Home System Tutorial LINUX Linux gunzip command example explanation

Linux gunzip command example explanation

Jul 20, 2024 am 08:00 AM
linux linux tutorial Red Hat linux system linux command linux certification red hat linux linux video

For beginners, the gzip tool is mainly used to compress or expand files. When decompressing, just add the -d option after the gzip command. The usage example is as follows:

Linux gunzip 命令实例讲解

gzip -d [compressed-file-name]
Copy after login

However, there is a completely different tool available when decompressing or expanding compressed files created by gzip. The tool in question is gunzip. In this article, we will explain the usage of gunzip command using some simple and easy-to-understand examples. All examples and guides in this article were tested under Ubuntu 16.04 environment.

Linux gunzip command

We now know that compressed files can be decompressed using the gzip -d or gunzip command. The basic gunzip syntax is:

gunzip [compressed-file-name]
Copy after login

The following Q&A example will show more clearly how the gunzip tool works:

Q1. How to use gunzip to decompress compressed files?

The decompression command is very simple, just pass the compressed file name as a parameter to the gunzip command.

gunzip [archive-name]
Copy after login

For example:

gunzip file1.gz
Copy after login

linux-gunzip-commandexampleLinux gunzip 命令实例讲解

How to use gunzip to decompress compressed files?

Q2. How to prevent gunzip from deleting the original compressed files?

As you have noticed, the gunzip command deletes the original compressed file after decompression. If you want to keep the original compressed file, you can use the -c option.

gunzip -c [archive-name] > [outputfile-name]
Copy after login

For example:

gunzip -c file1.gz > file1
Copy after login

Linux gunzip 命令实例讲解

How to make gunzip not delete the original compressed files?

Using this method, the original compressed file will not be deleted.

Q3. How to use gunzip to decompress files to other paths?

We have already discussed the usage of -c option in the Q&A. Use gunzip to decompress files to a path other than the working directory. Just add the absolute path of the target directory after the redirection operator.

gunzip -c [compressed-file] > [/complete/path/to/dest/dir/filename]
Copy after login

Examples are as follows:

gunzip -c file1.gz > /home/himanshu/file1
Copy after login
More information

The following details excerpted from the man page of gzip/gunzip will be helpful to those who want to know more.

gunzip accepts a series of files on the command line and compresses the contents of each file starting with the correct magic number and with a suffix of .gz, -gz, .z, -z or _z (ignoring case) , replacing it with the uncompressed file and removing its original extension. gunzip can also recognize some compressed files with special extensions, such as .tgz and .taz, which are the abbreviations of .tar.gz and .tar.Z respectively. When compressing, gzip uses .tgz as the extension when necessary, instead of just truncating the .tar suffix.

gunzip can currently decompress files generated by gzip, zip, compress, compress -H (pack). gunzip automatically detects input file formats. When using the first two compression formats, gunzip checks a 32-bit cyclic redundancy check (CRC). For pack packages, gunzip checks the compressed length. Standard compression formats are not designed to allow compatibility checking. But gunzip can sometimes detect bad .Z files. If you make an error when decompressing a .Z file, don't assume that the .Z file must be correct just because the standard decompression does not report an error. This usually means that the standard decompression process does not check its input and directly produces an incorrect output. SCO's compress -H format (lzh compression method) does not include a CRC checksum, but does allow some compatibility checks.

Conclusion

The basic usage of gunzip mentioned so far does not require too much learning curve. We've included almost everything a beginner needs to know to start using it. To learn more about usage, check out the man page.


The above is the detailed content of Linux gunzip command example explanation. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Will R.E.P.O. Have Crossplay?
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Difference between centos and ubuntu Difference between centos and ubuntu Apr 14, 2025 pm 09:09 PM

The key differences between CentOS and Ubuntu are: origin (CentOS originates from Red Hat, for enterprises; Ubuntu originates from Debian, for individuals), package management (CentOS uses yum, focusing on stability; Ubuntu uses apt, for high update frequency), support cycle (CentOS provides 10 years of support, Ubuntu provides 5 years of LTS support), community support (CentOS focuses on stability, Ubuntu provides a wide range of tutorials and documents), uses (CentOS is biased towards servers, Ubuntu is suitable for servers and desktops), other differences include installation simplicity (CentOS is thin)

How to install centos How to install centos Apr 14, 2025 pm 09:03 PM

CentOS installation steps: Download the ISO image and burn bootable media; boot and select the installation source; select the language and keyboard layout; configure the network; partition the hard disk; set the system clock; create the root user; select the software package; start the installation; restart and boot from the hard disk after the installation is completed.

Centos options after stopping maintenance Centos options after stopping maintenance Apr 14, 2025 pm 08:51 PM

CentOS has been discontinued, alternatives include: 1. Rocky Linux (best compatibility); 2. AlmaLinux (compatible with CentOS); 3. Ubuntu Server (configuration required); 4. Red Hat Enterprise Linux (commercial version, paid license); 5. Oracle Linux (compatible with CentOS and RHEL). When migrating, considerations are: compatibility, availability, support, cost, and community support.

How to use docker desktop How to use docker desktop Apr 15, 2025 am 11:45 AM

How to use Docker Desktop? Docker Desktop is a tool for running Docker containers on local machines. The steps to use include: 1. Install Docker Desktop; 2. Start Docker Desktop; 3. Create Docker image (using Dockerfile); 4. Build Docker image (using docker build); 5. Run Docker container (using docker run).

Detailed explanation of docker principle Detailed explanation of docker principle Apr 14, 2025 pm 11:57 PM

Docker uses Linux kernel features to provide an efficient and isolated application running environment. Its working principle is as follows: 1. The mirror is used as a read-only template, which contains everything you need to run the application; 2. The Union File System (UnionFS) stacks multiple file systems, only storing the differences, saving space and speeding up; 3. The daemon manages the mirrors and containers, and the client uses them for interaction; 4. Namespaces and cgroups implement container isolation and resource limitations; 5. Multiple network modes support container interconnection. Only by understanding these core concepts can you better utilize Docker.

What to do after centos stops maintenance What to do after centos stops maintenance Apr 14, 2025 pm 08:48 PM

After CentOS is stopped, users can take the following measures to deal with it: Select a compatible distribution: such as AlmaLinux, Rocky Linux, and CentOS Stream. Migrate to commercial distributions: such as Red Hat Enterprise Linux, Oracle Linux. Upgrade to CentOS 9 Stream: Rolling distribution, providing the latest technology. Select other Linux distributions: such as Ubuntu, Debian. Evaluate other options such as containers, virtual machines, or cloud platforms.

What to do if the docker image fails What to do if the docker image fails Apr 15, 2025 am 11:21 AM

Troubleshooting steps for failed Docker image build: Check Dockerfile syntax and dependency version. Check if the build context contains the required source code and dependencies. View the build log for error details. Use the --target option to build a hierarchical phase to identify failure points. Make sure to use the latest version of Docker engine. Build the image with --t [image-name]:debug mode to debug the problem. Check disk space and make sure it is sufficient. Disable SELinux to prevent interference with the build process. Ask community platforms for help, provide Dockerfiles and build log descriptions for more specific suggestions.

What computer configuration is required for vscode What computer configuration is required for vscode Apr 15, 2025 pm 09:48 PM

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

See all articles