Słownik poleceń i lista komend naD
- Jak użyć
dlpsh
Co to jest the specified port to execute DLP commands. Within the shell, adding the --help flag to any command displays additional help about that command definicja - Jak użyć
dump
Co to jest ext2 and ext3 file devices directly, quickly backing up files without affecting file access times. files may be specified as a mount point or as a list of files and directories to definicja - Jak użyć
deallocvt
Co to jest Multiple consoles may be named with additional spaces and integers: deallocvt 1 4 will deallocate the /dev/tty1 and /dev/tty4 consoles. Consoles are considered unused if they are definicja - Jak użyć
debugfs
Co to jest structure of an ext2 or ext3 filesystem in order to debug problems with the device. device is the special file corresponding to the device containing the filesystem (e.g definicja - Jak użyć
dir
Co to jest list files in columns, sorted vertically, special characters escaped), and it takes the same arguments as ls . This is an alternate invocation of the ls command and is provided definicja - Jak użyć
date
Co to jest format can consist of literal text strings (blanks must be quoted) as well as field descriptors, whose values will appear as described in the following entries (the listing shows definicja - Jak użyć
dd
Co to jest and send the results to the output file (or standard output if of is not specified). Any number of options can be supplied, although if and of are the most common and are usually definicja - Jak użyć
depmod
Co to jest modules given on the command line. This dependency file can be used by modprobe to automatically load the relevant modules . The normal use of depmod is to include the line definicja - Jak użyć
devdump
Co to jest isoimage . devdump displays the first 256 bytes of the first 2048-byte sector and waits for commands. The prompt shows the extent number (zone) and offset within the extent, and definicja - Jak użyć
df
Co to jest filesystems or on the given name . (df cannot report on unmounted filesystems.) Disk space is shown in 1 KB blocks (default) or 512-byte blocks (if the environment variable definicja - Jak użyć
diff
Co to jest and file2 . Output consists of lines of context from each file, with file1 text flagged by a < symbol and file2 text by a > symbol. Context lines are preceded by the ed command (a definicja - Jak użyć
diff3
Co to jest the files may be given as - (indicating that it is to be read from standard input). The output is displayed with the following codes: = = = = All three files differ. = = = =1 definicja - Jak użyć
dig
Co to jest than the deprecated nslookup command. When invoked with just the -h option, it displays a list of options for the command. If you use it without any options or arguments, it will definicja - Jak użyć
dircolors
Co to jest variable. If you specify a file, dircolors will read it to determine which colors to use. Otherwise, it will use a default set of colors definicja - Jak użyć
dirname
Co to jest actual filename from a pathname. If there are no slashes (no directory levels) in pathname , dirname prints . to indicate the current directory. See also basename definicja - Jak użyć
disable
Co to jest Disables access to a printer. Equivalent to reject definicja - Jak użyć
dmesg
Co to jest from the kernel ring buffer. This buffer stores all messages since the last system boot, or the most recent ones if the buffer has been filled definicja - Jak użyć
dnsdomainname
Co to jest TCP/IP command. Print the system's DNS domain name. See also hostname definicja - Jak użyć
du
Co to jest Print disk usage (as the number of 1 KB blocks used by each named directory and its subdirectories; default is the current directory definicja - Jak użyć
dnssec-keygen
Co to jest or Transaction Signatures (TSIG) keys for domain-name . When the key is completed, dnssec-keygen prints the key identifier to standard output and creates public and private definicja - Jak użyć
dnssec-makekeyset
Co to jest more DNS Security keys generated by dnssec-keygen . Keysets can be sent to parent zone administrators to be signed with the zone key. The keyset is written to a file with the name definicja - Jak użyć
dnssec-signkey
Co to jest signatures specified in the list of key-identifiers . A zone administrator would use this command to sign a child zone's keyset with the parent zone's keys. For more definicja - Jak użyć
dnssec-signzone
Co to jest signatures in the specified list of key-identifiers . If signed keysets associated with the zone are found in the current directory, include their signatures in the signed zone definicja - Jak użyć
doexec
Co to jest arguments. Differs from the normal exec command in that argv [0] may be completely arbitrary, and in that it passes all options to the executable being run definicja - Jak użyć
domainname
Co to jest argument, domainname displays the name of the current NIS domain. Only a privileged user can set the domain name by giving an argument; this is usually done in a startup script definicja - Jak użyć
dosfsck
Co to jest intended for MS-DOS filesystems. When checking an MS-DOS filesystem, fsck calls this command. Normally dosfsck stores all changes in memory, then writes them when checks are definicja - Jak użyć
dumpe2fs
Co to jest System administration command. Print information about device 's superblock and blocks group definicja - Jak użyć
dumpkeys
Co to jest Print information about the keyboard driver's translation tables to standard output. Further information is available in the manual pages under keymaps (5 definicja
Wszystkie polecenia konsoli
Wywołanie komendy z linii poleceń. Konsola polecenie.
Linux, Unix, system operacyjny, zastosowanie. Słownik komend, wszystkie polecenia Linux.
Jak użyć komendy?