Home Operation and Maintenance Linux Operation and Maintenance Summary of commonly used commands in Linux systems

Summary of commonly used commands in Linux systems

Jun 23, 2017 pm 02:13 PM
linux Order Commonly used Summary system

Command format: command - option parameters, for example: ls -la /usr; when there are multiple options, they can be written together.
ifconfig: View the IP information of the current machine
service network restart: Restart the network service
service iptables status: View the current machine firewall status
hostname XX: View or modify the host name
pwd: View Full path of the current file
ls -l or ll or ls: View the contents of the current directory
cat File name: Indicates viewing the content of the file (small file)
more File name: Indicates viewing the content of the file (large file ), use spaces to turn pages, press Enter to display the next line, q (or ctrl+c) to exit
mkdir: Create a folder
mkdir -p d3/d4/d5: Recursively create a folder
touch : Create a file
head -number [file name]: View the first number of lines of the file
tail -number [file name]: View the last number of lines of the file
mv 1 Function to modify the file name: mv [ Source file name] [New file name]
2 Move file location: mv [Source file name] [New file location + New file name]

Command: chmod
Syntax: chmod [{ugo }{+-=}{rwx}] [File or directory]
chmod [mode=421] [File directory]
Description: Change the permissions of the file or directory
Form: chmod g+w filename
Form: chmod 761 filename

Problem example: Create a new directory with a new file below it. Try to use an ordinary user to delete the new file in the new directory.
1 Try to modify: Set the read and write permissions of the new file to 777, and delete the file
2 Try to modify: Set the read and write permissions of the new directory to 777, and delete the file

rwx permissions:
r: Can perform read operations such as catch and more.
w: Modify the content of the file and other write operations, but it does not mean that you can delete the file.
x: Perform operations on files.
rwx permissions of the directory:
r: Readable operation, you can list the contents of the directory, such as the ls command.
w: Indicates the permission to create or delete files in the directory.
x: Indicates that you can enter this directory (basically all directories will have rx permissions).
So: the permission to delete a file is to have the write permission of the directory where your current file is located.

Command: chown
Syntax: chown user file
Description: Change the owner of the file
Example: chown newuser t1.sh
useradd username Add user
passwd username is User set password

Command: chgrp
Syntax: chgrp group file
Description: Change the group to which the file belongs
Example: chgrp adm t1.sh
View system default permissions: umask -S (umask view permission mask value 022, use 777-022 to get the real permissions)

Command: find
Syntax: find [search range path] -name [file name] (search based on file name)
          find [search range path] -size [(+-) file size] (search based on file size, greater than + and less than -)
          find [search range path] -user (owner of the file)
find [time search] [in days]
[in days] 1 ctime, atime, mtime
[in minutes] 2 cmin, amin, mmin
. . . . .
Description: Find any file or directory (all)

find [Time search] [in days]
Days: ctime, atime, mtime
Minutes: cmin, amin, mmin
c means: change means changing file attributes (such as owner, group, permission change).
a means: access means that it has been accessed (such as viewed, etc.).
m means: modify means changing the content.
Add in front of the time: - means inside, + means outside


Find the applied connector:
-a (meaning and, logical AND)
-o (or means logical or)

find search: search based on file type:
-type
where: f represents a binary file, l represents a soft link file, d represents a directory

Find connection execution symbol:
find ... -exec [execution command] {} \;
Note: "{}" represents the result of the find command, and "\" represents the escape character
find ... -exec [Execute command] {} \;
find ... -ok [Execute command] {} \;
The difference between ok and exec is that ok means asking for confirmation.
find -inum [i node label] Find files based on i node. In the Linux system, all files have a unique identifier, which is convenient for the Linux kernel to call. This is the i node

command: locate
Syntax: locate [file name]
Description: Find files according to the index inside the Linux database (updatedb command, you can manually update the updatedb database, generally used in conjunction with locate)
Note: The search speed of locate Very fast, much faster than find. The reason is that locate searches for the index value of the file database built by the Linux system, so it is very fast. However, sometimes newly created files cannot be found using the locate command. The reason is that the file The index is not immediately updated to the Linux system file database.

Command: man
Syntax: man [command or configuration file],
Description: Help command, very useful, you can get help documentation for the command, how to use it, etc.

Command: whatis
Syntax: whatis [command]
Description: View the description of the command.

Command: --help
Syntax: [Command] --help
Description: View command option usage.

Command: gzip
Syntax: gzip [file name]
Description: The original file is not retained during compression, and only files can be compressed but not directories

Command: gunzip
Syntax: gunzip [compressed file]
Description: Decompress the file without retaining the source file

Command: tar
Syntax: tar [zcvf] [zxvf] [package file name .tar.gz] [Source file]
          -c Generate tar package file (required)
          -x Generate decompressed file (required)
          -v Display detailed information
           -f Specify Compressed file name
        -z Pack and compress simultaneously
Description: The suffix name .tar.gz generated by the packaging directory, or decompression
Add -C in the final configuration to indicate the path where the file will be stored after decompression
The file command can view the type of any file

Command: zip
Syntax: zip option [-r] [Compressed file name] [Source file]
Description: The format of zip is windows and linux A common format that can compress files and directories. The option -r is required when compressing directories.

Command: unzip
Syntax: unzip [decompressed file]
Description: Decompress
Add -d in the final configuration to indicate the path where the file will be stored after decompression

ping
(Note: There are many reasons why ping cannot reach the other party's network, and you need to investigate in detail step by step)
(1) First, ping the loopback address 127.0.0.1 to check whether the network protocol of your own machine is correct
( 2) Ping the local IP again to see if your local network is correct
(3) Then check the other party’s network settings, firewall, plug-ins, etc.
(4) If you find that there are lost packets in the packet loss rate, It may be caused by the network or network cable
(5) Ping configuration option ping -c 6 192.168.80.100 (meaning it will be disconnected after pinging 6 times)
(6) Ping configuration option ping -s 60000 (maximum 65507)

View network card information: ifconfig
Shutdown: shutdown -h now
Restart: reboot
ctrl + l Clear the screen.
ctrl + c Exit the application.
Tab key, information completion.

Filtering: grep, you can filter the specified content and then output it.

Pipeline:
Transmit the output of one command to another command as the input of another command. Pipes can connect N commands.
ls -l /etc | more (indicates that the output of ls -l /etc is used as the input of the more command, that is, the content browsed by the more command is the output of the previous command)
ls -l /etc | grep init (indicates that the output results of ls -l /etc are filtered and displayed as the results of init)
ls -l /etc | grep init | wc -l (the last number of statistics displayed)

Logical AND (&&)
Form: ls && pwd (If the first command is executed successfully, the second command will be executed)
Logical OR (||)
Form: ls || pwd (If the first command is executed successfully, the second one will not be executed. If the first command fails, the second one will be executed)

Input and output redirection:
Shell is predefined for each process 3 file descriptors (0,1,2)
0 (stdin) standard input 1 (stdout) standard output 2 (stderr) standard error output
Output redirection: is to display the output results to a On the file (> indicates output redirection)

File information description:
drwxr-xr-x. 2 root root 6 Nov 5 2016 etc
d: Start with d, indicates directory, indicates folder
-: starts with -, indicates ordinary binary file
l: starts with l, indicates soft link file (link)
r: read permission, w: write write permissions, The permissions of r-x (group) and the permissions of others r-x (others)

After entering the text editing, you need to press a or i or o to edit the text
Exit the text editing operation The sequence is: first press the ESC key, then press SHIFT + :, enter wq to save and exit, enter q! to not save and force exit

Linux file description
1. File rwx
2, hard connection number
3, owner
4, group to which it belongs
5, file size (not precise)
6, file creation or modification time
7, The name of the file

/usr/software/JDK/jdk1.8.0_131

export JAVA_HOME=/usr/software/JDK/jdk1.8.0_131
export PATH=$JAVA_HOME/bin:$PATH
export CLASSPATH=.:$JAVA_HOME/lib/dt.jar:$JAVA_HOME/lib/tools.jar

CentOS 7.0 uses firewall as the firewall by default, here is the iptables firewall step.

1. Close firewall:
systemctl stop firewalld.service #Stop firewall
systemctl disable firewalld.service #Disable firewall startup
firewall-cmd --state #View the default firewall status (displayed after closing) notrunning, running will be displayed after turning it on)

2. iptables firewall (iptables has been installed here, configure it below)
vi/etc/sysconfig/iptables #Edit firewall configuration file
# sampleconfiguration for iptables service
# you can edit thismanually or use system-config-firewall
# please do not askus to add additional ports/services to this default configuration
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT[0:0]
:OUTPUT ACCEPT[0:0]
-A INPUT -m state--state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmp -jACCEPT
-A INPUT -i lo -jACCEPT
-A INPUT -p tcp -mstate --state NEW -m tcp --dport 22 -j ACCEPT
-A INPUT -p tcp -m state -- state NEW -m tcp --dport 80 -jACCEPT
-A INPUT -p tcp -m state --state NEW -m tcp --dport 8080-j ACCEPT
-A INPUT -j REJECT--reject- with icmp-host-prohibited
-A FORWARD -jREJECT --reject-with icmp-host-prohibited
COMMIT
:wq! #Save and exit

Note: 80 and 8080 are used here Take port as an example. The *** part is generally added above or below the "-A INPUT -p tcp -m state --state NEW -m tcp--dport 22 -j ACCEPT" line. Remember not to add it to the last line, otherwise the firewall will not work after restarting. Take effect.
systemctlrestart iptables.service #Finally restart the firewall to make the configuration take effect
systemctlenable iptables.service #Set the firewall to start at boot

The above is the detailed content of Summary of commonly used commands in Linux systems. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

deepseek web version entrance deepseek official website entrance deepseek web version entrance deepseek official website entrance Feb 19, 2025 pm 04:54 PM

DeepSeek is a powerful intelligent search and analysis tool that provides two access methods: web version and official website. The web version is convenient and efficient, and can be used without installation; the official website provides comprehensive product information, download resources and support services. Whether individuals or corporate users, they can easily obtain and analyze massive data through DeepSeek to improve work efficiency, assist decision-making and promote innovation.

How to install deepseek How to install deepseek Feb 19, 2025 pm 05:48 PM

There are many ways to install DeepSeek, including: compile from source (for experienced developers) using precompiled packages (for Windows users) using Docker containers (for most convenient, no need to worry about compatibility) No matter which method you choose, Please read the official documents carefully and prepare them fully to avoid unnecessary trouble.

Ouyi okx installation package is directly included Ouyi okx installation package is directly included Feb 21, 2025 pm 08:00 PM

Ouyi OKX, the world's leading digital asset exchange, has now launched an official installation package to provide a safe and convenient trading experience. The OKX installation package of Ouyi does not need to be accessed through a browser. It can directly install independent applications on the device, creating a stable and efficient trading platform for users. The installation process is simple and easy to understand. Users only need to download the latest version of the installation package and follow the prompts to complete the installation step by step.

BITGet official website installation (2025 beginner's guide) BITGet official website installation (2025 beginner's guide) Feb 21, 2025 pm 08:42 PM

BITGet is a cryptocurrency exchange that provides a variety of trading services including spot trading, contract trading and derivatives. Founded in 2018, the exchange is headquartered in Singapore and is committed to providing users with a safe and reliable trading platform. BITGet offers a variety of trading pairs, including BTC/USDT, ETH/USDT and XRP/USDT. Additionally, the exchange has a reputation for security and liquidity and offers a variety of features such as premium order types, leveraged trading and 24/7 customer support.

Get the gate.io installation package for free Get the gate.io installation package for free Feb 21, 2025 pm 08:21 PM

Gate.io is a popular cryptocurrency exchange that users can use by downloading its installation package and installing it on their devices. The steps to obtain the installation package are as follows: Visit the official website of Gate.io, click "Download", select the corresponding operating system (Windows, Mac or Linux), and download the installation package to your computer. It is recommended to temporarily disable antivirus software or firewall during installation to ensure smooth installation. After completion, the user needs to create a Gate.io account to start using it.

15 commonly used currency circle escape index technology analysis 15 commonly used currency circle escape index technology analysis Mar 03, 2025 pm 05:48 PM

In-depth analysis of the top 15 Bitcoin Escape Index: Market Outlook for 2025 This article deeply analyzes fifteen commonly used Bitcoin Escape Index, among which the Bitcoin Rhodl ratio, USDT current wealth management and altcoin seasonal index have reached the Escape Index in 2024, attracting market attention. How should investors deal with potential risks? Let us interpret these indicators one by one and explore reasonable response strategies. 1. Detailed explanation of key indicators AHR999 coin hoarding indicator: Created by ahr999, assisting Bitcoin fixed investment strategy. The current value is 1.21, which is in the wait-and-see range, so it is recommended to be cautious. Link to AHR999 Escape Top Indicator: A supplement to AHR999 Coin Hoarding Indicator, used to identify the top of the market. The current value is 2.48, this week

Ouyi Exchange Download Official Portal Ouyi Exchange Download Official Portal Feb 21, 2025 pm 07:51 PM

Ouyi, also known as OKX, is a world-leading cryptocurrency trading platform. The article provides a download portal for Ouyi's official installation package, which facilitates users to install Ouyi client on different devices. This installation package supports Windows, Mac, Android and iOS systems. Users can choose the corresponding version to download according to their device type. After the installation is completed, users can register or log in to the Ouyi account, start trading cryptocurrencies and enjoy other services provided by the platform.

How to automatically set permissions of unixsocket after system restart? How to automatically set permissions of unixsocket after system restart? Mar 31, 2025 pm 11:54 PM

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

See all articles