down, the system administrator notifies all logged-on users that the system will be closed. And the login command is frozen, that is, the new user can no longer log in. It is possible to shut down directly or delay a certain amount of time before shutting down, and it may be possible to restart the computer. This is determined by the signal that all processes will receive from the system. This allows programs like VI to have time to store documents t
running.2. Add the service name, then check whether the service returns true at the current run level, otherwise false. If On,off or reset is specified after the service name, CHKCONFI will change the startup information for the specified service. On and off respectively refer to the service being started and stopped, and reset refers to the boot information of the Reset service.3.on and off switches, the system is only valid for run-level 3,4,5 by default, but reset can be valid for all run le
Http://jingyan.baidu.com/article/9113f81bc1c7a72b3214c7d3.htmlLinux commands-File management commands
Browse:4118
|
Updated: 2012-11-12 15:26
|
Tags:linux
Linux systems are being used by more and more enterprise servers because of their excellent stability and security. With more and more people learning to use Linux, and Linux as the foundation of the Basic Linux command is un
/BASHRCAttention:Does not take effect immediately for SHELL,BASHRC that are already openYou can use source BASHRC to make file overloading effectiveOr. /pathTo revoke an alias:Unalias:Unalias:unalias [-A] name [name ...]Options:-A: Revoke all aliasesUnalias name: Revoke an aliasInstance:[Email protected]_it network-scripts]# Unalias cdnet[Email Protected]_it network-scripts]# AliasAlias cp= ' Cp-i 'Alias egrep= ' Egrep--color=auto 'Alias fgrep= ' Fgrep--color=auto 'Alias grep= ' grep--color=auto
The Yum source installation is a common approach in our work, which is the RPM-based package manager in Fedora and Redhat and SuSE, which enables system managers to interact and automate the finer and more granular management of RPM packages, to automatically download RPM packs and install them from specified servers, Dependency relationships can be automatically handled and all dependent software packages
/sshd_config
Simple to say the use of VI process, vi a file, and then press I, the lower left corner will show inserts, this time before you can modify this file. After modification, press ESC to insert and disappear in the lower left corner, and then enter: The bottom left corner appears:, then enter X, return, then save to exit.
Delete the # (note) before Port 22 and modify port 1688. Then, performing the service sshd restart will modify your default SSH port number of 1688 to enhance securi
From the who command, we can see that the file management in linux is probably started from the linux command "who". man explained the "who" command to print the information of the current user www.2cto.com. the first column of the result on the computer is the user name, the second column is the login port ,...
From
Linux under the Group Management Command detailed
Groupadd command, add Group commandFormat: groupadd [options] Group nameOption:-G: Specify GID
-R: Add System GroupExample: groupadd-g Willow Create Willow Group and GID is 10002.groupmod command, modify Group commandFormat: groupmod [options] Group nameOp
Tags: CentOS 7 Maria Export database is not installed host details creatMariaDB is a part of MySQL, and for some reason it replaced MySQL as the default database for Rhel/centos 7. Operation against the database we often do the operation is to delete and change, then introduce the next mariadb some basic management commands.(PS: # This represents the shell's prompt,> here represents the MariaDB shell prompt.) )1. View MariaDB installed versionTo view
Firewall: firewall command Management
In the window, you can ping the Virtual Machine ip address, but you cannot access the tomcat homepage started in the virtual machine through ip: 8080, because there is a firewall.Firewalld
If you see the end of d, you can guess that it is a self-starting service, then you can use the systemctl command to control it. If you do
Tags: file results Parameters GPO Technology share GROUPMOD Set password article public numberLet's review the previous section:
Set password command passwd
User Information Modify Command usermod
User Delete command Userdel
Job: Modify User1 User ID 505, home directory to admin, user Group for admin, and finally delete user1 user
Usermo
information that the user belongs to, see the current user's group information without parameters
2. who command, you can see all users currently logged inCurrently only the root user is logged in and the WHO command executes the following results:Re-login with Admin user, then execute who command, see the following results3. User ManagementAdded users: use
/wKiom1mNoGeS3PhYAAAjl5Auk6A566.jpg "title=" cd Command Example "alt=" Wkiom1mnoges3phyaaajl5auk6a566.jpg "/>command to switch the current directory from ~ to/directoryPWD command: Print name of current directory.Command Description: Prints the full path of the current directoryExample:650) this.width=650; "src=" Https://s2.51cto.com/wyfs02/M00/9E/3A/wKioL1mNoe6j
enable it or recompile PHP with–with-openssldownloading ... Composer successfully installed To:e:\usb\dropbox\phpstorm\php53\composer.phar use it:php Composer.phar
Attention:
I closed the SSL module for XAMPP 1.7.7 Apache, so composer prompted me to warn that I was advised to turn on the SSL module for security reasons. Does not open and does not affect use.Parameters at the time of installation | PHP, be sure to change to a real PHP environment pat
the group of users!Chage: Modify the properties of user account and passwordchage [OPTION] ... LOGIN- L: Lists the user's and password expiration dates-M: Minimum number of days to change password-M: Maximum number of days to change password-I : number of days to lock account after password expires-D: Specify the date the password was last modified-E: valid, 0 means immediate expiration, 1 means never expires-W: Start warning days before password expiresLet's do a simple operation example:[[ema
) #fordetailsseeman4crontabs# EXAMPLENBSP;OFNBSP;JOBNBSP;DEFINITION:#NBSP:----------------minute (0-59) #| NBSP;NBSP:-------------hour (0-23) #||.---------- dayofmonth (1-31) #|||.------- month (1-12) ORjan,feb,mar,apr...#||| NBSP;|NBSP;NBSP:----dayofweek (0-6) (sunday=0or7) orsun,mon,tue,wed,thu,fri,sat#|||||#* *** *user-namecommandtobeexecuted remark: Why is the command we executed above using "CRONTAB-E" not saved in this file? The reason is that
in reverse order (originally alphabetical order)
-T
List the files in the order of establishment time
-S
Display the size of each file allocation in blocks
-S
Sort by file size
Different types of files have different colors in the Linux system, and the meanings of these colors are as follows:
Green: Represents the executable file.
Red: Represents the compressed file.
Dark blue: Represents the directory.
Yello
command is used to create 123 and 4,562 folders in the/tmp directory.Install/etc/passwd/tmp copy files But the file has execute permissions.Linux distributions and comparison with icons:Centos:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/59/7B/wKiom1TUMmbzQzK1AABOyemkTpQ370.jpg "title=" CentOS "alt=" Wkiom1tummbzqzk1aaboyemktpq370.jpg "/>Debian:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/59/78/wKioL1TUM1SjFlwUAAA8MAVQEyw0
Tags: numbering background A special his opening execution state contains!! Repeat the previous commandThe character repeats the previous command that begins with "character"!num Install the history command sequence number execution command!? ABC repeats the command that contains "ABC" Before!-n repeating the last nth
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.