I386 means 32-bit. 386 is applicable to almost all x86 platforms, whether it is the old pentum or the new pentum-IV and K7 series CPU, etc.
In linux, we often encounter the i386 i686 istmi586 code, such as viewing the kernel version:
[Root @
1. Introduction to loop devices in UNIX-like systems, the loop device is a pseudo-device or a simulation device. It allows us to access a file like a block device. Before use, a loop device must be connected to a file. This combination provides you
1. network Connection mode: Select NAT2. edit the DNS configuration file/etc/resolv of the VM. conf set nameserver to the NAT gateway address in the VM [root@andes.com/etc] # catresolv. conf # Nonameserversfoun
1. network connection mode:
Select NAT
Temporarily disabling users in linux 1. find the row in the/etc/passwd file where the disabled user is located, and add #/etc/passwd # coderbolg: x: 500: 500:/home/coderbolg: At the beginning of the row: /bin/bash2. find the row where the disabled
1. uname-a view OS details 2. file/bin/ls: Display the System program information, and you can see how many digits 3. getconfLONG_BIT4. view the OS version cat/proc/version5. view the detailed OS parameter information getconf-a =-= 1. uname-a view
1. user Management 2. user Group 3. permission Assignment 1. View user-related file commands: 1. cat2.more3. head/etc/passwd # view the top 10 lines of the file 4. head-2/etc/passwd # view the first two lines of the file. tail/
1.User
Linux file management. 1. file naming rules are known to all. files must have file names. in linux, there are the following naming rules to standardize file naming: 1 ). all characters except/are valid. 2). It is recommended that you do not use some
I. startup process 1. bios finds the mbr master boot sector firmware on the disk. fireware (CMOS/BIOS) checks whether the hardware is normal at the hardware level. different hardware platforms have different firmware, A piece of software Control
1. process by memory in ascending order: ps-eo & quot; % C: % p: % z: % a & quot; | sort-k5-nr2. view which processes are currently available; view the files opened by the process: ps-A; lsof-pPID3. obtain the current IP address (learn the role of
1. check CPU usage the cpu usage reflects the current cpu usage. the reason for its high or low usage is that the process that occupies cpu processing time may be in the I/O waiting status but has not yet been released and enters wait. The average
(1) modify the system time zone 1. view the current time zone # vi/etc/sysconfig/clock2. method for modifying and setting the time zone 1: # tzselect Method 2: RedHatLinux and CentOS only) # timeconfig3. copy the corresponding time zone file,
The default file descriptor of the Centos server is 1024 (linux). The Command ulimit-n is run. For high-load and high-connection servers, 1024 is far from enough. As for the modification method, I will not repeat it here. a large number of articles
1. Reference link: ---- you can configure according to the following link. in redhatlinux, you can go back to the NIC from which the target address is located: Swap (for interchange I. Reference link:
---- You can configure the following link. in
If you want to add (or restrict) users logging on to the service through ssh or telnet, you can modify the kernel parameters to limit the number of users. the following example demonstrates vim/etc/sysctl. added kernel in conf. pty. max = 3 // The
A friend wants to log out every time he exits the shell. add the following command to the bash_logout File: date-dtoday + & quot; % Y-% m-% d % H: % M: % S & quot; & gt; /var/log/logout test: two windows are opened, one of which is to view the
Cattest.txt 12341. Merge the upper and lower rows of sed & #39; $! N; s/\ n/\ t/&%39;test.txt 12342. merge matching mode and the next sed & #39;/2/{N; s/\ n/\ t/Jun 'test.txt 12343. merge all rows of sed & #39;: a; N; s/\ n //; ba; & #3
Cat test.
Command name: chmod permission: Usage of all users: chmod [-cfvR] [-- help] [-- version] modefile... note: The file calling permissions for Linux/Unix are divided into three levels: file owner, group, and others. Chmod can be used to control how
The netstat command displays network connection, route table, and network interface information, allowing you to know which network connections are in operation. In daily work, we usually use two parameters: netstat? An, as shown below: [root @
Mktemptest. XXXXXX creates a temporary file in the current directory. X is a randomly generated string. after the command ends, the file name-ttest is returned. XXXXXX is created in the/tmp Directory. the others are the same as above. The result
Use the mv command to rename a file or directory or move the file from one directory to another. This command is equivalent to the combination of The ren and move commands in the DOS system. The permission is granted to all users. Format: mv
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.