In the Linux system, the etc/profile file can't be changed. To change the etc/profile file, you need to use some special techniques to modify the Linux file. This article will introduce Linux system to modify /etc /profile file method:
etc /profile file is read-only, the direct use vi or gedit open the modifications are not saved. To modify the profile, you need to get root privileges (edit with gedit)
$sudo gedit /etc/profile
or
$sudo -s
$gedit /etc/profile
This opens the profile file and can be saved after modification.
How to make the modified profile file take effect immediately:
Method 1:
$. /etc/profile
. There is a space between /etc/profile
Method 2:
$source /etc/profile
The source command is also called “point command”, also Is a dot symbol (.). The source command is usually used to re-execute the newly modified initialization file so that it can take effect immediately without having to log out and log back in.
The above is the way to modify the /etc/profile file in the Linux system. As long as you get the administrator rights, even if the etc/profile file is a system file, you can modify it.
In Linux system operation, many people dont know much about dmg file, but dont know how to create dm
Management of Linux system squadron user accounts refers to adding, modifying, and
The tar command in Linux system packs files, and several different files are collected in the same f
Linux system, lsof command can be used to find the name and number of files opened by the applicatio
Linux system settings automatically adjust the screen brightness method
Ubuntu10.10 configuration R environment method
Gentoo xorg-server prompts how to handle the failed to load module
How to import files from a Docker container to the host
Summary of tar commands in Linux system
Linux system how to re-mount var partition
How to clean up Git and Repo invalid code in Linux system
Techniques for setting up multiple network cards as virtual network cards under Linux
How to extract multiple compressed files at the same time in Linux
Linux system expect command operation example
How to Troubleshoot Malicious Outbox Behavior on Linux Servers
The computer commonly used small knowledge Alt key uses twelve strokes
Windows 7 Application Tutorial: Open the taskbar settings window
Small operator anti-sealing mechanism Thunder Mac version 2.6.2 update released
Strictly guard against Windows Server 2008 security threats
Windows 7 Local Connection Restricted or No Connection Solution
Win8 above the equipment for content recording
Win7 System Advanced User Guide eBook Download
Win7 combat: using the built-in PSR record desktop operation
Microsoft: The familiarity of Win10 is very important, to create a user favorite Windows