In the linux project, there are many kinds of linux learning methods, here is the learning experience of Xiaobian, for everyone to share it,
Linux! Linux is just a kernel! This is very important, you must understand this. Only one kernel cannot constitute an operating system. Now Linux operating systems such as redhat, blue dot, red flag, etc., are all using such a kernel, plus other programs (including X). Anything called an operating system is made up of this: kernel + user interface + general application.
Now I will take the MS system and the Linux system to each other to let everyone know Linux. If you have installed DOS, then you must know that the entire hard disk is like this after the installation is complete. .sys msdos.sys command.com config.sys autoexec.bat A total of 5 files, as well as the C:\\dos directory, very simple. Where io.sys and msdos.sys are the kernel of the system, command.com is the user interface (shell), config.sys and autoexec.bat are the configuration files, and the C:\\DOS directory is the first to be installed when the general application system starts. Enter io.sys, load msdos.sys and command.com according to the configuration file settings, and then the prompt appears, now you can enter the command. Copy the file by copy c:\\aaa.txt d:\\aaa.txt. You can also use some applications in the C:\\dos directory to do the work, such as editing the file with edit and writing the basic program with Qbasic.
Next, you installed a program called Foxpro2.6, this program allows you to do some database work, and then you install a program called Windows3.2 Chinese version, this program can be amazing Now, you don't have to use the command line to open the command. You can use the mouse to open the file manager, open C and open another window D. You can use the mouse to complete the copy c:\\aaa.txt d: \\aaa.txt This command, you just moved the index finger a few times and now it is not the same under windows98.
OK, goto linux installed linux after the root directory has boot, bin, sbin, etc, usr /bin, and other directories, under the boot vmlinuz this file, this is the kernel, is currently in the world The most powerful hacker Linus took the lead to write that stuff.
There is sh under the bin, this is the shell (==command.com, user interface) because the UNIX system has no internal command, accurately speaking /bin+/sbin == Command.com and /etc == config.sys + msdos.sys left /usr/bin == c:\\dos
Of course. Because Linux is much larger than Dos, reahat and red flag have different arrangements, and the things in various directories are irregular. Linux boot is also loaded vmlinuxz, then load sh (or other shell, such as bash), come out the prompt. Now you can also enter the command. Such as cp /aaa.txt /tmp/aaa.txt. You can also edit the file with vi, compile the program with gcc
Then you install a program called MySQL, this program allows you to do some database work, and then you install a program called kde4.0 The program, this program can be amazing, you don't have to use the command line now, you can use the mouse to operate, open the file manager, open /open another window /tmp, use the mouse to pull cp /aaa.txt /tmp/aaa.txt This command, you just moved the index finger a few times and now it is no different under windows98
See here I hope you understand why I said that you are going back, because the current Linux operating system == MS Win3.2 but the MS system has gone through 9X, now it is XP, and it is two generations behind. Of course, this is from the user interface, but it is precisely because many people install Linux and then do the West on X's kde, but nothing else can be done, why can't you get it because you haven't done it before? DOS, you don't even know that the system can do this. The first thing you touched was 98. The computer gave you the feeling of using the mouse to operate things. You think that the same is the operating system. Linux should also be such a thing. You never thought that you always thought that you were playing Linux, but in fact you are only playing a program running on a Linux system. So many people have finished loading it for a few days and said that relying on Linux is just that. This can be said to be right or not, Linux, you have not seen what it is, what qualifications do you have to say? But kde, it really is just that, you used 98, now you go to use 3.2 to see, how do you feel? In terms of stability, I don't take 98 ratio, take 95. If the same job, 95 crashes once a day, then X will collapse 10 times. If it is 2000, 2000 will crash once a day, X will collapse 100 times. Times.
is similar to 3.2. But why do you still hear that some Hollywood movie stunts are done on Linux? In order to attend an important banquet, you can buy a set of brand-name suits, or you can order a set. The order is more suitable and more beautiful, but the price is also more expensive, the workload is also larger. Designer suits == Windows system customized Suit ==Linux system + modify the system kernel + modify the X code + modify the kde code + specially written stunt software. The suit you are currently installing is street goods, which is the reahat garment factory in order to adapt to the mass production of all people in the world. Dongdong. Understand? If you understand, then you understand that Linux learning methods are better than Window, and I don't have to talk nonsense, so why does Linux often get rid of hackers? I remember reading a book like this, "Linux is written by a hacker called linus and a lot of hackers on the Internet." So, how can a system written by a hacker have nothing to do with hackers? Of course, the definition of "hacker" and the definition of "hacker" in many Chinese people's minds is absolutely different. The former is almost never invaded other systems, and the latter is invaded.
If you are an art worker, you are almost using a computer in addition to sleeping. You always have a photoShop to do it there. In the art industry, you can count as an industry. Master. But you don't care what you do, how the computer is doing it for you. A computer is just a tool you create. Just like music is what many people like to listen to, but you don't care about the music you hear. She sent it out from the mouth of the original star to be appreciated by you. What is going on? But for a HIFI enthusiast, she only cares about this. Now back to the copy command I just said, for a hacker, she doesn't care about the contents of the aaa.txt file. She cares about the process from C:\\aaa.txt to d:\\aaa.txt. What did the computer do? Now I ask the person who is reading this post: copying a file from one place to another, you must have done this right? But when you do this, have you ever thought about how it is done inside the computer to complete your operation? If your answer is: Oops, I really never thought about yeah~~ Then, you have no talent for hacking, you still have a promising moment to mix.
Finding the bottom is the nature of hackers. At this point, Linux can be satisfied, but windows can't, you press copy C:\\aaa.txt d:\\aaa.txt on dos. The task of copying is complete, but what do you know about the computer? You can only judge how the system is completed based on the accumulation of your experience. You can't determine whether your judgment is correct before you have read the source code of copy. But the source code of cp on UNIX is basically available at your fingertips.
TCP/ip, linxu can let you hit the kernel in one shot, but you can only get to winsockapache and the specific communication of the system, you can clearly understand, but the communication between IIS and the system is It's impossible to know that the relationship between Linux and hackers is here, and there is nothing to do with the invasion. Many remote vulnerabilities are compiled on Unix systems, but the original meaning of those programs is to give you an example of what you can see. If you understand it, you can compile it on Win.
UNIX has many advantages over Windows, and there are too many places worthy of getting it, but I can't say it. Just like when you love someone, you can't say what you love. What is he, she has something worthy of your love, but Windows is not junk, absolutely not, as a tool to use, she is hundreds of times better than UNIX. It seems that you should now understand why many remote vulnerabilities are Unix. The habit of writing, because it can find this vulnerability, shows that he is quite familiar with the system, and UNIX makes him quite familiar with the system, he unconsciously uses the UNIX set, but its code A big possibility is to use UltraEdit to knock on the windows system.
It seems like a problem, I said to give a suggestion to a friend who wants to learn Linux (UNIX), but said this, but I think there is no problem, I hope you see here I can know that I want to give What is your suggestion?
1. Based on your current level, determine how much Linux means to you.
2. Make sure you are playing Linux instead of X
3. Unload the X system and install the rest of the space.
4. Don't use rpm -i way to install the program, use your own method of compilation
5. Find a suitable telnet software, I recommend SecureCRT.
6. If you only have one computer, install Vmware. This way to contact UNIX
7. Look at the post again, and once again realize the hidden suggestions in my post
8. In the process of learning Linux, the experience of being played by Linux Write it down
9. In the process of playing linux, how to write down the interesting things about linux you play
The above is the new and notes of my linux learning method. I believe that you have learned a lot after reading.
When using a computer, it often interacts with some encrypted documents, such as Zip, Rar, and even
LDM/STM instructions are mainly used for field protection, data copying, parameter transfer, etc. ST
Starting today, I officially entered the development of tiny4412. Today I mainly watched the startu
In the era of Internet, the high availability of the network has always been a very critical part, n
IIS server does not support ASP.NET solution
Linux file name garbled conversion basic tutorial
Linux: Please don't stop us from slamming us.
Introducing the Linux hard disk system to establish partition steps
How to use the netstat command to view DDOS attacks in Linux?
Linux system UMASK usage details
Modify ubuntu default editor to vim
Linux system command make, clean usage explain
Linux hwclock display and setting hardware clock command details
Windows xp system can not install .net solution
Win8 cancel the power-on password method
Cleverly solve the tracking problem of IP address under WinXP
The usage ratio of major browsers in Win7 system is
Quickly retrieve the Windows XP system language bar
How to add restart in the Windows8 metro interface, shutdown option