当前位置:网站首页>Rhcsa the next day
Rhcsa the next day
2022-07-04 07:11:00 【Where are the peaches】
1. Introduce the difference between soft and hard links
Symbolic links are also called soft links , And the original file is not a file . for example Windows Shortcut to ,
Characteristics of action : Find a file in the specified path and access it quickly and easily , Delete source file shortcut cannot be accessed
Create objects : Text files and directory files can be created , And can cross file systems
Hard links , Multiple filenames point to the same Inode
Characteristics of action : Prevent users from deleting by mistake , Backup ( Backup only for file names )
Create objects : Cannot create for catalog file , And can't cross file systems
2. Create hard and soft link files as required ( stay /home Create the file as aaa, And in / Create a soft link file in the directory a.txt; /root Create a hard link file as )
3. In the current system / Create under directory 100 File ( File name e.g :abc1..abc100)

4. Introduce ll List what each column of information in a directory is

5. Create directory /test/sysroot Create three files in this directory a,b,c After then sysroot Directory move to /tmp Change the name to sys Ensure that the three files in the directory also exist


6 Delete /tmp/sys/a file .

7. Catalog /tmp Create 4 A catalog , And create one under each of these four directories test Catalog

8. Create a test Catalog , Create a file in this directory , Content writing nano

9. stay /dir Create directory under dir2 And documents file1, Moving files file1 To create test Directory , Put the table of contents dir2 Copied to the test Directory 
边栏推荐
- Crawler (III) crawling house prices in Tianjin
- How can the old version of commonly used SQL be migrated to the new version?
- 【FPGA教程案例8】基于verilog的分频器设计与实现
- Solution of running crash caused by node error
- [freertos] freertos Learning notes (7) - written freertos bidirectionnel Link LIST / source analysis
- Introduction to spark core components
- Since DMS is upgraded to a new version, my previous SQL is in the old version of DMS. In this case, how can I retrieve my previous SQL?
- Mobile adaptation: vw/vh
- win10微软拼音输入法输入文字时候下方不出现中文提示
- 【FreeRTOS】FreeRTOS学习笔记(7)— 手写FreeRTOS双向链表/源码分析
猜你喜欢

Boosting the Performance of Video Compression Artifact Reduction with Reference Frame Proposals and

《剑指Offer》第2版——力扣刷题

Research on an endogenous data security interaction protocol oriented to dual platform and dual chain architecture

Introduction to spark core components

Chain ide -- the infrastructure of the metauniverse

tornado项目之路由装饰器

Responsive - media query
![[thread pool]](/img/de/d19897bdcfd65026cfe2a23c41b8c0.jpg)
[thread pool]

A real penetration test

Introduction to rce in attack and defense world
随机推荐
【森城市】GIS数据漫谈(一)
电子协会 C语言 1级 35 、银行利息
云Redis 有什么用? 云redis怎么用?
Flink memory model, network buffer, memory tuning, troubleshooting
Chain ide -- the infrastructure of the metauniverse
2022年6月小结
提升复杂场景三维重建精度 | 基于PaddleSeg分割无人机遥感影像
由于dms升级为了新版,我之前的sql在老版本的dms中,这种情况下,如何找回我之前的sql呢?
JS common time processing functions
Research on an endogenous data security interaction protocol oriented to dual platform and dual chain architecture
[Valentine's day] - you can change your love and write down your lover's name
A new understanding of how to encrypt industrial computers: host reinforcement application
the input device is not a TTY. If you are using mintty, try prefixing the command with ‘winpty‘
The crackdown on Huawei prompted made in China to join forces to fight back, and another enterprise announced to invest 100 billion in R & D
Tar source code analysis Part 7
What is industrial computer encryption and how to do it
Pangu open source: multi support and promotion, the wave of chip industry
Introduction to rce in attack and defense world
大厂技术专家:架构设计中常用的思维模型
The final week, I split