It took me two days to sort it out, and some of the most common commands that people on Earth know would be skipped! Finally, download the pdf manual. command to change the archive owner: chown [-cfhvR] [-- help] [-- version] user [: group] file... function: change the file...
It took me two days to sort it out, and some of the most common commands that people on Earth know would be skipped! Finally, downlo
Name of the basename string parameterMan display online reference manualSu switches to another userCut writes the selected charactersProgramming Language for awk parsing charactersSed programming language for character replacementVi start vi EditorStart emacs editor
Pwd displays the current directory pwdLs: List objects in the specified directory. The default format is ls [-option] file l.A. Show all files, including hidden files (names starting)R: D
variable.
| Pipeline. Use the output of the previous command as input to the latter command, and connect several commands together.
| often with tee, tee saves the content to the document and displays it.
Third, universal followed by the command character
-A (all).
-e All (every), more detailed than a.
-F Remove protection.
-I add a hint.
-P enforcement.
It took me two days to sort it out, and some of the most common commands that people on earth know would be skipped! Finally, download the pdf manual. command to change the archive owner: chown [-cfhvR] [-- help] [-- version] user [: group] file... function: Change the file or folder owner parameter format: user of the new file owner IDgroup: user group of the new file owner-c: if the archive owner has changed, the change action is displayed.-f: If th
the content from row 3 to row 5 to the cache area.
Paste the content in the buffer, and use p
7. Cancel the operation
U command to cancel the last operation, you can use multiple times to restore the original operation
U cancel all operations
Ctrl + R can be used to restore operations using the u command
8. search and replace commands
The search and replacement functions of vi are mainly completed in the
BKJIA: In this article, we will introduce six cool and practical Unix/Linux tools. From viewing the weather through your terminal to letting a system administrator teach you how to complete a difficult task, there is almost no clue. Interestingly, most of these tools were released decades ago! Please let me know ......
Mentoring dialogue: kibitz
Kibitz is a terminal tool mainly used by a "master" to help him/her "apprentice )". Essentially, it provide
MAN: manual refers to the manual. You can use this command to query the usage of other commands.
PWD: Print working directory indicates a password.
Su: Switch the swith user to the root user.
CD: Change directory switch directory
Ls: List Files
PS: Process status
Mkdir: Make directory to create a directory
Rmdir: Remove directory move directory
Mkfs: Make File System: create a file system
Fsck: File System check file system check
C
With more than 10 years of windows, and finally changed a high with the Mac, as the saying goes regardless of the front end or back end or toward the Linux, no matter how many PCs will eventually go to the Mac. Not learning command line with what Mac? It's done!
Pwd shows the current file path (print working directory)
Ls shows the files and folders in the current path (list, not is! the landlord always thought it was Is, always wrong)
Mkdir create folder (make directory)
Rmdir delete fold
Od
The OD (octal dump) filter will convert the input (or file) to octal or other hexadecimal. You need to view
This command is useful when processing binary data files or an unreadable system device file,
For example,/dev/urandom, or a binary data filter.
DdThis is also a well-known tool, but it is a frightening "Data Replication" command.It is used to exchange data between a Unix microcomputer and an IBM mainframe through tape. This command still ha
Linux Command:Alias
Function Description:Set the alias of the command.
Syntax:Alias [alias] = [command name]
Note:You can use alias to customize the alias of the command. If you only enter alias, all current alias settings can be listed.Alias is valid only for this login operation. To automatically set an alias for each login, you canOr set the alias of the command in. cshrc.
Parameters:If no parameter is added,
Activate the lock: vgchange-A y/dev/vglock
Activate the lock Disk: vgchange-a n/dev/vglock
Compile and generate a binary configuration file: # cmapplyconf-v-C/etc/cmcluster. ASC configure the dual-host software package to modify the following main files: scupkg. ASC control. Sh spy. Sh
Synchronize the PKG configuration file on both nodes
Compile and generate PKG: cmapplyconf-v-P/etc/cmcluster/scupkg. ASC to start the dual-host system: perform the following operations on scu_a as the root user: S
Common commands used by Linux in normal work:
SCP is a file copy with security, SSH-based login. Easy to operate, for example, to copy the current file to a remote other host, you can command the following. Scp/home/1.gif [email protected]:/home/rootYou will then be prompted to enter the login password for the root user of the other 172.19.2.75 host, and then the CP and Ungzip are started.If you want to reverse the operation, copy the file from
The DF command is a commonly used command for viewing hard disk information. The main parameters are as follows:
DF-A: displays the disk usage of all file systems, including 0 block file systems.DF-I: displays the I node information, not the disk block.DF-T: displays the disk space usage of each specified type of file system.DF-X: List disk space usage of a file system of a specified type.DF-T: displays the file system type.DF in 512 bytes DF-K: in
current rowO: open a new row above the current row.R: Replace the current characterR: Replace the current and subsequent characters until you Press ESC.S: Starting from the current cursor position, replace the specified number of characters with the input textS: delete a specified number of rows and replace them with the input textNCW or NCW: modify a specified number of charactersNCC: modifies a specified number of rows.
DELETE commandNdw or ndw: n-1 characters starting at and following the c
the hard disk space and usage. in Linux, the parameter H can be used to display more user-friendly results. For example:DF-H hard drive space display by userDF-K hard disk space is displayed in KBDF-M hard disk space is displayed in MB
W: displays the list of users logging on to the server.
The following commands are only applicable to Linux
Lsof: displays the list of currently opened files, including established socket connections. This command can
1. Query IP address ifconfig2. Find port assignments for applications on the servergrep telnet/etc/services (telnet)Telnet using the TCP/UDP port number 23grep domain/etc/services (domain),
Telnet
Ftp
Tftp
http
Https
Snmp
Domain
Echo
Discard
Daytime
Chargen
Time
23
20
69
80
443
161
53
7
9
13
19
37
3.ping [IP Address], test the network for connect
DF Command verbose usage
A: Displays all file systems and disk usage scenarios for each partition
I: Show the usage of i-nodes
K: size is denoted by K (default value)
T: Displays all partition disk usage for one file system
X: Displays all partitions that are not part of a file system disk usage
T: Displays the name of the file system to which each partition b
Reference: http://www.renfei.org/blog/mac-os-x-terminal-101.htmlOne command line includes 4 Parts:command Name, Options, Arguments, Extras.Man : Give The Manual of this command.Absolute and relative paths/ : Root Directory.. : Parent directory.Directory Operationspwd : Print working directory, which'll show the absolute path of current folder.ls : List directory contents. Ls–la:list all contents including hidden contents.CD : Change directory.mkdir :
Summary of Linux running level and all shutdown commands, and linux-level shutdown commands
What is a running level? Simply put, the running level is the function level currently running in the operating system. It allows some programs to start at one level, but does not start at another level.
Valid logon modes for Linux are 0 ~ There are a total of 10 types, bu
start character ing tableCliconfg SQL server Client Network UtilityClipbrd clipboard ViewerConf Start netmeetingCompmgmt. msc Computer ManagementCleanmgr garbage collectionCiadv. msc Index Service Program
Osk on-screen keyboardOdbcad32 odbc data source ManagerOobe/msobe/a check whether xp is activatedLusrmgr. msc local users and groupsLogoff logout command
Iexpress Trojan bundle tool, which comes with the System
Nslookup IP address Detector
Fsmgmt. msc Shared Folder Manager
Utilman auxiliary to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.