search
HomeOperation and MaintenanceLinux Operation and MaintenanceWhat are the linux decompression commands?

Linux decompression commands: 1. tar command; 2. gunzip or gzip command; 3. bzip2 or bunzip2 command; 4. uncompress command; 5. unzip command; 6. rar command; 7. lha command; 8 , rpm2cpio command; 9. sEx command.

What are the linux decompression commands?

#The operating environment of this tutorial: Red Hat Enterprise Linux 6.1 system, Dell G3 computer.

Commonly used Linux commands:

Unzip tar command

.tar

解包:tar xvf FileName.tar
打包:tar cvf FileName.tar DirName
(注:tar是打包,不是压缩!)

.tar.xz

解包:tar xvf FileName.tar.xz
打包:tar cvf FileName.tar DirName

.tar.gz and .tgz

解压:tar zxvf FileName.tar.gz
压缩:tar zcvf FileName.tar.gz DirName

How to use various decompressed files under Linux

.xz

  解包:tar xvf FileName.tar.xz
  打包:tar cvf FileName.tar DirName

.tar

 解包:tar xvf FileName.tar
 打包:tar cvf FileName.tar DirName
(注:tar是打包,不是压缩!)

.gz

  解压1:gunzip FileName.gz
  解压2:gzip -d FileName.gz
  压缩:gzip FileName

.tar.gz and .tgz

  解压:tar zxvf FileName.tar.gz
  压缩:tar zcvf FileName.tar.gz DirName

.bz2

  解压1:bzip2 -d FileName.bz2
  解压2:bunzip2 FileName.bz2
  压缩: bzip2 -z FileName

.tar.bz2

  解压:tar jxvf FileName.tar.bz2        或tar --bzip xvf FileName.tar.bz2
  压缩:tar jcvf FileName.tar.bz2 DirName

.bz

  解压1:bzip2 -d FileName.bz
  解压2:bunzip2 FileName.bz
  压缩:未知

.tar.bz

  解压:tar jxvf FileName.tar.bz
  压缩:未知

.Z

 解压:uncompress FileName.Z
 压缩:compress FileName

.tar.Z

  解压:tar Zxvf FileName.tar.Z
  压缩:tar Zcvf FileName.tar.Z DirName

.zip

  解压:unzip FileName.zip
  压缩:zip FileName.zip DirName

Compression Use the -r parameter for a directory, -r recursively. Example: $ zip -r FileName.zip DirName

.rar

  解压:rar x FileName.rar
  压缩:rar a FileName.rar DirName

rarPlease go to: http://www.rarsoft.com/download. htm download!

After decompression, please copy rar_static to the /usr/bin directory (other directories specified by the $PATH environment variable can also be used):

[root@www2 tmp]# cp rar_static /usr/bin/rar

.lha

  解压:lha -e FileName.lha
  压缩:lha -a FileName.lha FileName
  
  lha请到:http://www.infor.kanazawa-it.ac.jp/~ishii/lhaunix/下载!
  >解压后请将lha拷贝到/usr/bin目录(其他由$PATH环境变量指定的目录也可以):
  [root@www2 tmp]# cp lha /usr/bin/

.rpm

  解包:rpm2cpio FileName.rpm | cpio -p

.deb

  解包:ar p FileName.deb data.tar.gz | tar zxf -

.tar .tgz .tar.gz .tar.Z .tar.bz .tar.bz2 .zip .cpio .rpm .deb .slp . arj .rar .ace .lha .lzh .lzx .lzs .arc .sda .sfx .lnx .zoo .cab .kar .cpt .pit .sit .sea

  解压:sEx x FileName.*
  压缩:sEx a FileName.* FileName

sEx only calls related programs and does not itself No compression or decompression functions, please note!

Please download sEx from: http://sourceforge.net/projects/sex

After decompressing, please copy sEx to the /usr/bin directory (other directories specified by the $PATH environment variable Also available):

[root@www2 tmp]# cp sEx /usr/bin/

Related recommendations: "Linux Video Tutorial"

The above is the detailed content of What are the linux decompression commands?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to restore Linux system from backupHow to restore Linux system from backupJul 23, 2025 am 12:25 AM

To successfully restore Linux system from backup, you must first clarify the backup type and follow the steps. 1. Confirm the backup type, such as complete system image, file-level backup or package list plus configuration files, and select the corresponding recovery method according to the type, such as decompressing data with rsync or tar. 2. Enter the recovery environment through LiveUSB, mount the root partition and backup location, and use the command to copy data. 3. When restoring user data and configuration, check permissions, ownership and hidden files, and reinstall GRUB if necessary. 4. Pay attention to details such as excluding special directories, version compatibility, and non-obvious configuration storage locations. Testing and preparation in advance is the key to ensuring a smooth recovery.

How to use the `lsmod` commandHow to use the `lsmod` commandJul 23, 2025 am 12:13 AM

lsmod is a command in Linux to view loaded kernel modules, and display module information in a more readable way by reading /proc/modules file. Its output contains three columns: Module (module name), Size (size, bytes), and Usedby (number of references). Combined with grep, specific modules can be filtered, such as lsmod|grepusb is used to find USB-related modules. Dependencies can be identified by Usedby columns, for example, snd\_usbmidi\_lib is dependent on snd\_usb\_audio. To view dependencies in depth, modinfomodule\_name is available. Common operations include using sudomod

How to unmount a filesystemHow to unmount a filesystemJul 23, 2025 am 12:06 AM

To uninstall the file system, you must first confirm the mount point path and use the umount command to operate. If you encounter "deviceisbusy", you must handle the occupied process. 1. Use df-h or mount|grep/dev to confirm the mount point; 2. Execute sudoumount [mount point] uninstall; 3. If the device is prompted to be busy, close the relevant programs or use lsof to check the process and kill; 4. Use sudoumount-l to delay uninstall; 5. When uninstalling NFS, you can add the -f parameter to force uninstall. Be careful to ensure that there is no program dependency before operating to avoid exceptions.

How to manage system logs remote syslogHow to manage system logs remote syslogJul 23, 2025 am 12:06 AM

The configuration steps for remote management of logs include: 1. Configure the local client to send logs, modify the rsyslog configuration file and transmit using the TCP protocol; 2. Set up the remote server to receive logs, enable network modules, and set up log classification storage; 3. Strengthen security, restrict access through firewalls, TLS encryption and log filtering; 4. Troubleshoot common problems and check port monitoring, connectivity, service status and security policies. Following the above steps can ensure the stable operation of the log system.

How to check active network connectionsHow to check active network connectionsJul 22, 2025 am 12:35 AM

If you want to know the network connection on your current computer, you can view it through the command line tool; use netstat-ano on Windows to view all connections and PIDs, use ss-tulnp and lsof-i-P to obtain detailed information, and can also be monitored in real time through graphical interface tools such as resource monitor, nethogs, etc.

How to troubleshoot locale settingsHow to troubleshoot locale settingsJul 22, 2025 am 12:34 AM

The locale setting problem affects the operation and display of the program. The solution is as follows: 1. Check the currently supported locale list using locale-a; 2. Generate missing locale, use sudodpkg-reconfigurelocales for Debian/Ubuntu, and use sudolocaledef command for RedHat/CentOS/Fedora; 3. Modify the /etc/default/locale file to set the default locale and reload; 4. SSH login warnings need to generate the corresponding locale on the server or adjust the local SSH configuration; 5. It is recommended to unify LANG and LC_CTYPE for abnormal characters in the graphical interface.

How to monitor disk quota usageHow to monitor disk quota usageJul 22, 2025 am 12:33 AM

To monitor the usage of disk quota, you can use the quota command to view the quota quota, use repquota to view the overall usage, and use scripts to achieve automated monitoring. Specific steps: 1. Use quota-uusername to view the disk usage details of a specific user; 2. Use repquota/path/to/mountpoint to batch view all user quota usage; 3. Write shell scripts to combine repquota and email notification functions to achieve automatic monitoring, and set cron timed tasks to execute daily, so as to timely grasp and warn about the problem of overdue disk quota.

How to configure unattended upgrades aptHow to configure unattended upgrades aptJul 22, 2025 am 12:20 AM

Unattended upgrades are suitable for managing multiple servers, wishing to reduce manual updates, or failing to maintain the system at any time. First install the unattended-upgrades package: sudoaptinstallunattended-upgrades, and then enable the default configuration: sudodpkg-reconfigure-plowunattended-upgrades. Select "Yes" in the interactive interface to enable it. Custom behavior can be achieved by modifying the configuration file /etc/apt/apt.conf.d/50unattended-upgrades, such as adding update sources and setting automatic restart (Unattended-Up

See all articles

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.