What does Centosi386 mean?

I386 means 32-bit. 386 is applicable to almost all x86 platforms, whether it is the old pentum or the new pentum-IV and K7 series CPU, etc. In linux, we often encounter the i386 i686 istmi586 code, such as viewing the kernel version: [Root @

Introduction to Centosloop devices

1. Introduction to loop devices in UNIX-like systems, the loop device is a pseudo-device or a simulation device. It allows us to access a file like a block device. Before use, a loop device must be connected to a file. This combination provides you

Vmware configures a CentOS virtual machine to access the Internet

1. network Connection mode: Select NAT2. edit the DNS configuration file/etc/resolv of the VM. conf set nameserver to the NAT gateway address in the VM [root@andes.com/etc] # catresolv. conf # Nonameserversfoun 1. network connection mode: Select NAT

Temporarily disabling users in Centos

Temporarily disabling users in linux 1. find the row in the/etc/passwd file where the disabled user is located, and add #/etc/passwd # coderbolg: x: 500: 500:/home/coderbolg: At the beginning of the row: /bin/bash2. find the row where the disabled

Centos 32 or 64-bit command

1. uname-a view OS details 2. file/bin/ls: Display the System program information, and you can see how many digits 3. getconfLONG_BIT4. view the OS version cat/proc/version5. view the detailed OS parameter information getconf-a =-= 1. uname-a view

CentOS users and permissions

1. user Management 2. user Group 3. permission Assignment 1. View user-related file commands: 1. cat2.more3. head/etc/passwd # view the top 10 lines of the file 4. head-2/etc/passwd # view the first two lines of the file. tail/ 1.User

CentOS file and permission management

Linux file management. 1. file naming rules are known to all. files must have file names. in linux, there are the following naming rules to standardize file naming: 1 ). all characters except/are valid. 2). It is recommended that you do not use some

Centos startup process and running level

I. startup process 1. bios finds the mbr master boot sector firmware on the disk. fireware (CMOS/BIOS) checks whether the hardware is normal at the hardware level. different hardware platforms have different firmware, A piece of software Control

Linux classic skills

1. process by memory in ascending order: ps-eo & quot; % C: % p: % z: % a & quot; | sort-k5-nr2. view which processes are currently available; view the files opened by the process: ps-A; lsof-pPID3. obtain the current IP address (learn the role of

View Centos system performance indicators

1. check CPU usage the cpu usage reflects the current cpu usage. the reason for its high or low usage is that the process that occupies cpu processing time may be in the I/O waiting status but has not yet been released and enters wait. The average

Modify Centos system time zone and time

(1) modify the system time zone 1. view the current time zone # vi/etc/sysconfig/clock2. method for modifying and setting the time zone 1: # tzselect Method 2: RedHatLinux and CentOS only) # timeconfig3. copy the corresponding time zone file,

View the maximum file descriptor that a process can open

The default file descriptor of the Centos server is 1024 (linux). The Command ulimit-n is run. For high-load and high-connection servers, 1024 is far from enough. As for the modification method, I will not repeat it here. a large number of articles

CentOS dual-network interface policy routing test

1. Reference link: ---- you can configure according to the following link. in redhatlinux, you can go back to the NIC from which the target address is located: Swap (for interchange I. Reference link: ---- You can configure the following link. in

How to limit the number of pseudo terminals in Centos

If you want to add (or restrict) users logging on to the service through ssh or telnet, you can modify the kernel parameters to limit the number of users. the following example demonstrates vim/etc/sysctl. added kernel in conf. pty. max = 3 // The

Record the time of Shell cancellation each time

A friend wants to log out every time he exits the shell. add the following command to the bash_logout File: date-dtoday + & quot; % Y-% m-% d % H: % M: % S & quot; & gt; /var/log/logout test: two windows are opened, one of which is to view the

CentOSsed command to process text files

Cattest.txt 12341. Merge the upper and lower rows of sed & #39; $! N; s/\ n/\ t/&%39;test.txt 12342. merge matching mode and the next sed & #39;/2/{N; s/\ n/\ t/Jun 'test.txt 12343. merge all rows of sed & #39;: a; N; s/\ n //; ba; & #3 Cat test.

CentOSchmod command usage

Command name: chmod permission: Usage of all users: chmod [-cfvR] [-- help] [-- version] modefile... note: The file calling permissions for Linux/Unix are divided into three levels: file owner, group, and others. Chmod can be used to control how

Run the CentOSnetstat command to view the number of TCP connections.

The netstat command displays network connection, route table, and network interface information, allowing you to know which network connections are in operation. In daily work, we usually use two parameters: netstat? An, as shown below: [root @

CentOSmktemp command explanation

Mktemptest. XXXXXX creates a temporary file in the current directory. X is a randomly generated string. after the command ends, the file name-ttest is returned. XXXXXX is created in the/tmp Directory. the others are the same as above. The result

Detailed instructions on using mv commands in CentOS

Use the mv command to rename a file or directory or move the file from one directory to another. This command is equivalent to the combination of The ren and move commands in the DOS system. The permission is granted to all users. Format: mv

Total Pages: 2732 1 .... 2609 2610 2611 2612 2613 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.