Head and tail commands for linux commands, and tail commands
Head
Syntax
Example
Tail
Syntax
Example
Example of combined head and tail usage
Head syntax
head [-n -k ]... [FILE]...Example
The first 10 rows are displayed by default.
head /etc/passwd
Displays the first k rows.
Head-k/etc/passwdhead-
Help for Umask:[Email protected] ~]# help Umaskumask:umask [-P] [-S] [mode] file mode mask.Note:help can also be used to view assistance for Shell programming if, case, while, and so on .(6) UseraddThe useradd command is used to add a new user , where the path is/usr/sbin/useradd, with the syntax format:useradd [user Name](7) passwdThe passwd command is used to set the user password , where the path is/USR/BIN/PASSWD, in the syntax format:passwd [user Name]Note: Passwords must conform to th
Command name: ChownEnglish: Change file ownershipCommand path:/bin/chownSyntax: chown [user] [file or directory]Function Description: Change the owner of the file or directoryExample: Chown Shenchao FengjieChange the owner of the file Fengjie to ShenchaoCommand name: CHGRPEnglish: Change file group ownershipCommand path:/BIN/CHGRPSyntax: chgrp [user] [file or directory]Function Description: Change the owning group of the file or directoryExample: Chown lampbrother FengjieChange file Fengjie belo
Tags: CPU BSP picture com inux font exit ptime UIOne, use W to view the system loadW, uptime View system load, 0.00 means 1 minutes load 0Cat/proc/cpuinfo View CPU CoresSecond, Vmstat command, view process, CPU, memory, swap, IO, systemR, SWPD, Si, so, Bi, bo, US, WADynamic display 5 times per secondRun, block process waits, swap partition memory is not enough to put,Si/so how many kilobytes of data from swap into/out memory, Bi/bo read/write memory from disk, US user consumes CPU percentage, do
Linux commands-ls commands and linux commands ls
Today, we will introduce common commands in Linux. First, we will introduce the most frequently used commands in Linux-the ls command.For more information about Linux commands, see
Ten commands required for Linux commands and ten commands for linux
Linux has now become the most popular Operating System in the software industry. Mastering Linux has become a required professional skill for every developer.In order to help you learn, I hope you can master the ten commands that you must master when
Common Linux commands-permission management commands-Other permission management commands, and common command permission management
Command name: chownEnglish: change file ownership
Command path:/bin/chown
Syntax: chown [user] [file or directory]
Function Description: Change the owner of a file or directory.
Example: chown shenchao fengjieChange the owner o
Open TCP Port in Windows Firewall Using Netsh [McNeel Wiki]Https://wiki.mcneel.com/zoo/zoo5netshRefer to my written Oracle XE Remote access-a little white-blog Park http://www.cnblogs.com/startnow/p/7771535.html#autoid-0-1-0========================= Turn =====================Open TCP Port in Windows Firewall Using Netsh
Product:
Zoo
Summary:
Using
Network Administrator read-common network commands
If you have played a vro, you will know the abbreviations of the interesting commands in the vro. For example, "sh int" means "show interface ". Now Windows 2000 has a tool similar to the interface called netsh.
In the cmd shell of Windows 2000, enter netsh and then:
: SHUTDOWN/S/T 0
9. Common View Commands
To view the features that have been installed: oclist
To view computer information: systeminfo
View computer Name: hostname
To view the current computer port usage: Netstat-na
To view the current port usage: Netstat-na | Find "80"
To view the activation information for your computer: Slmgr.vbs-did
10. Activate command
Activate with a serial number: SLMGR/IPK 11111-22222-33333-44444-55555
Automatic activat
test Che check to determine whether each vro in the path supports the resource retention Protocol (RSVP), which allows the host to retain a certain amount of bandwidth for the data stream. The-R switch is used to test QoS connectivity.Interactive use of DHCP commands at a command promptOpen a command prompt.Type netsh.On the netsh> Netshell command prompt line, type "dhcp ".On the dhcp> (DHCP Helper Progra
Practical Windows2000 network tutorial for System Engineers
1. Quick configuration of Windows 2000 interfaces:Look at a tool called netsh.In the cmd shell of Windows 2000, enter netshCome out: netsh> prompt,Enter an int ip address:Interface ip>Enter dump to view the network configuration of the current system:
#----------------------------------# Interface IP Configuration#----------------------------------Pushd interface ip
# Interface IP Configurati
Management: Diskraid/?Volume mount point management: Mountvol/?Disk Fragmentation management: Defrag/?Compressed files: Compact/?Example: Compact c:\123\123.txt/c compressed c:\123\ file 123.txtCompact c:\123\123.txt/u extract c:\123\ file 123.txtOpen File Management: Openfiles/?Convert FAT volumes to Ntfs:convert/fs:ntfsAllow remote Procedure CallsNetsh Firewall set portopening TCP 135 RemoteadminShow current firewall configurationNetsh Firewall show configDescription1, the Server Core does no
If you have played a vro, you will know the abbreviations of the interesting commands in the vro.
For example, "Sh int" means "show interface ".
Now Windows 2000 has a tool similar to the interface called netsh.
In the CMD shell of Windows 2000, enter netshCome out: netsh> prompt,Enter an int IP address:Interface ip>Enter dump to view the network configuratio
If you have played a vro, you will know the abbreviations of the interesting commands in the vro.For example, "Sh int" means "show interface ".Now Windows 2000 has a tool similar to the interface called netsh.
In the CMD shell of Windows 2000, enter netshCome out: netsh> prompt,Enter an int IP address:Interface ip>Enter dump to view the network configuration of t
ThumbInstruction Set
The thumb command can be seen as a subset of arm commands in the form of compression. It is proposed for the code density [1] and has a 16-bit code density. Thumb is not a complete architecture and cannot expect the processing program to execute only thumb instructions rather than arm instruction sets. Therefore, the thumb command only needs to support general functions. If necessary, you can use a complete arm instruction set. F
I. Differentiate the arm instruction set from the thumb Instruction Set first.The thumb command can be seen as a subset of arm commands in the form of compression. It is proposed for the code density problem. It has 16-bit code density, but it is not as efficient as arm commands. thumb is not a complete architecture. It cannot expect processing to only execute thumb instructions, but does not support arm in
Command name: ChownEnglish: Change file ownershipCommand path:/bin/chownSyntax: chown [user] [file or folder]Description of the function: Change the file or folder of the entire personExample: Chown Shenchao FengjieChange the file Fengjie the whole person is ShenchaoCommand name: CHGRPEnglish: Change file group ownershipCommand path:/BIN/CHGRPSyntax: chgrp [user] [file or folder]Function Description: Change the group to which the file or folder belongsExample: Chown lampbrother FengjieChange fil
if the compressed file is a very large case.Tar command-Function Description: File package and unpacking.-Command format: tar [parameters] -Common parameters:-F Name: Use name to specify the archive file name or device name.-V: Lists processing details.-C: Used to create a new archive file.-X: Restore the backup file from the archive file.-T: Used to list the file names in an archive file.-Z: Compress files or unzip with GNU Gzip.-Z: Compress files or unzip with compress.-j: Compress files or u
very large case.Tar command-Function Description: File package and unpacking.-Command format: tar [parameters] -Common parameters:-F Name: Use name to specify the archive file name or device name.-V: Lists processing details.-C: Used to create a new archive file.-X: Restore the backup file from the archive file.-T: Used to list the file names in an archive file.-Z: Compress files or unzip with GNU Gzip.-Z: Compress files or unzip with compress.-j: Compress files or unzip with bzip2.-use Example
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.