The 10 basic network and monitoring commands that every linux user should know are listed below. The network and monitoring commands are similar to the hostname, ping, ifconfig, iwconfig, netstat, nslookup, traceroute, finger, telnet, and ethtool
Add a general user to the sudo group isnotinthesudoersfile. Thisincidentwillbereported under Fedora18. the solution is to run the sudo command under a general user and prompt "Forbidden. Thisincidentwillber Fedorasudo"
Adding a general user to the
Ubuntu search command list, ubuntu search command details, you can look at Ubuntu
1. search by file name:1. find commandFind/-name "filename"Purpose: to search for a file named filename in the root directory "/". The "filename" file name can contain
MySQL 5.1 installed through yum in CentOS6.4 is old, so we can install MySQL 5.6.14 of higher version through source code. CentOS
I. uninstall the old versionRun the following command to check whether MySQL Server is installed.Copy codeThe code is
Linux command lines attract most Linux enthusiasts. A normal Linux user generally has about 50-60 commands to process daily tasks. Linux commands and their conversion are the most valuable treasures for Linux users, Shell script programmers, and
Linux network programs are divided into server programs and client programs. when writing network programs in linux, network communication is generally based on TCP or UDP.
1. Introduction to ConceptsNetwork programs are divided into server programs
When using a USB flash drive in Linux, it is suspected that a file such as auto is a virus, because its attributes are not completely deleted, baidu has found a good solution here to share with you. interested friends can understand it.
When using
The introduction of Linux abstract network devices is similar to that of disk devices. if a Linux user wants to use network functions, the hardware cannot be directly operated, but a Linux user needs to operate directly or indirectly as a device
1. introduction Hadoop is a distributed system infrastructure developed by the Apache Foundation. Users can develop distributed programs without understanding the details of the distributed underlying layer, and make full use of the power of
This article mainly introduces how to install a graphical interface in centos. in some cases, the command-only interface is too tired. for personal learning, you can use the image interface. the server strongly does not recommend using the graphical
I remember that I used Coda to write code when I first got started with Mac. it took a long time to write code. After that, the SublimeText fire took several months. Now, we have become a Vim party for two years. Vim is a magic editor, no matter
The data types in awk do not need to be defined and are adaptive. Sometimes forced conversion is required. You can complete the following operations:
I. convert an awk string to a number
[Chengmo @ centos5 ~] $ Awk 'In in {a = "100"; B = "10test10"
This article describes how to use the find command to search for files based on the timestamp of your system. For more information, see LinuxFind
These timestamps include
Copy codeThe code is as follows:Last modification time of mtime file
By default, sudo is not enabled for CentOS, and you can directly log on to the server as a Super Administrator. to ensure security and reduce the loss caused by misoperations, we recommend that you enable sudo CentOSsudo.
1. add a sudo userRun the
I believe that anyone who has used a linux system knows that the software in linux is not bad. Although the system itself has a tool, it has no way to draw circles and write text instructions on captured images. Ubuntu
I believe that anyone who has
Use 10 good habits that can improve the efficiency of your UNIX command line and get rid of bad usage patterns in this process. This article guides you step by step to learn several techniques used for command line operations, which are very good
Nmap is an open-source and generic tool for Linux systems/network administrators. Nmap is used to detect networks on remote machines, perform security scans, perform network audits, and search for open ports. It scans the remote online host, the
If you are a Linux user, you may hear that the Linux file system does not need to be fragmented. You may also notice that neither the Linux release nor the disk fragment function is available. Why? To understand why Linux does not consider Windows
This article describes how to configure NICs, modify gateways, and modify DNS in centos. For more information, see CentOS.
1. modify the IP address of CentOS
Modify the configuration file of the corresponding nic ip addressCopy codeThe code is as
Vim is well-known and well-deserved. Although the built-in vimtutor teaching material can teach you some very basic usage and let you know how to edit a file, what if you want to be as proficient as the legendary vim master? With simple Google
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.