1. What are the commands for switching users and temporarily obtaining the maximum permission of the root user? Su Sudo 2. To use the sudo command, we need to configure the temporary root maximum permission without password, which file to modify, add a line of what statement? /etc/sudoers Add a sentence Xxx ALL=(root) NOPASSWD:ALL 3.su - user1, what does this short bar stand for? Effective variable 4. What is the identity of the hidden file? Which command parameters can be viewed? Hidden files are files that begin with ".". The parameter for viewing hidden files is -a, the command is ls -l -a or ll -a 5. Talk about which are R parameter commands and which are r parameter commands. The R command is a chomn, chomd permission class, and the others are r It can be simply understood that the R parameter is related to the permission class, and the other is the r parameter. 6. How do you help with the command? Usermod –help 7. Talk about the process of editing a file by vi i enter edit mode Esc launch editor Wq save exit 8. Process Port Number What is the command? Netstat -nlp 9.cp mv what is the difference The difference is similar to copy and paste Cp copy has multiple files Mv mobile file number has not changed 10. What is the command to kill the matching xxx process? What do we have to do before killing? First check the command is ps -ef|grep xxx The command to kill is kill -9 xxx
[Ruo Ze data zero basic class September 12 morning class] Summary
- RISC-V biweekly briefing 0x11: CPU running Linux once (2018-02-15)
- Don't guess the bottom of the picture, want to eat the market from the beginning to the end is a kind of obsession
- Queue and thread in TensorFlow
- Why is the copying of the bottom always in the middle of the mountain, often died before the dawn of the rise?
- What do you need to learn big data development? - "Get big data every five minutes"
- The last minute of high school & the first lesson of the university & the responsibility of the teacher
- How Unity efficiently parses data
- 35-year-old programmer will go from here - Ruan Yifeng
- Transformation Architect Road - Zhengtian Min
- Using neural network to predict the punctuality of flight departures
- DNS information collection command nslookup
- JAVA parameter transfer method (by value transfer and reference transfer difference)
- 2018 interview laughter
- Jdk1.8 hashmap.treeifyBin source
- Programmer sister: In addition to the short height, everything else is fine! Netizen: With the strength of single
- Getting Started with Distributed File Server FastDFS
- Exception: Repeated logging problems through Spring aop logging.
- Java8 In Action-2. Functional Data Processing (4)
- Xiaomi OJ #8 [Minimum exchange times]
- Leetcode 1: twosum