pass: globbing
*: Any character of any length?: any single character[^]: matches any single character outside the specified range of characters such as: [^0-9][]: matches any single character within the specified range[: Space:]: white space character[:p UNCT:]: Punctuation[: Lower:]: lowercase letters[: Upper:]: Uppercase[: Alpha:]: Uppercase and lowercase letters[:d igit:]: Number[: Alnum:]: Numbers and uppercase and lowercase letters
This article is from the "Wind
-i.bak ' S#ZH_CN. Utf-8#zh_cn. Utf-8#g '/etc/sysconfig/i18n[Email protected] ~]# #备份i180文件再修改[[Email protected] ~] #source/etc/sysconfig/i18n############################################################Vim operationC caps The contents of the cursor to the end of the line to delete and enter the edit mode[email protected] ~] #chkconfig #管理开机启动Reboot restarting the serverShutdown Shutdown/Restart-R Restart-H shutdown-C Cancel current shutdown and restartESC + .Summarize:1. Display system version ad
: Linuxnginxmysqlphpnagios most of the Linux operations Engineers, network engineers, system engineers are at this stage. At this stage the average wage is 3-10k. The partners at this stage should pay attention. It belongs to the bottom of the pyramid, and the salary is relatively low.02. System Architecture Level: This stage is a large-scale clustering scheme with known software architecture and implementation of various technical solutions This is c
contents of the scheduled task on the editor and save the Exit3. Use Crontab-l to view the list4.cat/var/log/cron/the user to see if the content was compiled successfully0 1 * * 7 oracle/backup.shKernel:1 briefly describe the functionality of the kernel.1. Pass the application request to the hardware2. Can be a separate kernel module2 How can I permanently modify the kernel parameters without rebooting the system?1. Use the SYSCTL command to display all available values2. Edit with the VI comma
Learn about Linux, please refer to the book "Linux should Learn"Seattle, linuxcon/containercon/cloudopen,2015 August 17 –linux Foundation, a nonprofit organization dedicated to the development of Linux and collaborative development, today announced that Huawei is officially
1) This article is dedicated to people who insist on self-studyI converted from network management to a Linux OPS engineer and summed up some experience. Write him out in the hope that he can help more people.2) This article introduces the basic theory of Shell programming in LinuxWhat is a shell script?The shell is a shell of a Linux system that allows users to implement functions through its operating sys
using YumYum–y Install software name2, master using Yum to remove softwareYum–y Remove software Name3, mastering the use of Yum installation componentsYum–y Groupinstall Component Name4, mastering the use of Yum to remove componentsYum–y Groupremove Component Name5, Master clear Yum CacheYum Clean All6, use Yum to find packagesYum Search7, mastering the configuration of YumYum configuration generally has two ways, one is to configure the yum.conf file in the/etc directory directly, and the othe
$
The value that is used to invoke the variable, such as when the value of the variable name needs to be called, the value of the variable needs to be $name
\
The escape character, followed by a special symbol after \ will lose its special meaning and become a normal character. such as \$ will output the "$" symbol, not as a variable reference
7) wildcard characters
Wildcard characters
Role
?
Match an arbitrary
;-C $file: Whether it exists and is a character device file;-S $file: exists and is a socket file;-P $file: exists and is a pipe file;-R $file: Whether the current user has read access to the file;-W $file: Whether the current user has write access to the file;-X $file: Whether the current user has execute permission on the file;-U $file: Whether the file has suid permissions;-G $file: Whether the file has Sgid permissions;-K $file: Whether the file has sticky permissions;-O $file: Whether the c
]/]# CD ~wangwu go to Wangwu home directory[Email protected] wangwu]# Ls/homeLisi Wangwu Zhangsancp-replicationFormat: CP [option] source file destination PathCommon Command options:-R Recursive replication directory must have this option-P Keep the permissions modification time of source files and other properties unchangedFor example:[[email protected]/]# cp-r/boot//opt/copy/boot to/opt[Email protected]/]# ls/opt/1.txt 2.txt a Bootrm-DeleteFormat: RM [options] File or directory-R Recursive Del
completes the process number isolation, and also adds the Clone_newpid parameter to clone (), such as:int container_pid = clone(container_main, container_stack + STACK_SIZE, SIGCHLD | CLONE_NEWUTS | CLONE_NEWIPC | CLONE_NEWPID, NULL);The effect is as follows, the Echo $$ output the PID number of the shell, has changed.But there are no changes to commands like Ps/top:For specific reasons and what's next (including Mount Namespace,network namespace and user namespace), you can focus on my public
Linux System Foundation tuning1. turn off SELinux and empty iptablesSed-i ' s/selinux=enforcing/selinux=disabled/g '/etc/selinux/configgrep selinux=disabled/etc/selinux/ Configsetenforce 0iptables-fiptables-xiptables-ziptables-l/etc/init.d/iptables Save2. Add a regular user and perform sudo authorization managementUseradd liwenecho ' 123456 ' |passwd--stdin liwenhistory-cecho ' Liwen all= (All) Nopasswd:a
Package1 [Package2] [...]* repolist [all|enabled|disabled] list all available warehouses that have been configured* Version [all | installed | available | group-* | nogroups* |grouplist | groupinfo]*history[info|list|packages-list|packages-info|summary|addon-info|redo|undo|rollback|new|sync|stats]* Load-transaction [Txfile]* Check* Help [command]Yum available options for the command:- y: The auto answer is " Yes "--disablerepo=: temporarily disables a file that is configured and enabled in the
In the past 20 years, Windows systems have dominated the world in the consumer market. However, as new products such as handheld devices and Smart Home Appliances emerge one after another, Linux is widely used. After the emergence of Android and MeeGo, this change is accelerating. "In the future, we will be eliminated without using Linux ." Said Jim Zemlin, CEO of the L
other scenarios, but do not print the variable is not added $.b) When printing output or using variables, usually double or no quotation marks, if it is a string variable, it is best to double quotation marks, you want to output the same as the single quotation mark.
Above for I read "with the old boy learn Linux Yun Koriyuki Shell programming Combat" This book when the note, if there is any copyright issues, please contact [email protected].Th
supported:Fireware, topological structure(1) If the index information provided by the firmware or BIOS-integrated device on the main board is available, then it is named according to this index, such as Eno1, Eno2, ...(2) If the index information provided by the firmware or BIOS for the PCI-E expansion slot is available and predictable, it is named according to this index, such as ENS1, Ens2, ...(3) If the physical location information of the hardware interface is available, it is named accordi
"/" FindN is the next, N previousVI Configuration fileSearch and search Replacement commandsString search ignores case when searching for a specified string: seticn searches for the next occurrence of the specified string:%s/old/new/g full text Replace specified string: N1,n2s/old/new/g replaces specified string within a certain rangeSave and Exit commands: W Save changes: New_filename Save as specified file: Wq Save changes and exitZZ (shift+zz) shortcut keys, save changes and exit: q! Do not s
Powerful and usable shellComputer hardware is composed of arithmetic, controller, memory, input \ output device , etc.The system kernel is the role that makes the computer hardware perform its duties.The kernel is responsible for driving hardware, managing activities, and allocating \ managing Hardware Resources , so he cannot be manipulated by usersBecause users cannot directly control the hardware or directly manipulate the kernel, they need to be based on the " system Call Interface" develope
taken by yourself, and we are accustomed to using. Tar as an identification. If the z option is added, a. tar.gz or. tgz is used to represent the gzip compressed tar package, or the. tar.bz2 as the TAR package name if the J option is added.Reference: Http://man.linuxde.net/tarPackaging refers to a large number of files or directories into a total file, compression is a large file through some compression algorithm into a small file. Many of the compression programs in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.