercisesCrond is a service or software that is used on a system to perform regular commands or to specify program tasks. strictly speaking,the Linux system has a lot of scheduled tasks, such as: At, Crontab, Anacron,
RAID (Redundant array of independent disk independent Redundant array) technology was proposed by the University of California, Berkeley, in 1987, initially to combine small, inexpensive disks in place of large expensive disks, while hoping that the
1. Open the virtual machine CD drive to add a disk and restart the Linux system after creation2, the following to partition the diskCreate an extended partitionTo establish a logical partition on an extended partitionIn establishing a logical
There are several processes running in the robot system, and the start-up of these processes is placed in the script start.sh. It is hoped that the robot system will be able to run the start.sh to get the relevant processes up and running without
Here are four common compression commands to learn.gzipFeatures: 1. Can only compress the file, cannot compress the directory 2. Do not keep source files [[email protected] test]# gzip AAA file compression [[email protected] test]# gunzip AAA.G Z
1. Search for the specified string from a single file:
$ grep "literal-string" filename
The command outputs the contents of the string in the file, and if the string has no spaces, it can be without double quotes. FileName can be
The SEQ command is used to generate all integers from one number to another.Grammarseq [Options] ... Mantissa seq [Options] ... First number of mantissa seq [options] ... First number increment MantissaOptions-f Specify format, format output with
This section focuses on a process-controlled instance that receives commands and executes commands in the foreground or background, and can handle a command line consisting of several commands named Samllsh.The basic logic iswhile (EOF not typed) {
Terminate a processView the currently available signal setsView the name of the signalAccording to the above display, a signal is represented by three: 1, Number (1, 2, 3) 2, abbreviated (HUP) 3, full name (SIGHUP)Common signals1,SIGHUP No need to
Display statistics for virtual memoryR: Number of running processes including running and ready-to-run processesB: The process of non-disruptive sleepMemorySWPD Swap space usageFree amount of idle memoryBuff The amount of memory used for the
First install a JDK, if not installed can view my article Linux installation jdkThen use the following commandsudo wget -O /etc/yum.repos.d/jenkins.repo http://pkg.jenkins-ci.org/redhat/jenkins.reposudo rpm --import
Catalogue
Use
Notes
/bin/usr/bin/usr/local/bin
The most common binary commands
such as: LS MV Cat
/sbin/usr/sbin/usr/local/sbin
System-specific binary commands
Root use, such as: Fdisk
Task Manager similar to WindowsThis command dynamically displays the status of the process by default21:39:20 This is the current time.Up Min is the run time of the top process1 user is the number of users onlineLoad average load values for the last
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service