Linux Command Introduce

xiaoxiao2021-03-19  186

Name: Cat

Use permission: All users

How to use: cat [-abeensttuv] [--help] [--Version] FileName

Description: Connect the file to the basic output (screen or plus> filename to another)

parameter:

-n or --Number is numbered by 1st of all outputs

-b or --Number-nonblank and -n, but not numbered for blank lines

-S or - SQUEEZE-Blank When there is a blank line with two consecutive lines, it is changed to a row of blank lines.

-v or --show-nonprinting

example:

CAT -N TEXTFILE1> TextFile2 Enter the textFile2 file after adding the file content of TextFile1

CAT -B textFile1 TextFile2 >> TextFile3 adds the contents of TextFile1 and TextFile2 to TEXTFILE3

Name: CD

Use permission: All users

How to use: CD [DIRNAME]

Description: Transform work catalog to Dirname. The DiRName representation can be an absolute path or relative path. If the directory name is omitted, transform to the user's Home Directory (that is, the directory where Login is located).

In addition, "~" is also expressed as HOME DIRECTORY, "." Means the current directory, ".." indicates the current directory of the current directory location.

Example: Jump to / usr / bin /:

CD / usr / bin

Jump to your own home Directory:

CD ~

Jump to the upper two layers of the current directory:

Cd ../ ..

Directive Name: Chmod

Use permission: All users

How to use: chmod [-cfvr] [--help] [--version] mode file ...

Description: Linux / UNIX file access rights are divided into three levels: file owners, groups, others. Using CHMOD how to control the file is accessed by others.

Tie count:

Mode: Permissions set strings, formats are as follows: [Ugoa ...] [ - =] [RWXX] ...] [, ...], where u indicates the owner of the file, G represents the file The owner belongs to the same group (Group), o other people, a means that these are all.

Represents increased permissions, indicates cancellation, = indicates unique setting permissions.

R indicates that readable, W represents written, x represents executable, X represents only when the file is a subdirectory or the file has been set to be executed.

-c: If this file authority does have changed, it will display its change action.

-f: If this file is not changed, do not display an error message.

-v: Details showing permission changes

-R: The same permissions change in the current directory with the subdirectory (ie, changed by one by one)

--help: Display auxiliary instructions

--Version: Display version

Example: Set the file file1.txt to everyone can read:

CHMOD UGO R File1.txt

Setting the file file1.txt can be read:

CHMOD A R File1.txt

Set the file file1.txt and file2.txt to this file owner, which is written with its own same group, but other people cannot be written:

CHMOD UG W, O-W File1.txt File2.txt

Set the ex1.py to only the file owner can perform:

CHMOD u x ex1.py

Set all the files and subdirectories in the current directory to anyone read:

CHMOD -R A R *

In addition, CHMOD can also use numbers to express permissions such as CHMOD 777 file.

Grammatical: chmod abc file

Where A, B, C are each number, which represents USER, Group, and Other permissions.

R = 4, w = 2, x = 1

To RWX attribute 4 2 1 = 7;

To RW-attribute 4 2 = 6;

To R-X attribute 4 1 = 7.

example:

CHMOD a = rwx file

with

CHMOD 777 File

Effect

CHMOD UG = RWX, o = X File

with

CHMOD 771 FILE

Effect

If you use CHMOD 4755 FileName, this program has root permissions

Directive Name: Chown

Use permission: root

How to use: chmod [-cfhvr] [--help] [--version] user [: group] file ...

Description: Linux / UNIX is multi-person multi-work industry, all of which have owners. Use Chown to change the owners of the file. In general, this instruction only is used by the system administrator (root), and the general user has no permissions to change someone else's file owner, and there is no permission to change the owner of its own files to others. Only the system administrator (root) has such permissions.

Tie count:

User: New Archive owner's user IDGroup: New Archive owner's User Group (Group) -c: If the file owner does have changed, the change action is displayed - F: If the owner cannot Do not display the error message - H: only for links (LINK), not the LINK, true pointing file -V: Display owner change - R: All files and subdirectories in current directory Perform the same owner change (ie, changed one by one by way) - Help: Display Auxiliary Description --Version: Display version

Example:

Set the owner of the file file1.txt to the User Group User Jessie:

Chown Jessie: Users file1.txt

Set all the files in the current directory with the owner of the subdirectories Lamport:

CHMOD -R LAMPORT: USERS *

Name: CP

Use permission: All users

Use mode:

CP [options] Source Dest

CP [Options] Source ... Directory

Description: Copy a file to another, or copy several files to another directory.

Put on

-a will copy the file status, permissions and other materials as much as possible.

-r If the Source contains a directory name, the files in the directory are also copied to the destination.

-f If the destination already has the same file, it is deleted before the replication is removed.

example:

Copy the file aaa (already existing) and name BBB:

CP AAA BBB

Copy all C language to the finished subdirectory:

cp * .c finished

Name: CUT

Use permission: All users

Usage: cut-cnum1-num2 filename

Description: Shows the text that counts Num1 to Num2 from the beginning.

example:

Shell >> Cat Example

TEST2

this is test1

Shell >> Cut -c0-6 example ## print starts the first 6 words

Test2this I

Name: find

Usage: find

Instructions for use :

List of files that comply with Expression in the archive system. You can refer to a combination of different information such as the name, category, time, size, permissions, etc., only fully matched.

Find determines the Path and Expression on the following rules, first on the command - (), the previous part is PATH, after which is Expression. If PATH is a empty string, use the current path, if expression is the empty string, use -print as the preset expression 

There are more than two or thirty options that can be used in Expression, which only introduces the most commonly used part.

-mount, -xdev: Only check and specify files under the same archive system, avoid listing files in other archives systems.

-AMIN N: Readed in the past N minutes

-anewer file: Archives read later than files File

-Atime N: Files read in N days in the past

-cmin N: Modified in the past N minutes

-cnewer file: file updated than file file

-ctime N: Archives in the past N days

-empty: Empty Archive - GID N or -Group Name: GID is n or group name is Name

-ipath p: -path p: The path name is compliant with the file, IPath will ignore the case

-Name Name, -iname name: The file name is compliant with the file. INAME will ignore cases

-Size N: The file size is N unit, b represents the block of the 512-bit group, c represents the number of words, and k indicates that kilo Bytes, W is two bit yuan groups. -type C: The file type is C file.

D: Directory

C: Dictionary device file

B: Block device file

P: Total list

F: general file

l: Symbol connection

S: socket

-PID N: Process ID is the file

You can use () to separate the arithmetic, and use the following operations.

EXP1 -AND EXP2

! expr

-Not EXPR

EXP1 -OR EXP2

EXP1, EXP2

example:

List of all extended files in the current directory and its subdirectory is C.

# Find. -name "* .c"

List all the general files in their underlying directory

# Find. -ftype f

List all files updated in the current directory and its subdirectory

# Find. -ctime -20

Name: Less

Use permission: All users

Use mode:

Less [option] FileName

Description:

The role of Less is very similar to more, can be used to browse the content of the text file, the different is that the LESS allows the user to go back

To browse some parties that have been seen, because LES is not entered into the entire file at the beginning, it will be fast than the general instrument editor (such as vi) when encountering a large file.

example:

Directive Name: LN

Use permission: All users

How to use: ln [options] Source Dist, where Option is:

[-BDFINSVF] [-S backup-suffix] [-V {numbered, existing, simple}]

[--help] [--version] [-]

Description: In the Linux / UNIX file system, there is a so-called link, we can treat it as an alias of the file, and the link can be divided into two: hard links and soft links, Hard connection means that a file can have multiple names, while the soft connection is to generate a special file, which is the location of another file. Hard links are in the same archive system, while soft links can span different archive systems. The LN Source Dist is a link (dist) to SOURCE, as for the use of the hard link or soft link, is determined by the parameter.

Whether it is a hard link or soft link, it will not copy a copy of the original file, and will only take a very small amount of disk space.

-f: The file will first delete the file with the DIST: Allow the system administrator hard link to your directory -i: When deleting the file with the DIST, I'm inquiry -N: On When the soft link, the Dist is treated as a general file-S: Symbolic link -V: The file name is displayed before the connection - B: Backup of files that will overwrite or deleted during the link - S Suffix: Plus backup files with SUFFIX's word-V Method: Specify the way backup - HELP: Display auxiliary instructions --Version: Display version

Example:

Generate a Symbolic Link: ZZ with the file yy

Ln -s yy zz

Generate a Hard Link: ZZ with the file yy

ln yy xx

Name: Locate Usage Permissions: All users

How to use: Locate [-q] [-d] [--Database =]

Locate [-r] [--Regexp =]

Locate [-qv] [-o] [--output =]

Locate [-e] [-f] <[- l] [-c]

<[- u] [-u]>

Locate [-VH] [--Version] [--help]

Description:

Locate allows users to quickly search for the specified file in the archive system. Its method is to build a database including all file names and paths in the system, and then only query this database when looking for, without having to go deep into the archive system.

In a general distribution, the establishment of the database is placed automatically in the contab. General users use as long as used

# locate your_file_name

The model is OK. parameter:

-u

-U

Establish a database, -U will start by the root directory, and -U can specify the starting location.

-e

will

Exclude outside the range of findings.

-L

If it is 1. Start safe mode. In safe mode, the user will not see the file that is not available. This will slow down because Locate must obtain the permission information of the file in the actual archive system.

-f

Except for a specific archive system, for example, we have not reached the tool in the Proc archive system in the database.

-Q

Quiet mode does not display any error messages.

NN

At most displayed output.

-r

Use the regular operation to do the conditions for finding.

-o

Specifies the name of the information inventory.

-d

Specify the path to the database

-H

Display auxiliary message

-V

Show more messages

-V

Display program version message example:

LOCATE chDRV: Looking for all files called ChDRV

LOCATE-N 100 A.out: Look for all files called A.out, but only 100

Locate -u: Establish a database

Name: LS

Use permission: All users

How to use: ls [-ALRTAFR] [name ...]

Description: Displays the contents of the specified working directory (list the files and subdirectories included in the current working directory). -a Displays all files and directories (LS demonstrates the file name or directory name "." will not be listed as hidden files.

-L In addition to the file name, the file type, authority, owner, and file size is also detailed.

-r Displays the file in the opposite order (originally in the order of English)

-t lists the priorities of the file according to the establishment time

-A, but not listed "." (Current directory) and ".." (parent directory)

-F adds a symbol after listed by the file name; for example, the executable is added "*", the directory is added "/"

-R If there is a file in the directory, the following files are also listed.

example:

List all the names in the current working directory, the beginning of the beginning, and the more advances are reached:

Ls -ltr S *

List all directories and file details below / bin directory:

Ls -lr / bin

List all files and directories under the current working directory; directory is added later, "/", can perform files after adding "*":

LS -AF

Name: more

Use permission: All users

How to use: more [-dlfpcsu] [-num] [ / pattern] [ linenum] [filenames ..]

Description: Similar to CAT, it will make the user's page-by-page reading at a page, and the most basic instruction is displayed in the next page of the blank key (Space). Press the B button to go back (Back) One page shows, and also has the function of searching strings (similar to VI), in use, press H.

Parameters: -num number displayed

-d Tips, display [Press Space to Continue, Q to Quit.] below the screen, if the user presses the wrong button, [Press H for instructions.] is displayed instead of beep.

-l cancels the function of meeting special character ^ l (paper feed characters)

When calculating the number of lines, the number of rows after the actual line (some single lines will be expanded to two or more lines)

-p does not display each page in a rolling manner, but first cleared the screen and then display the content.

-C is similar to -p, different is to display content and then clear other old materials.

-S When you encounter a blank line with two consecutive lines, it is changed to the blank line of a line.

-u does not display the lower quotation marks (different depending on the termage specified by the environment variable TERM)

/ Search the string (Pattern) before each file is displayed, then start displaying from the string

NUM starts from the Normal line

Filenames can display the file file, can be multiple numbers

example:

More -s testfile Displays the file content of TestFile, if there is a row, the blank line is displayed in a row of blank lines.

More 20 Testfile starts the contents of Testfile from the 20th line.

Name: MV

Use permission: All users

Use mode:

MV [Options] Source Dest

MV [Options] Source ... Directory

Description: Move a file to another, or move several files to another.

Parameters: -i If the destination already has the same name file, first ask if the old file is overwritten. example:

Rename the file AAA as BBB:

MV AAA BBB

Move all C language programs to the finished subdirectory:

mv -i * .c

Name: RM

Use permission: All users

How to use: rm [options] name ...

Description: Delete files and directories.

Put on

-i before the deletion, please ask for confirmation one by one.

-f even if the original file property is set to read, it is also directly deleted without one by one.

-r Detects the directory and below.

example:

Delete all C language program files; ask one by one before deleting confirmation:

Rm -i * .c

Delete all files in the Finished subdirectory and subdirectory:

RM -R finished

Name: RMDir

Use permissions: All users with appropriate permissions in current directory

How to use: rmdir [-p] DIRNAME

Description: Delete empty directories.

Parameters: -P is that when the subdirector is deleted, it will also be deleted by the way.

example:

Delete the subdirectory named AAA in the working directory:

RMDir AAA

In the BBB directory in the working directory, delete the subdirectory called TEST. If the Test is deleted, the BBB directory is empty, then BBB is also deleted.

RMDIR -P BBB / TEST

Name: split

Use permission: All users

How to use: split [option] [INPUT [Prefix]

Description:

Split a file into several files. From the INPUT division output into a fixed-size file, its file name is prefixaa, prefixab ...; prefix preset value `x. If there is no input file or `-, you will be read from the standard input.

匡 兜 

-b, --Bytes = Size

The size value is the size of each output file, and the unit is BYTE.

-C, --Line-bytes = size

In each output, the maximum number of BYTEs in a single line.

-L, --Lines = Number

The Number value is the size of the column size of each output.

-Number

The same as -l Number.

--Verbose

Print the detection information to standard error output before each output file is opened.

--help

Display auxiliary information and then leave.

--Version

Listed by this information and then leave.

Size can join the unit: b represents 512, K represents 1k, M represents 1 meg.

example:

Postgressql Large Data Library Backup and Recycling:

Because Postgres allows the form to have a largest capacity of your system file, it is possible to have problems with table dump to a single file, and Split is used to divide.

% PG_Dump DBNAME | SPLIT -B 1M - FileName.dump.

Reload

% CreatedB DBName

% cat filename.dump. * | PGSQL DBNAME

Name: Touch

Use permission: All users

Use mode:

Touch [-ACFM]

[-r reference-file] [--file = reason "File]

[-t mmddhhmm [cc] yy] [. ss]

[-d Time] [--DATE = TIME] [--Time = {Atime, Access, Use, Mtime, Modify}]

[--NO-CREATE] [--HELP] [--Version] file1 [file2 ...]

Description:

Touch command changes the time record of the file. LS -L can display the time record of the file.

parameter:

a Changing the read time record of the file.

m change the modification time record of the file.

C If the purpose file does not exist, it will not establish a new file. Like -No-Create.

F is not used, is to retain to compatibility with other UNIX systems.

r Use the reference file time record, like the effect of thefile.

D Setting time and ****, you can use a variety of different formats.

T Time Record of the file is set, the format is the same as the DATE instruction.

--NO-CREATE does not establish a new file.

--Help lists the instruction format.

--Version lists this message.

example:

The simplest way of use, change the file when you record the time. If the file does not exist, a new file will be established.

Touch file

TOUCH file1 file2

Change the time record of File to 18:3:39 on May 6, 2,000 years. Time format can refer to the Date directive, at least you need to enter MMDDHHMM, which is the time of months and minutes.

Touch -c -t 05061803 file

Touch -c -t 050618032000 file

Change the File time record into ReferenceFile.

Touch -R ReferenceFile File

The time record of File is changed to 18:3:36 on May 6, two thousand years old. Time can be used in AM, PM or 24-hour format, and other formats can be used in other formats such as 6 May 2000.

Touch -d "6:03 pm" file

Touch -d "05/06/2000" File

Touch -d "6:03 PM 05/06/2000" File

Name: AT

Use permission: All users

How to use: At -V [-q queue] [-f file] [-mldbv] Time

Description: AT allows the user to specify a certain number or instruction in Time, TIME's format is HH: mm, the HH of HH is hour, MM is minutes, or you can specify AM, PM, Midnight, Noon, Teatime (is 4 pm).

If you want to specify the time in more than a day, you can use mmddyy or mm / dd / yy format, where mm is minute, DD is the day, yy refers to the year. In addition, the user can even use a NOW time interval to elastic designation time, where the interval can be Minutes, Hours, Days, Weeks

In addition, the user can also specify Today or Tomorrow to represent today or tomorrow. When the time is specified and press Enter, the AT will enter the conversation mode and ask for input instructions or programs. When you press CTRL D, press Ctrl D to complete all the actions, as for the result of the execution, will be sent back to your account .

Tie count:

-V: Print Publication No.

-q: Use the specified column (queue) to store, the data of the AT is stored in the so-called queue, and the user can use multiple queue at the same time, and the number of Queue is A, B, C ... Z, and A 52 in total, B, ... Z

-m: If there is no output result after the program / instruction is executed, it is also necessary to send a letter to the user.

-f file: Read the pre-written command file. Users do not have to use the conversation mode to enter, first write all the specified first to the file again, read -l: List all the specified (the user can also use ATQ directly without using AT -L)

-d: Delete design (can also use ATRM directly without AT -D)

-v: list all specified that has been completed but has not been deleted

Example:

5 pm after three days of execution / bin / ls:

AT 5PM 3 days / bin / ls

5 pm after three weeks of performed / bin / ls:

AT 5PM 2 Weeks / Bin / LS

Tomorrow's 17:20 execution / bin / date:

At 17:20 Tomorrow / BIN / DATE

The last day of 1999 printing the end of world!

At 23:59 12/31/1999 echo the end of world!

Name: CAL

Use permission: All users

How to use: Cal [-mjy] [MONTH [YEAR]

Description:

Display calendar. If there is only one parameter, it represents the year (1-9999), showing the annual calendar. It must be written in the year: `` Cal 89 / will not show the calendar of 1989. Use two parameters, indicating the month and year. If there is no parameter, this month's calendar is displayed.

September 3rd on September 1752, the Western calendar, because most countries used a new calendar, 10 days of removal, so the monthly calendar of the month is somewhat different. It was before this.

匡 兜 

-M: Displayed on weekdays for weekly first day.

-J: Displayed by Kaisa, that is, the number of days from January 1 is displayed.

-y: Show this year calendar.

example:

CAL: Shows the monthly calendar of this month.

[root @ mylinux / root] # Date

Tue aug 15 08:00:18 CST 2000

[root @ mylinux / root] # CAL

August 2000

Su Mo Tu We TH fr SA

1 2 3 4 5

6 7 8 9 10 11 12

13 14 15 16 17 18 19

20 21 22 23 24 25 26

27 28 29 30 31

[root @ MYLINUX / root] #

CAL 2001: Shows the annual calendar of AD.

[root @ MYLINUX / ROOT] # CAL 2001

2001

January February March

Su Mo Tu We TH fr Su Mo Tu We TH fr sa

1 2 3 4 5 6 1 2 3 1 2 3

7 8 9 10 11 12 13 4 5 6 7 8 9 10 4 5 6 7 8 9 10

14 15 16 17 18 19 20 11 14 16 17 11 12 13 14 15 16 17

21 22 23 24 25 26 27 18 19 20 21 22 23 24 18 19 20 21 22 23 24

28 29 30 31 25 26 27 28 25 26 27 28 29 30 31

April May June

Su Mo Tu We TH fr Su Mo Tu We TH fr sa

1 2 3 4 5 6 7 1 2 3 4 5 1 2

8 9 10 11 12 13 14 6 7 8 9 10 11 12 3 4 5 6 7 8 9

15 16 17 18 19 20 21 14 15 16 17 18 19 10 11 12 13 14 15 16

22 23 24 25 26 27 28 20 21 222 23 24 25 26 17 18 19 20 21 22 2329 30 27 28 29 30 31 24 25 26 27 28 29 30

July August September

Su Mo Tu We TH fr Su Mo Tu We TH fr sa

1 2 3 4 5 6 7 1 2 3 4 1

8 9 10 11 12 13 14 5 6 7 8 9 10 11 2 3 4 5 6 7 8

15 16 17 18 19 20 21 12 14 15 16 17 18 9 10 11 12 13 14 15

22 23 24 25 26 27 28 19 20 21 22 23 24 25 16 17 18 19 20 21 22

29 30 31 26 27 28 29 30 31 23 24 25 25 26 27 28 29

30

October November DecEmber

Su Mo Tu We TH fr Su Mo Tu We TH fr sa

1 2 3 4 5 6 1 2 3 1

7 8 9 10 11 12 13 4 5 6 7 8 9 10 2 3 4 5 6 7 8

14 15 16 17 18 19 20 13 14 16 17 9 10 11 12 13 14 15

21 22 23 24 25 25 26 27 18 19 20 21 22 23 24 16 17 18 19 20 21 22

28 29 30 31 25 26 27 28 29 30 23 24 25 26 27 28 29

30 31

[root @ MYLINUX / root] #

CAL 5 2001: Shows AD in May 2001.

[root @ MYLINUX / ROOT] # CAL 5 2001

May 2001

Su Mo Tu We TH fr SA

1 2 3 4 5

6 7 8 9 10 11 12

13 14 15 16 17 18 19

20 21 22 23 24 25 26

27 28 29 30 31

[root @ MYLINUX / root] #

Cal -m: The first day of week is the week, showing this month.

[root @ mylinux / root] # Cal -m

August 2000

Mo Tu We TH fr SU

1 2 3 4 5 6

7 8 9 10 11 12 13

14 15 16 17 18 19 20

21 22 23 24 25 26 27

28 29 30 31

[root @ MYLINUX / root] #

Cal -jy: Displays the number of days from January 1st.

[root @ MYLINUX / ROOT] # Cal -jy

2000

January February

Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat

1 32 33 34 35 36

2 3 4 5 6 7 8 37 38 39 40 41 42 43

9 10 11 12 13 14 15 44 45 46 47 48 49 50

16 17 18 19 20 21 22 51 52 53 54 55 56 57

23 24 25 26 27 28 29 58 59 60

30 31

March April

Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat

61 62 63 64 92

65 66 67 68 69 70 71 93 94 95 96 97 98 99

72 73 74 75 76 77 78 100 101 102 103 104 105 10679 80 81 82 83 84 85 107 108 109 110 111 112 113

86 87 88 89 90 91 114 115 116 117 118 119 120

121

May June

Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat

122 123 124 125 126 127 153 154 155

128 129 134 131 132 133 134 156 157 158 159 160 161 162

135 136 137 138 139 140 141 163 164 165 166 167 168 169

142 143 144 145 146 147 148 170 171 172 173 174 175 176

149 150 151 152 177 178 179 180 181 182

July August

Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat

183 214 215 216 217 218

184 185 186 187 188 189 190 219 220 221 222 223 224 225

191 192 193 194 195 196 197 226 227 228 229 230 231 232

198 199 200 201 202 203 204 233 237 238 239

205 206 207 208 209 210 211 240 241 242 243 244

212 213

September October

Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat

245 246 275 276 277 278 279 280 281

247 248 249 250 251 252 253 282 283 284 285 286 287 288

254 255 256 257 258 259 260 289 290 291 292 293 294 295

261 262 263 264 265 266 267 296 297 298 299 300 301 302

268 269 270 271 272 273 274 303 304 305

November december

Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat

306 307 308 309 336 337

310 311 312 313 314 315 316 338 339 340 341 342 343 344

317 318 319 320 321 322 323 345 346 347 348 349 350 351

324 325 326 327 328 329 330 352 353 354 355 356 357 358

331 332 333 334 335 359 360 361 362 363 364 365

366

[root @ MYLINUX / root] #

Name: crontab

Use permission: All users

Use mode:

Crontab [-U user] filecrontab [-u user] {-l | -r | -e}

Description:

Crontab is used to use the user at a fixed time or a fixed interval execution, in other words, that is, the like's schedule. -u user refers to the schedule that sets the specified user. This premise is that you have to have its permissions (such as root) to specify the schedule of others. If you don't use -u user, it means to set your own schedule.

Number of meals:

-e: Perform a text editor to set a time program, the contents of the text editor is VI. If you want to use the other text editor, please set the Visual environment variable to specify the use of that text editor (for example STENV Visual Joe) -r: Delete the current Turkey

-L: List the current schedule

The format of the schedule is as follows:

F1 F2 F3 F4 F5 Program

Where F1 is a minute, F2 represents hours, and F3 represents the first few days in one month, and F4 represents the month, F5 represents the first few days in the week. Program represents the program to be executed.

When F1 is *, it is indicated that the program is executed every minute, and the F2 is *, it is executed per hour, and the remaining classes are pushed.

When F1 is A-B, it is performed from step a minutes to the second minute. When F2 is A-B, it is to be executed from paragraphs A to B.

When F1 is * / n, each time interval is executed once, F2 is * / N to execute once a time interval per n, and the remaining classes push

When F1 is A, B, C, ... is shown in paragraph A, B, C, ... minutes to perform, F2 is A, B, C, ... indicated first, b, c ... Hourly to be executed, the rest

Users can also store all settings first in the file file, and set the time schedule in the way in the CRONTAB FILE.

Example:

Perform an hour per hour per hour / bin / ls:

0 7 * * * / bin / ls

In December, 6:00 pm every day, per 20 minutes, per 20 minutes, / usr / bin / backup:

0 6-12 / 3 * 12 * / usr / bin / backup

On Monday to Friday, send a letter to alex@domain.name on Monday to Friday.

0 17 * * 1-5 Mail -s "hi" alex@domain.name

0:20 points per day, 2:20, 4:20, 4:20 .... Executive Echo "Haha"

20 0-23 / 2 * * * Echo "Haha"

Note:

After executing the time you specified, the system will send you a letter to you, show the program executed, if you don't want to receive such a letter, please add> / dev after each line of empty / NULL 2> & 1.

Name: Date

Use permission: All users

Use mode:

Date [-u] [-d datestr] [-s datestr] [--UTC] [--Universal] [--date = datestr] [--SET = DATESTR] [--help] [--version] [ FORMAT] [MMDDHMM [CC] YY] [. ss]

Description:

Date can be used to display or set the date and time of the system. In the display, the user can set the format that wants to display, the format is set to a plurality of plus numbers, where the available tag list is as follows:

Time:

%: Print%

% N: Next line

% T: jumping

% H: Hours (00....

% I: Hours (01..12)

% K: Hours (0..23)

% L: Hours (1..12)

% M: Minutes (00..59)

% P: Display Local AM or PM

% R: Direct display time (12 hours, format HH: mm: ss [ap] M)

% S: From January 1, 1970 00:00 UTC to the number of seconds

% S: second (@ 10)

% T: Direct display time (24-hour system)

% X: equivalent to% h:% m:% s

% Z: Show time zone

Date:

% A: Sun..sat

% A: Sunday..SATURDAY

% B: Month (Jan..dec)

% B: January..DECEMBER

% C: Direct display date and time

% D: Japan (01..31)

% D: Direct Display Date (mm / DD / YY)

% H: same% B

% J: The first day of the year (001..366)

% M: Month (01..12)

% U: The first day of the year (00..53) (the first day of Sunday is one week)

% W: The first day of the week (0..6)

% W: The first day of the year (00..53) (in the first day of Monday)

% x: Direct display Date (mm / dd / yy)

% Y: The last two digits of the year (00.99)

% Y: Complete Year (0000..9999)

If it does not start with the plus sign, it means to set the time, and the time format is MMDDHHMM [CC] YY] [. SS], where mm is month, DD is the day, HH is hour, MM is a minute, CC is the year The first two digits, YY is two digits after the year, SS is the number of seconds.

Tie count:

-d DateStr: Displays the time set in DateStr (non-system time)

--help: Display auxiliary message

-s datestr: Set the time set to the time set in DateStr

-u: Show current Greenwich Time

--Version: Display version number

Example:

During the display time, the time is jumped, then display the current date:

Date % T% N% D

Display months and days:

Date % B% D

Display date and set time (12:34:56):

Date --Date 12:34:56

Note:

When you don't want to have meaningless 0 (for example, 1999/03/07), you can insert - symbols in the mark, such as Date % - H:% - M:% - S will not be in seconds The meaning of the meaning is removed, like the original 08:09:04 will be changed to 8: 9: 4. In addition, only the permissions (such as ROOT) can set the system time.

When you change the system time with the root identity, please write the system time in CMOS in CLOCK -W so that the system time will continue to hold the latest correct value when it is rebooted next time.

Name: SLEEP

Use permission: All users

How to use: Sleep [--help] [--version] Number [SMHD]

Description: Sleep can be used to delay the current action for a while

Parameter Description :

--help: Display auxiliary message

--Version: Display version number

Number: Time length, back can be connected to S, M, H or D

Where S is second, m is minutes, H is hour, D is the number of days

Example:

Shows the current time after 1 minute, then display time again:

Date; Sleep 1M; Date

Name: Time

Use permission: All users

How to use: Time [Options] Command [arguments]

Description: The use of the Time command is information such as time and system resources that measure the time and system resources required for specific instructions. For example, CPU time, memory, input and the like, and the like. Special attention is required is that some information can not be displayed on Linux. This is because the allocation of some resources on Linux is not the same as the TIME instruction, so that the TIME instruction cannot be obtained.

Put on

-o or --Output = file

Set the result output file. This option writes the output of the Time to the specified file. If the file already exists, the system will override its content. -a or --append

With -O use, the result will be written to the end of the file without overwriting the original content.

-f format or - format = format

Set the display mode with the Format string. When this option is not set, you will use the system preset format. However, you can use the environment variable time to set this format, so you don't have to set it once every login system.

Generally set, you can use

/ t

Indicates the jump, or use

/ N

Reverse the wrap. Each material uses% as a preamble. If you want to use a percentage symbol in the string, use it. (People who have learned C language will feel very familiar)

There are four major items that the TIME instructions can display, namely:

Time Resources

Memory Resources

IO Resources

Command info

The detailed content is as follows:

Time Resources

E Execute the time spent, the format is: [Hour]: minute: second. Note that this number does not represent the actual CPU time.

e Execute the time spending the instruction, the unit is second. Note that this number does not represent the actual CPU time.

The time spent on the core mode during the execution of the S command is seconds.

U The time spent in the user mode during execution, the unit is second.

P Execute the occupation ratio of the CPU when the command is executed. In fact, this number is the core mode plus the CPU time of the user mode divided by total time.

Memory Resources

M The maximum value of the entity memory occupied during execution. Unit is KB

T execute the average value of the entity memory occupied, the unit is KB

K The total amount of memory (Stack Data Text) occupied by the K executive program is KB.

D Executive Program The average size of the unshared data area, the unit is KB

P Execute the average size of the unshared stack, the unit is KB

X The average of the shared text is executed, and the unit is KB

The size of the Z system memory page is byte. This is a constant for the same system.

IO Resources

F This program's main memory page error occurrence number. The so-called main memory page error is that a memory page has been replaced into the SWAP file and has been assigned to other programs. At this point, the content of this page must be read again from the replacement.

R The number of times the secondary memory page of this program is incorrect. The so-called secondary memory page error is that although the memory page has been replaced into the replacement file, it is not allocated to other programs. At this point, the content of this page is not broken, and it is not necessary to read it from the replacement.

W This program is swapped to the number of replacement files

C This program is forced to interrupt (like the distributed CPU time is exhausted)

W This program voluntarily disrupts (like the number of I / O execution, like a disk read, etc.)

I number of files entered by this program

O number of files outputted by this program

r Socket Message received by this program

s Socket Message sent by this procedure

K This program received by the signal (Signal)

Command info

C Execution parameters and instruction name

X command end code (exit status)

-p or --portability

This option will automatically set the display format as: Real% E

User% u

SYS% S

The purpose of this is to compat with the POSIX specifications.

-v or --verbose

This option will list the resources used in all programs, not only, as well as general English statements, but also instructions. People who don't want to spend time to set or just start to contact this instruction is quite useful.

example:

Use the following instructions

Time -V PS -AUX

We can get the results of PS -AUX and the system resources taken. As listed below:

User PID% CPU% MEM VSZ RSS TTY Stat Start Time Command

Root 1 0.0 0.4 1096 472? s APR19 0:04 Init

Root 2 0.0 0.0 0 0? SW APR19 0:00 [KFlushd]

Root 3 0.0 0.0 0 0? SW APR19 0:00 [KPIOD]

......

Root 24269 0.0 1.0 2692 996 PTS / 3 r 12:16 0:00 ps -aux

Command being timed: "ps -aux"

User Time (Seconds): 0.05

System Time (Seconds): 0.06

Percent of CPU this Job Got: 68%

Elapsed (Wall Clock) Time (H: MM: SS OR M: SS): 0: 00.16

Average Shared Text Size (KBYTES): 0

Average unshared data size (kbytes): 0

Average stack size (kbytes): 0

Average Total Size (KBYTES): 0

Maximum Resident Set Size (KBYTES): 0

Average Resident Set size (kbytes): 0

Major (Requiring I / O) Page Faults: 238

Minor (Reclaiming A Frame) Page Faults: 46

Voluntary Context Switches: 0

Involuntary Context Switches: 0

SWAPS: 0

FILE SYSTEM INPUTS: 0

File System Outputs: 0

Socket Messages SENT: 0

Socket Messages Received: 0

Signals Delivered: 0

Page Size (bytes): 4096

EXIT STATUS: 0

Name: uptime

Use permission: All users

How to use: uptime [-v]

Description: Uptime provides the following information, no other parameters:

Current time

The system is turned on to the time

The number of users connected

Recently, five minutes and fifteen minutes of system load

Parameters: -v Displays version information.

Example: uptime

The result is:

10:41 AM UP 5 Days, 10 min, 1 Users, Load Average: 0.00, 0.00, 1.99

Name: CHFN

Use permission: All users

Usage: shell >> CHFN

Description: Provide users to change individual information for Finger and Mail UserName

example:

Shell >> CHFN

Changing Finger Information for User

Password: [del] name []: johnney huang ### provides information when providing finger

Office []: NCCU

Office phone []: [DEL]

Home phone []: [DEL]

Name: chsh

Use permission: All users

Usage: shell >> Chsh

Description: Change the user shell setting

example:

Shell >> Chsh

Changing Fihanging Shell for User1

Password: [DEL]

New shell [/ bin / tcsh]: ### [is currently used by Shell]

[DEL]

Shell >> Chsh -l ### 展 / / etc / shells archive content

/ BIN / BASH

/ bin / sh

/ BIN / ASH

/ bin / bsh

/ bin / tcsh

/ bin / csh

Name: Finger Use Permissions: All users

How to use: finger [Options] user [@address]

Note: Finger allows the user to query some other user's information. The information that will be listed is:

Login Name

User name

Home Directory

Shell

Login Status

Mail status

.plan

.project

.forward

Where. PLAN, .Project and .Forward are the data in the file in his Home Directory. ProWard, etc. If there is no. The Finger directive is not limited to queries on the same server, or you can find users on a remote server. Just give an address like an e-mail address.

Put on

-L

Multi-line display.

-S

Single line display. This option only displays the login name, real name, terminal name, idle time, login time, office number, and phone number. This option is invalid if the user is the user of the remote server.

Example: The following instructions can check the information of this machine:

Finger root

The results are as follows:

Login: root name: root

Directory: / root shell: / bin / bash

NEVER Logged IN.

No Mail.

NO PLAN.

Name: Last

Use permission: All users

How to use: shell >> Last [Options]

Explanation: The display system has been a message from the beginning of the month.

Put on

-R 省 Hostname's field

-Num show before NUM

UserName display UserName login message

TTY restriction login message contains terminal code

example:

Shell >> Last -R-2

Johnney PTS / 1 MON AUG 14 20:42 STILL Logged in

Johnney PTS / 0 MON AUG 14 19:59 Still Logged in

WTMP Begins Tue Aug 1 09:01:10 2000 ### / var / log / wtmp

Shell >> Last -2 Minery

Minery PTS / 0 140.119.217.115 MON AUG 14 18:37 - 18:40 (00:03)

Minery PTS / 0 140.119.217.115 Mon Aug 14 17:22 - 17:24 (00:02)

WTMP Begins Tue Aug 1 09:01:10 2000 Name: Login

This order will not be done! Oh, I am not here, I have a push ink to delay everyone's beautiful youth ^ _ ^

Name: Passwd

Use permission: All users

How to use: Passwd [-k] [-l] [-u [-f] [-d] [-s] [username]

Description: Used to change the password of the user

parameter:

-k

-L

-u

-f

-d Close the user's password authentication function, the user will not be able to enter a password when logging in, and only the user who has root privileges can be used.

-S Displays the specified user's password authentication species, only the user who has root privileges can be used.

[username] Specifies the account name.

Name: WHO

Use power line: All users can use

How to use: WHO - [husfv] [user]

Note: There are those users in the display system being on, and the data displayed contains the user ID, the terminal used, connected from there, online time, lag time, CPU usage, action, etc.

Tie count:

-h: Do not display the title column

-u: Do not display user action / work

-s: Show with short format

-f: Do not display the user's online location

-V: display program version

Name: / etc / aliases

Use permission: System managers

How to use: please update your database with newaliases

Description:

Sendmail uses an action that is converted by the user name in / etc / aliases. When sendmail receives a letter to XXX, it will be given to another by the content of the AliaSS file. This feature creates a user who is only valid in the letters system. For example, Mailing List uses this feature. In MailingList, we may create a mailingList called Redlinux@link.ecpi.edu, but actually doesn't have a user named RedLinux. The actual AliaSS file is to receive the Mailing List processing of the Mailing List processing.

/ etc / aliases is a file file, Sendmail requires a binary format /etc/aliases.db. NEWALIASES's functional is to convert / etc / aliases into a repository that SENDMAIL can understand. example:

# newaliases

The following command will do the same thing.

# sendmail -bi

Related commands:

Mail, Mailq, Newaliases, Sendmail

"Mail [Back]

Name: Mail

Use permission: All users

How to use: mail [-iinv] [-S Subject] [-c cc-addr] [-b bcc-addr] user1 [user 2 ...]

Description:

Mail is just a directive, Mail is also an email program, but people who use Mail to read the letter should be very small! For system managers, Mail is useful, because managers can write to Script with Mail, regularly send some memorandum of reminder systems.

parameter:

i ignore the interrupt signal of TTY. (Interrupt)

I forced set into interactive mode. (Interactive)

v prints the message, such as the location of the send letter, state, and the like. (Verbose)

n Do not read the mail.rc setting file.

S Mail title.

C CC mail address.

B BCC email address.

example:

Get the letter to one or more email addresses, because no other options are added, the user must enter the contents of the title and the letter. User2 does not have a host position, it will be given to the user2 user of the mail server. Mail User1@email.address

Mail User1@email.address user2

Sending the content of mail.txt to user2 simultaneously CC to USER1. If you set this line instruction to cronjob, you can send a memo to the system user.

Mail -s Title - C User1 USER2

Directive: MESG

Use permission: All users

How to use: MESG [y | n]

Explanation: Decide whether other people are allowed to get to their end-machine interface

Y: Allow messages to the terminal interface.

n: Do not allow messages to the terminal interface.

If there is no setting, the message delivery is fixed by the terminal interface.

Example:

Changing the current message settings, modification is not allowed to pass on the terminal interface:

MESG N

Directives related to MESG are: Talk, Write, Wall.

Name: / etc / aliases

Use permission: System managers

How to use: newaliases

Description:

Sendmail uses an action that is converted by the user name in / etc / aliases. When sendmail receives a letter to XXX, it will be given to another by the content of the AliaSS file. This feature creates a user who is only valid in the letters system. For example, Mailing List uses this feature. In MailingList, we may create a mailingList called Redlinux@link.ecpi.edu, but actually doesn't have a user named RedLinux. The actual AliaSS file is to receive the Mailing List processing of the Mailing List processing.

/ etc / aliases is a file file, Sendmail requires a binary format /etc/aliases.db. NEWALIASES's functional is to convert / etc / aliases into a repository that SENDMAIL can understand.

Parameters: No parameters. example:

# newaliases

The following command will do the same thing.

# sendmail -bi

Related commands:

Mail, Mailq, Newaliases, Sendmail

Name: Talk

Use permission: All users

Use mode:

Talk Person [TTYNAME]

Description: Talk to other users

Tie count:

Person: The user account for the interpretation, if the user can enter Person@machine.name on other machines

TTYNAME: If the user has more than two TTY connectors, you can choose the right TTY message.

Example. 1:

Talking to the user rolland on the machine now, and Rolland has only one connection:

Talk Rolland

The next step is to respond, if rollaend accepts, RollaEnd Enter the `Talk Jzlee`, you can start talking, press CTRL C.

Example. 2: Talk to the user rolland on Linuxfab.cx, use PTS / 2 to talk:

Talk rollaend@linuxfab.cx PTS / 2

The next step is to respond, if rollaend accepts, RollaEnd Enter the `Talk Jzlee @ Jzlee.home`, you can start talking, press Ctrl C to pay attention: If the word of the screen appears abnormal character, try Press CTRL L to update the screen screen.

Name: Wall

Use permission: All users

Use mode:

Wall [Message]

Instructions for use:

Wall transmits the message to each MESG to be set to YES. When using the terminal interface as standard, add EOF (usually using Ctrl D) 

Example:

Communication "hi" gives each user:

Wall Hi

Name: Write

Use permission: All users

Use mode:

Write user [TTYNAME]

Description: Communication to other users

Tie count:

User: User account for preparing message

TTYNAME: If the user has more than two TTY connectors, you can choose the right TTY message.

Example. 1:

The news is given to Rolland, and the Rolland has only one connection:

Write rolland

The next is to hit the message, please press CTRL C.

Example .2: Communication to Rolland, rolland's connection with PTS / 2, PTS / 3:

Write RollaEnd PTS / 2

The next is to hit the message, please press CTRL C.

Note: If the other party sets MESG N, the interpretation will not pass to the other party.

Name: kill

Use permission: All users

Use mode:

Kill [-siGnal | -p] [-a] PID ...

Kill -l [Signal]

Description: KILL sends a specific signal (Signal) to the stroke of the stroke ID, as a specific action based on this signal, if not specified, the preset is a signal to be terminated (TERM)

Put on

-S (Signal): Among them, the signals are HUP (1), KILL (9), TERM (15), which represents heavy run, cut off, end; detailed signals can be used with kill -l

-p: Print PID, does not send the signal

-L (Signal): List all available signal names

example:

Cut the PID 323 stroke (kill):

KILL-9 323

Running the PID 456 (Restart):

Kill-Hup 456

Name: Nice

Use permission: All users

How to use: nice [-n adjustment] [-adjustment] [--adjustment = adjustment] [--help] [--version] [Command [arg ...]

Description: Execute the program with a changed priority, if not specified, print the current scheduled priority, the internal Adjustment is 10, the range is -20 (highest priority) to 19 (minimum priority)

Put on

-n Adjustment, -adjustment, --adjustment = Adjustment is an increase in Adjustment to this original priority?

--help display help message

--Version Display Version Information

example:

Put the priority of the LS 1 and execute:

Nice -n 1 ls

Add 10 priority to 10 and execute:

Nice LS adds the priority of the LS 10 and execute

Note: Priority is used for the job system to determine the parameters assigned by the CPU. Linux uses the "Round-Robin" to do the CPU schedule, the higher the priority, the cpu time that may be obtained more. Name: PS

Use permission: All users

How to use: ps [options] [--help]

Description: Show the dynamics of the moment

parameter:

There are a lot of PS parameters, and only several common parameters are listed here and

-A lists all itinerary

-W Display widened can display more information

-au shows more detailed information

-AUX shows all strokes that contain other users

Au (x) output format:

User PID% CPU% MEM VSZ RSS TTY Stat Start Time Command

User: Tour owner

PID: PID

% CPU: Used CPU usage

% MEM: Occupation Memory Use

VSZ: The size of the virtual memory occupied

RSS: The size of the memory

TTY: The secondary device number of the terminal (Minor Device Number Of TTY)

Stat: The status of this trip:

D: I / O action in uninterrupted still (通 □ □ 缜 B)

R: is being executed

S: Static state

T: Pause

Z: No existence but temporarily unable to eliminate

W: There is not enough memory paging to allocate

<: High priority stroke

N: low priority stroke

L: There is a memory paging assignment and lock in memory (instant system or A I / O)

START: Time of the trip

Time: Time to do

Command: Directive executed

example:

PS

PID TTY TIME CMD

2791 TTYP0 00:00:00 TCSH

3092 TTYP0 00:00:00 PS

% PS -A

PID TTY TIME CMD

1? 00:00:03 init

2? 00:00:00 Kflushd

3? 00:00:00 Kpiod

4? 00:00:00 Kswapd

5? 00:00:00 MDRECoveryd

.......

% PS -AUX

User PID% CPU% MEM VSZ RSS TTY Stat Start Time Command

Root 1 0.0 0.7 1096 472? S Sep10 0:03 init [3]

Root 2 0.0 0.0 0 0? SW SEP10 0:00 [KFLUSHD]

Root 3 0.0 0.0 0 0? SW SEP10 0:00 [KPIOD]

Root 4 0.0 0.0 0 0? SW SEP10 0:00 [KSWAPD]

........

Name: PStree

Use permission: All users

Use mode:

PStree [-a] [-c] [-h | -hpid] [-l] [-n] [-p] [-u] [-g | -u] [pid | user]

PStree -V

Description: Display all the strokes in a tree map, the tree map will be PID (if there is specified) or in init this basic stroke (root), if there is a specified user ID, the tree map will only display The trip owned by the user

parameter:

-a Displays the full instructions and parameters of the itinerary, if it is replaced by the memory body, add parentheses

-c If there is a rebounded stroke name, it is listed separately (the preset value will be added in front *

example:

PStree

INIT - - AMD

| -apmd

| -ATD

| -httpd --- 10 * [httpd]

% PStree -P

INIT (1) - - AMD (447)

| -apmd (105)

| -ATD (339)

% PStree -C

INIT - - AMD

| -apmd

| -ATD

| -HTTPD - - httpd | | -httpd

| | | -HTTPD

| | | -HTTPD

....

Name: renice

Use permission: All users

How to use: renice priority [-p] pid ...] [-g] pgrp ...] [-u] user ...]

Explanation: Refaten a priority of one or more strokes (one or more will depend on the above parameters)

Put on

-p PID re-specifies the priority of the Id of the stroke to PID

-g PGRP re-specifies the priority of the ID of the stroke group (one or more) of PGRP (one or more)

-u User re-specifies priority for the stroke owner for the User

example:

Plus the stroke ID of 987 and 32 and the priority number of the stroke owner is Daemon and root plus 1:

RENICE 1 987 -U daemon root -p 32

Note: Each trorate has a unique ID 

Name: TOP

Use permission: All users

How to use: TOP [-] [D DELAY] [q] [c] [s] [s] [n]

Explanation: Display Process dynamics instantly

Put on

D: Change the displayed update speed, or press S in the Trolver Command Column (Interactive Command)

Q: There is no delay display speed. If the user is the permissions of superUser, the top will execute at the highest priority.

C: Switch the display mode, there are two modes, one is only the name of the execution file, the other is to display the full path and the name S: cumulative mode, the subunion of the completion or disappear, the dead product CPU Time accumulate

S: Safety mode, cancel the conversation instruction, avoid potential crisis

i: No idle (IDLE) or useless (Zombie) stroke

N: Update the number of times, will exit TOP after completion

B: Batch file mode, with "N" parameters, can be used to output the result of TOP to the file

example:

Show out ten times after ten times;

TOP-N 10

The user will not use the conversation instruction to the stroke command:

Top -s

Enter the update display twice into the file name to top.log:

TOP-N 2 -B

Name: Skill

Use permission: All users

How to use: skill [signal to send] [options] Select the rules of the program

Description:

Send a signal to the executable program, the preset message is Term (interrupt), the more often used information is HUP, INT, KILL, STOP, CONT, and 0

The message has three ways: -9, -sigkill, -kill, can use -l or -l already listed the available messages.

General parameters:

-f fast mode / has not been completed

-i interactive mode / each action will be confirmed

-V Detailed output / list of selected programs

-w Intelligent warning message / has not been completed

-n no action / display program code

Parameters: The rules of the selection can be that the terminal code, the user name, the program code, the command name.

-T Terminal Code (TTY or PTY)

-u user name

-P program code (PID)

-c Command Name You can use the signal:

The known signal name, signal code, and function will be listed below.

Name (code) function / description

ALRM 14 leaves

HUP 1 leave

INT 2 leave

Kill 9 leaves / forced close

PIPE 13 leaves

Poll leaves

PROF leaves Term 15 leaves

USR1 leaves

USR2 leaves

VTALRM leaves

STKFLT leaves / only for I386, M68K, ARM, and PPC hardware

Unused leaves / only for I386, M68K, ARM, and PPC hardware

TSTP stop / generate behavior related to content

TTIN stop / generate behavior related to content

Ttou stop / generate behavior related to content

STOP stop / forced shutdown

CONT From the new start / if the stop state is started, otherwise ignore

PWR ignores / leave in some systems

Winch ignores

CHLD ignores

ABRT 6 core

FPE 8 core

Ill 4 core

Quit 3 core

SEGV 11 core

TRAP 5 core

SYS core / perhaps no actual

EMT core / perhaps no actual

BUS core / core failure

XCPU core / core failure

XFSZ core / core failure

example:

Stop all programs on the PTY device

Skill -kill -v PTS / *

Stop three users USER1, USER2, USER3

Skill -stop User1 User2 USER3

Other related commands: kill

Name: EXPR

Use permission: All users

### String length

Shell >> EXPR Length "this is a test"

14

### Digital Commercial Number

Shell >> EXPR 14% 9

5

### From the location

Shell >> EXPR SUBSTR "this is a test" 3 5

IS IS

### Digital Skewers Only The First Character

Shell >> Expr Index "Testforthegame" e

2

### String truly reproduced

Shell >> EXPR Quote THISATSTFORMELA

ThisisatestFormela

Name: TR

### 1. Compare to the part to change all uppercase files in the directory to lowercase files?

There seems to be many ways, "TR" is one of them:

#! / bin / sh

DIR = "/ tmp / testdir";

Files = `Find $ DIR -TYPE F`;

For i in $ files

DO

Dir_name = `Dirname $ I`;

Ori_filename = `basename $ I`

NEW_FILENAME = `Echo $ Ori_FileName | TR [: Upper:] [: Lower:]`> / dev / null;

#echo $ new_filename;

MV $ DIR_NAME / $ Ori_FileName $ DIR_NAME / $ New_FILENAME

DONE

### 2. ourselves ... LowerCase to Uppercase

Tr Abcdef ... [del] Abcde ... [DEL]

TR A-Z A-Z

Tr [: Lower:] [: Upper:]

Shell >> Echo "this is a test" | TR A-Z A-Z> WWW

Shell >> Cat WWW

This is a test

### 3. Remove the string of unwanted

Shell >> Tr -d this ### Remove about T.E.S.T

THIS

MAN

MAN

Test

e

### 4. Replace strings

Shell >> Tr -s "this" "test"

THIS

Test

TH

TE

Directive: CLEAR

Uses: Clear the screen.

How to use: Enter clear on Console.

Name: Reset, Tset

How to use: tset [-iqqrs] [-] [-e ch] [-i ch] [-k ch] [-m mapping] [Terminal]

Instructions for use:

Reset actually and tset is a command that is the purpose of setting the terminal. In general, this command will automatically determine the current terminal of the current terminal from the environment variable, command column, or other configuration. If the specified type is?, This program will ask the user to enter the terms of the terminal.

Since this program sets back the terminal back to the original state, in addition to the use of login, when the system terminal enters some strange states because the program is not properly executed, you can also use it to reset the terminal O, for example Be careful to enter the binary file with the CAT directive to the terminal, often there is a terminal that does not respond to the keyboard input, or responds to some strange characters. You can reply to the original state with RESET. Option Description:

-p

Display the terminal category on the screen, but do not make the set action. This command can be used to achieve the category of the current terminal.

-e ch

Set the ERASE unit into CH

-i ch

Set the interrupt character to CH

-k ch

Will delete a line of characters set to Ch

-I

Don't do settings, if you don't use the option -Q, the current value of Erase, interrupts and delete characters will still be sent to the screen.

-Q

Do not display ERASE, interrupt and delete the value of the character to the screen.

-r

Print the terminal machine class on the screen.

-S

Send the type of command to the setting TERM to the terminal, usually used in .login or .profile

example:

Let the user enter a terminal model and set the terminal to the type other preset state.

# RESET?

Set the ERASE character set Control-h

# RESET -E ^ B

Display the string of the setting on the screen

# reset -s

ERASE IS Control-B (^ b).

Kill IS Control-U (^ U).

Interrupt IS Control-C (^ c).

Term = xterm;

Name: Compress

Use permission: All users

How to use: Compress [-dfvcv] [-B Maxbits] [file ...]

Description:

Compress is a fairly ancient UNIX file compression instruction. The compressed file will add a .z extended file name to distinguish uncompressed files, compressed files can be decompressed in uncompress. To press the plurality of files into a compressed file, you must first turn the archive Tar and then compress. Since Gzip can generate more ideal compression ratios, the general people have changed more Gzip to archive compression tools.

parameter:

C Output results to standard output equipment (general refers to the screen)

F forced writing to the file, if the destination already exists, it will be overwritten (Force)

v The message executed by the program on the screen (Verbose)

b Set the upper limit of the number of common strings, calculate with bit yuan, can set the value of 9 to 16 bits. Due to the larger value, the more common strings that can be used, the greater the compression ratio, so the preset value of 16 bits (bits) is generally used.

D decompress the compressed file

V list publication message

example:

Complicate Source.dat into source.dat.z, if Source.dat.z already exists, the content is overwritten by the compressed file.

Compress -f Source.dat

Complicate Source.dat into source.dat.z and prints the compression ratio.

-V and -f can be used together

Compress -vf source.dat will import the data after the compressed data is output. Dat.z can change the compressed file name.

Compress -c Source.dat> Target.dat.z

The larger the value of -b, the larger the compression ratio, the range is 9-16, and the preset value is 16.

Compress -b 12 Source.dat

Unfolding Source.dat.z into Source.dat. If the file already exists, the user presses Y to determine the coverage file, and the file will be automatically covered if the -df program is used. Since the system will automatically join .Z is an extended file name, Source.dat will automatically be treated as Source.dat.z.

Compress -d Source.dat

Compress -d source.dat.z

Name: LPD

Use permission: All users

How to use: LPD [-l] [#port]

LPD is a resident printing machine management, which manages local or distal printers based on / etc / printcap content. Each printer defined in / etc / printcap must have a corresponding directory in / var / lpd. In the directory, a copy of the CF starts in a directory indicates a printing work waiting to be sent to the appropriate device. This file is usually generated by the LPR.

LPR and LPD constitute a system that can work offline. When you use LPR, the printing machine does not need to be available immediately, and no existence. LPD automatically monitors the status of the printing machine. When the press is online, the file will be sent immediately. This has to wait for the previous work to complete the previous job.

parameter:

-l: Display some of the unlocked messages on the standard output.

#port: In general, LPD uses GetServByName to get the appropriate TCP / IP Port, you can use this parameter to force LPD to use the specified port.

example:

This program is usually performed at the beginning of the system from the program in /etc/rc.d.

Name LPQ

- Display the work usage of unfinished lists in the listing machine

LPQ [L] [P] [User]

Description

LPQ displays items that are not completed in the list of lists managed by the LPD.

example

Example 1. Display all work in the LP list machine

# lpq -pljPrank Owner Job Files Total Size1st Root 238 (Standard Input) 1428646 Bytes

related functions

LPR, LPC, LPD

Name: LPR

Use permission: All users

How to use: lpr [-pprinter]

During the data sent by the standard input to the printing machine, the printing machine management program LPD will be given to the appropriate program or device processing later. The LPR can be used to process the material to be sent to the local or distal host.

parameter:

-pprinter: Send the data to the specified printer Printer, the preset value is LP.

example:

Send www.c and kkk.c to the printing machine LP.

lpr-plp www.c kkk.c

Name: lprm

- Remove the usage by a work by the print machine

/ usr / bin / lprm [p] [file ...]

Description

The work that has not been completed will be placed in the printing machine, which can be used to cancel the work of the printing machine. Since each printer has a separate storage, you can use the -P command to set the printed machine you want to function. If there is no setting, the system preset press will be used.

This command checks if the user has enough permissions to delete the specified file. In general, only the owner of the file or the system administrator has this permission.

example

Remove LPRM -PPRINTER 1123 to Work in the printing machine HPPrinter

Working No. 1011 is removed from the preset printing machine

LPRM 1011

Name: fdformat

Use permission: All users

How to use: fdformat [-n] Device

Instructions for use :

Low-order formatting for the specified soft disc device. When using this instruction to format the floppy disk, it is best to specify the following device:

/ dev / fd0d360 disk machine A:, magnetic 360KB disk

/ DEV / FD0H1440 disk machine A:, magnetic disk is 1.4MB disk

/ DEV / FD1H1200 disk machine B:, magnetic disk is 1.2MB disk

If you use a device like / dev / fd0, if the disk inside is not a standard capacity, formatting may fail. In this case, the user can specify the necessary parameters first with the setFDPRM instruction.

parameter:

-N Close the confirmation function. This option closes the formatted confirmation step.

example:

FDFORMAT-N / DEV / FD0H1440

Format the magnetic disk of the disk machine A into a 1.4MB magnetic sheet. And the confirmation step is omitted.

Name: MFormat

Use permission: All users

Use mode:

MFORMAT [-T cylinders] [-h heads] [-l volume_label] [-f] [-i fsver-sion] [-S SIZECODE] [-2 Sectors_ON_TRACK_0] [-M Software_sector_size] [-A ] [-X] [-C] [-H hidden_sectors] [-r root_sector] [-b boot_sector] [-0 rate_on_track_0] [-A rate_on_other_tracks] [-1] [-k] Drive:

The DOS archive system is established on a magnetic sheet that has been made in low-order formatting. If you open the parameters of the USE_2M when compiling MTools, the partial parameters associated with the 2M format will work. Otherwise these parameters (like S, 2, 1, m) do not act.

parameter:

-T magnetic column (Synlider)

-H head (HEAD)

-S number of magnetic regions per magnetic

-l tag

-F The formatted magnetic disc is formatted to FAT32, but this parameter is still in the experiment.

-I Sets the version number in the FAT32. This is of course still in the experiment.

-S magnetic area size code, calculation mode for sector = 2 ^ (size code 7)

-C Magnetic bush (Cluster) of the magnetic area. If the given number causes the number of magnets that exceed the FAT table, MFORMAT will automatically amplify the number of magnetic regions.

-S

-M Software magnetic area size. This number is the magnetic area size returned by the system. Usually the same as the actual size.

-A If this parameter is added, MFormat generates a set of ATARI systems to this soft disc.

-X Format the flop to XDF format. Before use, you must use the XDFCOPY instruction to make a low-order formatting action.

-C Generates a disk image file (Disk Image) that can be installed with MS-DOS archive system. Of course, this parameter is meaningless to an entity disk machine.

-H hidden the number of magnetic regions. This is usually suitable for the split area of ​​the formatting the hard drive because there is a segmentation table in front of a divided area. This parameter is not tested, it can not be used.

-N disk serial number

The size of the -R root directory, the unit is the number of magnetic regions. This parameter is only valid for FAT12 and FAT16.

-B uses the specified file or the power-on magnetic area of ​​the device as the boot magnetic area of ​​this flap or division area. Of course, the hardware parameters are faded. -k Try to maintain the original boot magnetic area.

-0 Data transfer rate of the 0th rail

-A Data transfer rate outside the track

-2 use 2M format

-1 Do not use 2M format

example:

MFORMAT A:

This will use the preset value to format the disk in A: (already / DEV / FD0).

Name: MKDOSFS

Use permission: All users

How to use: MKDOSFS [-C | -L filename]

[-f number_of_fats]

[-F fat_size]

[-i volume_id]

[-M message_file]

[-n volume_name]

[-r root_dir_entry?]

[-s sector_per_cluster]

[-v]

DEVICE

[block_count]

Description: Establish a DOS archive system. Device means that you want to establish a device code for a DOS archive system. Like / dev / hda1, etc. Block_count is the number of blocks you want to configure. If block_count is not specified, the system automatically calculates the number of blocks that meet the size of the device.

parameter:

-c Create a file system before checking there is a bad track.

-l reads bad track records from the determined file.

-f Specifies the number of FAT, File Allocation Table. The preset value is 2. At present, Linux's FAT archive system does not support more than 2 FAT tables. Usually this doesn't need to be changed.

-F Specifies the size of the FAT table, usually 12 or 16 positions. The 12-bit group is usually used for the disks, and the 16-bit component group is used for the general hard disk division area, that is, the so-called FAT16 format. This value typically systematically selects the appropriate value itself. Using FAT16 on the disk usually does not take effect, it is also possible to use FAT12 on the hard disk.

-i Specifies the Volume ID. Generally, a number of four-bit tuples, like 2E203A47. If you don't give your system you will be generated.

-m When the user tries to boot with this magnetic or divided zone, the system will give the user a warning message to the user when there is no working system. This parameter is used to change this message. You can use the file to edit it, then specify this parameter, or use

-m -

This system will ask you to enter this text directly. It is important to note that the strings in the file should not exceed 418 words, including the unfolded jumper symbol (Tab) and the wrap symbol (the wrap symbol counts two characters under DOS!)

-n Specifies Volume Name, which is a disk label. Like the Format directive under the DOS, you will not give it. There is no preset value.

-r Specifies the maximum number of files under the root directory. The so-called number of files here includes the directory. The preset value is 112 or 224 on the floppy disc, 512 on the hard disk. Nothing, don't change this number.

-S Magnetic area of ​​each magnetic busner. Must be two times. But unless you know what you are doing, this value should not be gave.

-v provides additional messages

example:

MKDOSFS-N TESTER / DEV / FD0 format the disk in the A slot into a DOS format, and set the label to Tester

Excerpted from Linuxeden.com for you!

转载请注明原文地址:https://www.9cbs.com/read-130239.html

New Post(0)