RH033读书笔记(17) - Summary
End of Unit 1
• Questions and Answers
• Summary
• Open source and the right to modify
• The GNU Project and the Free Software Foundation
• Linus Torvalds and the Linux kernel
• Red Hat Enterprise Linux and the Fedora Project
• Basic Linux Principles
End of Unit 2
• Questions and Answers
• Summary
• Login name and password
• startx
• gnome-terminal
• passwd
• su
• nano
End of Unit 3
• Questions and Answers
• Summary
• Running Commands
• Getting Help
End of Unit 4
• Questions and Answers
• Summary
• The Linux filesystem hierarchy
• Command-line file management tools
• The Nautilus file manager
End of Unit 5
• Questions and Answers
• Summary
• All files are owned by one user and one group
• The mode of a file is made up of three permissions: those of the user, the
group and all others
• Three permissions may be granted or denied: read, write and execute
End of Unit 6
• Questions and Answers
• Summary
• Command expansion: $()
• History recall: !string, !num
• Inhibition: '', \
End of Unit 7
• Questions and Answers
• Summary
• Standard I/O channels
• File redirection
• Standard input (<)
• Standard Output (>)
• Standard Error (2>)
• Pipes redirect standard output to standard input
• for loops can perform commands on items from a program's standard output
or an explicit list
© 2007 Red Hat, Inc.
All rights reserved
RH033-RHEL5-en-2-20070602
Unit 8 Page 151
End of Unit 8
• Questions and Answers
• Summary
• Extracting Text
• cat, less, head, tail, grep, cut
• Analyzing Text
• wc, sort, uniq, diff, patch
• Manipulating Text
• tr, sed
• Special Search Characters
• ^, $, [abc], [^abc], [[:alpha:]], [^[:alpha:]], etc
End of Unit 9
• Questions and Answers
• Summary
• Use the three primary modes of vi and vim
• Move the cursor and enter Insert mode
• Change, delete, yank, and put text
• Undo changes
• Search a document
• Save and exit
End of Unit 10
• Questions and Answers
• Summary
• system-config-network
• /etc/sysconfig/network-scripts/*
• ifup, ifdown
• lpr sends text to the printer
• date configures date/time from CLI
• system-config-date configures date/time from GUI
• read VAR sets variable from STDIN
• $1, $2, etc map to command-line arguments
• $# represents the number of arguments to a script
End of Unit 11
• Questions and Answers
• Summary
• A process is any set of instructions in memory
• Processes are managed with: ps, kill, top, gnome-system-monitor
• Suspend jobs with Ctrl-z, manage with fg, bg
End of Unit 12
• Questions and Answers
• Summary
• local and environment variables
• command line parsing
• configuring the shell environment
• positional parameters and the read command
End of Unit 13
• Questions and Answers
• Summary
• Use locate to quickly find files that are not new
• Use find to search based on very specific criteria and optionally run
commands on matching files
• Use the Gnome Search Tool for an intuitive, but powerful GUI search tool.
End of Unit 14
• Questions and Answers
• Summary
• Firefox, Evolution and Mutt
• Basic network diagnostic tools
• The importance of secure network clients
End of Unit 15
• Questions and Answers
• Summary
• User information is stored in /etc/passwd
• Group information is stored in /etc/group
• Special Permissions: Sticky Bit, SetUID, SetGID
End of Unit 16
• Questions and Answers
• Summary
• Linux filesystem structure
• Using removable media
• Using unformatted floppies
• Archiving and compression
End of Unit 17
• Questions and Answers
• Summary
• System Installation Process
• Managing Services
• Software Installation Tools
• System Security
RH033读书笔记(17) - Summary的更多相关文章
- 进入保护模式(三)——《x86汇编语言:从实模式到保护模式》读书笔记17
(十)保护模式下的栈 ;以下用简单的示例来帮助阐述32位保护模式下的堆栈操作 mov cx,00000000000_11_000B ;加载堆栈段选择子 mov ss,cx mov esp,0x7c00 ...
- RH033读书笔记(16)-Lab 17 Installation and Administration Tools
Lab 17 Installation and Administration Tools Goal: Become familiar with system configuration tools a ...
- RH033读书笔记(15)-Lab 16 The Linux Filesystem
Lab 16 The Linux Filesystem Goal: Develop a better understanding of Linux filesystem essentials incl ...
- RH033读书笔记(7)-Lab 8 Introduction to String Processing
Lab 8 Introduction to String Processing Sequence 1: Exercises in string processing 1. Other than the ...
- 『TCP/IP详解——卷一:协议』读书笔记——17
2013-08-27 15:37:42 6.5 ICMP端口不可达差错 端口不可达报文是ICMP差错报文的一种,它是ICMP不可达报文中的一种,以此来看一看ICMP差错报文中所附加的信息.使用UDP来 ...
- OCA读书笔记(17) - 移动数据
Sql*load 1. sql*loader的文件有哪些? 日志文件:概述了作业的成功与失败以及所有相关错误的细节 错误文件(bad file):从输入文件中抽取的行可能会被sqlldr丢弃(原因可能 ...
- OCP读书笔记(17) - 计划任务
轻量级作业: 也称为持久性轻量级作业,如果当我们的数据库每秒钟需要创建.删除或修改数十个或数百个作业时,使用轻量级作业是降低开销的最佳方法 常规作业:是由oracle 11g Scheduler 所支 ...
- RH033读书笔记(2)-Lab 3 Getting Help with Commands
Lab 3 Getting Help with Commands Sequence 1: Using the Help Tools 1. man -f keyword whatis keyword l ...
- RH033读书笔记(5)-Lab 6 Exploring the Bash Shell
Lab 6 Exploring the Bash Shell Sequence 1: Directory and file organization 1. Log in as user student ...
随机推荐
- 获取wpf datagrid当前被编辑单元格的内容
原文 获取wpf datagrid当前被编辑单元格的内容 确认修改单元个的值, 使用到datagrid的两个事件 开始编辑事件 BeginningEdit="dataGrid_Beginni ...
- on、where、having的区别(转载)
on.where.having的区别 on.where.having这三个都可以加条件的子句中,on是最先执行,where次之,having最后.有时候如果这先后顺序不影响中间结果的话,那最终结果是相 ...
- 再淡spring jdbc 连接池断开重连设置
先看一段错误日志: ### Error querying database. Cause: com.mysql.jdbc.exceptions.jdbc4.MySQLNonTransientConne ...
- android5.0(Lollipop) BLE Central牛刀小试
转载请表明作者:http://blog.csdn.net/lansefeiyang08/article/details/46482073 昨天写了android L BLE Peripheral的简单 ...
- 开源数据库连接池之DBCP
本篇介绍几种开源数据库连接池,同时重点讲述如何使用Apache公司的的DBCP数据库连接池. 前面一篇博客已经重点讲述了使用数据库连接池的好处,即是将多次创建连接转变为一次创建而使用长连接模式.这样能 ...
- 设计模式六大原则(2):里氏替换原则(Liskov Substitution Principle)
肯定有不少人跟我刚看到这项原则的时候一样,对这个原则的名字充满疑惑.事实上原因就是这项原则最早是在1988年,由麻省理工学院的一位姓里的女士(Barbara Liskov)提出来的. 定义1:假设对每 ...
- C陷阱与缺陷代码分析之第1章词法陷阱
作者:刘昊昱 博客:http://blog.csdn.net/liuhaoyutz 编译器中负责将程序分解为一个一个符号的部分,称为“词法分析器”.下面看一个例子: if(x > big) bi ...
- 【ASP.NET Web API教程】3.2 通过.NET客户端调用Web API(C#)
原文:[ASP.NET Web API教程]3.2 通过.NET客户端调用Web API(C#) 注:本文是[ASP.NET Web API系列教程]的一部分,如果您是第一次看本博客文章,请先看前面的 ...
- Oracle表连接总结
1 简述 1) 两个表的连接,是通过将一个表中的一列或者多列同另一个表中的列链接而建立起来的.用来连接两张表的表达式组成了连接条件.当连接成功后,第二张表中的数据就同第一张表连接起来了,并形成了复合结 ...
- Linux IP代理筛选系统(shell+proxy)
代理的用途 其实,除了抓取国外网页需要用到IP代理外,还有很多场景会用到代理: 通过代理访问一些国外网站,绕过被某国防火墙过滤掉的网站 使用教育网的代理服务器,可以访问到大学或科研院所的内部网站资源 ...