Click on “Road of Technology for Migrant workers” and choose “Top or Star label”

10 o ‘clock every day for you to share different dry goods

Linux is currently the most widely used server operating system, based on Unix, open source and free, due to the stability and security of the system, the market share is very high, almost become the best system environment for program code to run. Linux can not only run the program code written by us for a long time, but also be installed in a variety of computer hardware devices, such as mobile phones, routers, etc. The lowest level of Android programs is running on Linux system.

Linux directory structure

/ Subdirectory structure

  • Bin (binaries) Stores binary executable files

  • Super user binaries (sbin) stores binary executable files, which can be accessed only by root

  • Etc (etcetera) stores system configuration files

  • Usr (Unix shared Resources) is used to store shared system resources

  • Home The root directory for storing user files

  • Root Superuser directory

  • Dev (Devices) Stores device files

  • Lib (library) contains shared libraries and kernel modules needed to run programs in the file system

  • MNT (mount) Installation point for the system administrator to install temporary file systems

  • Boot stores various files used for system boot

  • TMP (temporary) is used to store various temporary files

  • Var (variable) is used to store files whose data needs to be changed during running

Common Linux commands

Command format: command-option parameters (options and parameters can be empty)

Example: ls -la /usrCopy the code

2.1 Operating Files and Directories

2.2 Common System Commands

2.3 Compression Decompress

2.4 File Permission Operations

  • Linux file permission description format interpretation

  • R read permission, W write permission, x execute permission (also can be expressed in binary 111 110 100 –> 764)

  • Bit 1: File type (D directory, – plain file, L linked file)

  • Bit 2-4: Indicates the permission of the owning user, which is represented by U (user)

  • Bit 5-7: indicates the permission of the owning group. The value is g (group)

  • Bit 8-10: Other user rights, denoted by O (other)

  • Bits 2-10: indicates all permissions, represented by a (all)

Common shortcut keys and symbolic commands in Linux system

Vim editor

Vi/Vim is the most commonly used text editor on Linux and is very powerful. There are only commands but no menus. The following figure shows the modes of vi command switching.

4.1 Modifying Text

4.2 Location Commands

4.3 Replace and Cancel Commands

4.4 Deleting Commands

4.5 Common Shortcut Keys

Original: https://blog.csdn.net/xulong_08/article/details/81463054

Bring about

END

Pay attention to the wechat public number of the road of technology of migrant workers, in the background reply keyword: 1024 or 2048, you can get a latest arrangement of technical dry goods.

– MORE excellent articles – |

  • North drift for many years, today finally bought a house!!

  • How to check whether the Linux machine has been invaded?

  • Programmer suspected bug was hanged! Another programmer has an accident in Southeast Asia…

  • Siemens ten thousand layoffs plan has begun to implement!

  • Huawei Hongmeng system exposed shocking fraud!

  • [First issue] You leave a message, I send books

Long press the TWO-DIMENSIONAL code to pay attention to the technical road of migrant workers

Public number background reply “catalog” can view the public number article catalog, reply “add group” can join the reader technical exchange group, communicate with you together.

All the best of the official account is here

You click one at 👍

Is the biggest support