We provide HTML and PDF versions of our books in different languages. The fol- .. portconfig command line tool or the YaST Support module. Line 36 • Command Line Parameters of the YaST Modules 6 Managing Software with . Special Features in SUSE Linux Enterprise Server CUPS and Firewall .. The final PDF is formatted through FOP from Apache. Administration Guide. SUSE Linux Enterprise Desktop 12 SP4 Line 36 • Command Line Parameters of the YaST Modules 6 Managing Software with .. The final PDF is formatted through FOP from Apache Software.
|Language:||English, Spanish, Arabic|
|Distribution:||Free* [*Register to download]|
This section gives insight into the most important commands. There are many more commands than listed in this chapter. Along with the individual commands, . Modules 36 • Command Line Parameters of YaST Modules 6 Managing Software .. The final PDF is formatted through FOP from Apache. We provide HTML and PDF versions of our books in different languages. The .. supportconfig command line tool or the YaST Support module. Both will collect.
Reading installed packages Trying capabilities.
Resolving package dependencies Installing : otrs-x. Check for more information the EPEL web site. Installed: epel-release.
The first time you use yum after you added this repository, you will be prompted to add its key. This is slightly more complicated than installing any of the other packages; this is because Oracle is a proprietary database and Red Hat nor the CentOS project are allowed to distribute drivers in their RPM repositories.
First of all, we'd need to install gcc, make and CPAN so we can compile and install the driver. Below you see the command on CentOS; on other versions it might look a little different.
For this you would need to sign up for a free account at the Oracle website. You can check this with the uname -i.
Save them to a location on your disk. Again, perform these tasks as the root user. The steps are outlined below. Please note that for briefness some lines outputted by the commands have been removed.
Specifications or parameters that are not required are placed in [square brackets]. Adjust the settings to your needs. It makes no sense to write ls file if no file named file actually exists.
You can usually combine several parameters, for example, by writing ls -la instead of ls -l -a.
The following section lists the most important commands for file management. It covers everything from general file administration to the manipulation of file system ACLs.
If you run ls without any additional parameters, the program lists the contents of the current directory in short form. Copies source to target. Waits for confirmation, if necessary, before an existing target is overwritten. Copies source to target then deletes the original source.
Creates a backup copy of the source before moving. Waits for confirmation, if necessary, before an existing targetfile is overwritten. Removes the specified files from the file system.
Directories are not removed by rm unless the option -r is used. Creates an internal link from source to target. Normally, such a link points directly to source on the same file system.
However, if ln is executed with the -s option, it creates a symbolic link that only points to the directory in which source is located, enabling linking across file systems. Changes the current directory. Transfers ownership of a file to the user with the specified username. Transfers the group ownership of a given file to the group with the specified group name. The file owner can change group ownership only if a member of both the current and the new group.
The mode parameter has three parts: The access type is controlled by the following options:. Setuid bit—the application or program is started as if it were started by the owner of the file.
As an alternative, a numeric code can be used. The four digits of this code are composed of the sum of the values 4, 2, and 1—the decimal result of a binary mask. The second digit defines the permissions of the owner of the file.
The third digit defines the permissions of the group members and the last digit sets the permissions for all other users. The read permission is set with 4, the write permission with 2, and the permission for executing a file is set with 1.
The owner of a file would usually receive a 6 or a 7 for executable files. This program compresses the contents of files using complex mathematical algorithms.
Files compressed in this way are given the extension. To compress several files or even entire directories, use the tar command. Decompresses the packed gzip files so they return to their original size and can be processed normally like the command gunzip. Compression is optional. The most frequently used options are:. Writes the output to a file and not to the screen as is usually the case.
Adds files, but only if they are newer than the files already contained in the archive. Unpacks files from an archive extraction. Compresses the resulting archive with bzip2. The archive files created by tar end with. If the tar archive was also compressed using gzip , the ending is. If it was compressed using bzip2 , the ending is. This command is only available if you have installed the findutils-locate package. The locate command can find in which directory a specified file is located.
If desired, use wild cards to specify filenames. The program is very fast, because it uses a database specifically created for the purpose rather than searching through the entire file system. This very fact, however, also results in a major drawback: The database can be generated by root with updatedb.
This command performs an update of the database used by locate. To include files in all existing directories, run the program as root.
This command usually runs as a daily cron job see cron. With find , search for a file in a given directory. The first argument specifies the directory in which to start the search. The option -name must be followed by a search string, which may also include wild cards.
Unlike locate , which uses a database, find scans the actual directory. With file , detect the contents of the specified files.
The cat command displays the contents of a file, printing the entire contents to the screen without interruption. This command can be used to browse the contents of the specified file. Jump to the beginning or end of a file using Home and End.
Press Q to exit the program. The grep command finds a specific search string in the specified files. If the search string is found, the command displays the line in which searchstring was found along with the filename. Only displays the names of the relevant files, but not the text lines. Additionally displays the numbers of the lines in which it found a hit.
Only lists the files in which searchstring does not occur. The diff command compares the contents of any two files.