Read about linux administration commands pdf, The latest news, videos, and discussion topics about linux administration commands pdf from alibabacloud.com
Rights ManagementThree basic permissionsR read value represented as 4The W write value is represented as 2X executable value represented as 1, the permissions for the jdk-7u21-linux-i586.tar.gz file are-rw-rw-r---rw-rw-r--altogether 10 characters, divided into four segments.The first character "-" indicates a normal file, and the "L" link may also appear in this location; "D" means the directoryThe No. 234 character "rw-" represents the permissions o
Redhat Linux has a graphical configuration tool redhat-config-user. However, Linux administrators should also use dedicated commands to complete the administration of users and user groupsUseradd Build User (create user account and start directory of user creation)Useradd "Options" LoginUseradd-duser-d "Options"-B Base
/ABC.TAR.BZ2/HOME/ABC packaged and compressed with bzip2Of course, if you want to decompress, just replace the above command TAR-CVF/TAR-ZCVF/TAR-JCVF "C" in the "X".Shut down/Restart the machineShutdown-R shutdown Restart-H shutdown does not restartNow turn the machine off.Halt shut down the machineReboot restartLinux PipelinesUse the standard output of one command as the standard input for another command. That is, the combination of several commands
users:root switch to normal user1. Exit 2. Su-user name Note There are spaces on both sides!!! 2-2. Basic Operation command
LS dir
List all files (directories and files) in the directory
Pwd
Show Current working directory
Cd
switch to a directoryNothing is added to the CD.users will automatically jump to the user's home directory/home/xxxroot user will automatically jump to/root
More
View the contents of the system text file, using page fl
One of the keys to the successful management of any system using common log files and commands in Linux is to know what is happening in the system. Exception logs are provided in Linux and the log details are configurable. Linux logs are stored in plain text, so you can search and read them without special tools. You c
course, if you want to decompress, just replace the above command TAR-CVF/TAR-ZCVF/TAR-JCVF "C" in the "X".Shut down/Restart the machineShutdown-R shutdown Restart-H shutdown does not restartNow turn the machine off.Halt shut down the machineReboot restartLinux PipelinesUse the standard output of one command as the standard input for another command. That is, the combination of several commands to use, the latter command in addition to the results of
=============== installation and Landing commands =============================================================Mount: Mount command. Designate storage media as a directory in the system (access resources in other file systems under running Linux), such as Mount Optical drives Mount/dev/cdromMount the CDROM to view content under directory/mnt/cdrom.Umount: Uninstall command, such as Uomunt/dev/cdrom.Exit: Ex
The Linux command line attracts most Linux enthusiasts. A normal Linux user typically has about 50-60 commands to handle daily tasks. Linux commands and their transformations are the most valuable treasures for
command: Command--helpHelp documentation from the programOfficial documentsSearch engineOnline Help Documentation: info COMMANDCommon help: Man COMMANDMan document: Divided into 8 chaptersMANUAL SECTIONSThe standard sections of the manual include:1 User Commands2 System Calls3 C Library Functions4 Devices and Special Files5 File Formats and conventions6 games et. Al.7 Miscellanea8 System Administration Tools and Deamons
Linux's IP commands are similar to Ifconfig, but the former is more powerful and intended to replace the latter. With the IP command, you can easily perform some network administration tasks with just one command. Ifconfig is a command that has been deprecated in net-tools and has not been maintained for many years. Many of the enhanced commands are available in
Tags: SPL enc meaning Lisp encoder htm convenient ice astEnter Gedit in the terminal to open the file editor in the attachment, enter GED before you can tab out all.In the terminal, enter Firefox to open the attachment in Firefox, enter firef before you can tab out all.Enter "Nautilus directory" in terminal to open the folder window under the specified directory.In the terminal, enter "evince/home/weis/desktop/bird's Linux Private cuisine _ Basic Lear
represents the abbreviation for a word--size represents the whole wordThree, virtual machine management commands通常使用虚拟机进行操作,防止不小心删除linux的重要文件,在虚拟机里面可以随便操作,如果出现问题只需重置虚拟机即可,非常方便。 1、rht-vmctl start desktop \server 开启2、rht-vmctl poweroff desktop\server 关闭 3、rht-vmctl view desktop \ server 显示Mouse click Not listed? Use Superuser login account default is root, password default is R
Linux common commands (man Histroy)1.linux Man Manual:Usage:# Man command query command HelpEg:man ls650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/5A/22/wKioL1T3yGuy-Q5IAAGgYSihLvY181.jpg "title=" man Ls.jpg "alt=" Wkiol1t3yguy-q5iaaggysihlvy181.jpg "/>Man Manual Chapter1 User Commands (Users command)2 sys
decompress, just replace the above command TAR-CVF/TAR-ZCVF/TAR-JCVF "C" in the "X".Shut down/Restart the machineShutdown-R shutdown Restart-H shutdown does not restartNow turn the machine off.Halt shut down the machineReboot restartLinux PipelinesUse the standard output of one command as the standard input for another command. That is, the combination of several commands to use, the latter command in addition to the results of a previous command.Exa
decompress, just replace the above command TAR-CVF/TAR-ZCVF/TAR-JCVF "C" in the "X".Shut down/Restart the machineShutdown-R shutdown Restart-H shutdown does not restartNow turn the machine off.Halt shut down the machineReboot restartLinux PipelinesUse the standard output of one command as the standard input for another command. That is, the combination of several commands to use, the latter command in addition to the results of a previous command.Exa
decompress, just replace the above command TAR-CVF/TAR-ZCVF/TAR-JCVF "C" in the "X".Shut down/Restart the machineShutdown-R shutdown Restart-H shutdown does not restartNow turn the machine off.Halt shut down the machineReboot restartLinux PipelinesUse the standard output of one command as the standard input for another command. That is, the combination of several commands to use, the latter command in addition to the results of a previous command.Exa
.lessPaging through files, using when files are too long/keyword search keywordsQ exitV gedit = GNOME EDIT650) this.width=650; "src=" Https://s3.51cto.com/wyfs02/M02/9C/5F/wKiom1lvaH6zMvzzAAFa6kKXAFo535.png "title=" Screenshot from 2017-07-19 22-10-03.png "alt=" Wkiom1lvah6zmvzzaafa6kkxafo535.png "/> 13.gedit = text editor for GNOME edit graphics NBSP gedit file Open File and edit ctrl+s Save ctrl+n Open a new editing interface ctrl+o Opening a new file 14.rm = remove Delete
belongs. You can use commands.sudo chown root:root jdk-7u21-linux-i586.tar.gzFile Rights ManagementThree basic permissionsR read value represented as 4The W write value is represented as 2X executable value represented as 1, the permissions for the jdk-7u21-linux-i586.tar.gz file are-rw-rw-r---rw-rw-r--altogether 10 characters, divided into four segments.The first character "-" indicates a normal file, and
decompress, just replace the above command TAR-CVF/TAR-ZCVF/TAR-JCVF "C" in the "X".Shut down/Restart the machineShutdown-R shutdown Restart-H shutdown does not restartNow turn the machine off.Halt shut down the machineReboot restartLinux PipelinesUse the standard output of one command as the standard input for another command. That is, the combination of several commands to use, the latter command in addition to the results of a previous command.Exa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.