Several common methods of installing computer systems
Tools/raw Materials
Hardware: Computer
Method/Step
Several common methods of installing computer system
The first method: the production of U disk Boot Disk installation system.
This method is suitable for most computers, but there are a few computer motherboards do not have USB boot settings, this type
processed is displayed -F filename:filename is the file to be processed -C dir: Specifies the compressed/decompressed directory dir Cases:Compression: TAR-JCV-F filename.tar.bz2 file or directory name to be processed -JTV-f filename.tar.bz2 -jxv-f Filename.tar.bz2-c Directory to unzip Remember:1, *2, *.gz with gzip-3, *.tar.gz and *4, *.bz2 with bzip2- 5, *6, *7, *8, *9 , *.zip with unzip decompression 7, apt-get install PackageNameThe command to install the software.Example: Apt-ge
While using the computer to enjoy the fun of surfing the Internet, we also have to face all kinds of weird problems with computers, and today the small weave collects some common troubleshooting methods for Windows operating systems on the network (this article applies to Windows Xp/vista/win7/win8), I hope you can come together with small knitting to learn knowledge, and then hope that the following method
DF Command verbose usage
A: Displays all file systems and disk usage scenarios for each partition
I: Show the usage of i-nodes
K: size is denoted by K (default value)
T: Displays all partition disk usage for one file system
X: Displays all partitions that are not part of a file system disk usage
T: Displays the name of the file system to which each partition belongs
Common commands: Df-hi
Detailed oper
"Common commands for Linux systems"This session is about daily maintenance operations will often be used, I hope you to memorize him."Time and Date"Date View system Current time parameter-u display UTC timeFormatted display date and month daily + number linked together as: Date +%y-%m-%dIf we use Date +%y-%m-%d will find an error, because the system sees a space after-it will be considered a parameter.That'
" Process Management related commands (15)1.bg a command that pauses in the background to continue execution (performed in the background).2.FG the commands in the background are moved to the foreground to continue running.3.jobs See how many commands are currently running in the background.4.kill terminates the process.5.killall terminates the process through the process name.6.pkill terminates the process through the process name.7.crontab timed Task command.8.ps shows a snapshot of the proces
--------------------------------------------------------------------------------------------------------------- --------Iv. netstatInformation such as network connections, port status, and routing tables can be displayedSyntax: netstat [options]
Common option
Description
-A
Show all connections and listening ports
-R
Show routing information
-T
Show TCP connections
In the process of computer use, we often encounter panic, and the crash attendant computer operating system, starting from the beginning of the Windows graphical operating system, has been such a situation, until Windows 7 and even leaked version of Windows 8 has been.
Why can't it be solved all the time? It's about how Windows works. Why emphasize the Windows operating system, because there are several other major operating systems in addition to th
for backups.-D: Copy link (keep link)-L: Copy the file that the link points to-P: Keep the link.Cp/etc/{passwd,ininttab,rc.d/rc.sysinit}/tmp/curly brace expansion mechanism.Mv:moveMoving filesMV SRC DEST-F: Forced override-I: Interactive-T: Target source DEST SRCInstall: Installation (copy function is the same as CP)You can create a file and create a directory-D Directory Create directories-m specifies permissions after replication, with all permissions by default.Install-t DIRECTORY SRC ...No
=" 0 "hspace=" 0 "vspace=" 0 "style=" width:650px;height:291px; " alt= "Wkiom1zsszqa0jxtaaacqcw058s707.png"/>Way Two:The RPM command has an option--root can directly specify which directory is the root environment to install the package, so do not use chroot to switch the root environmentMkdir/mediaMount/dev/cdrom/mediaRPM-IVH--replacepkgs --root=/mnt/sysimage /media/packages/bash-xxx.rpm650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/76/67/wKiom1ZSsjSTLQ7pAAAaxN5Kexo063.png "title="
that the line containing the specified content is found in the text file
Grep–n 456 B.txt
-N
Show line Numbers
Show line numbers in B.txt that contain 456
-I.
String is case-insensitive
Grep–v 456 B.txt
-V
Reverse, indicating that a line with no specified content is found in a text file
Show rows that do not contain 456 in B.txt
File and Directory Permissions
Chown
[Options] User:group directory
1.ls-a command will list all contents (. cache,controller.py) in the current directory;In 2..cache . Indicates that the file is a hidden file; the suffix py in controller.py represents a Python script;3.vi . Profile, which is a hidden file in which the text content # indicates that the line content is commented;4.00 * * * * * sh/root/refreshbondgoods/run.sh >> Log.log, the run.sh script is executed every 3 o'clock in the morning, the log is automatically entered into the Log.log file; (for cront
Cat, TAC, more, less, head, tail, cut, sort, uniq, sed, grep, awkCat commandOptions-N Display Line number-E Display line terminator (Terminator of the Linux system text file is $, the terminator of the Windows system text file is $+enter)-T Display tab-A Show-allThe TAC command in turn displays the text contentMore commandsInternal directivesSPACEBAR to scroll to the next screen contentEnter key to scroll to the next line of contentB Key Scrolls up one screen of contentQ Key to exitLess comm
that the line containing the specified content is found in the text file
Grep–n 456 B.txt
-N
Show line Numbers
Show line numbers in B.txt that contain 456
-I.
String is case-insensitive
Grep–v 456 B.txt
-V
Reverse, indicating that a line with no specified content is found in a text file
Show rows that do not contain 456 in B.txt
File and Directory Permissions
Chown
[Options] User:group directory
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.