10 Linux network and monitoring commands you need to know

The 10 basic network and monitoring commands that every linux user should know are listed below. The network and monitoring commands are similar to the hostname, ping, ifconfig, iwconfig, netstat, nslookup, traceroute, finger, telnet, and ethtool

Set normal users to sudo permissions in Fedora18

Add a general user to the sudo group isnotinthesudoersfile. Thisincidentwillbereported under Fedora18. the solution is to run the sudo command under a general user and prompt "Forbidden. Thisincidentwillber Fedorasudo" Adding a general user to the

Ubuntu search commands and ubuntu search commands

Ubuntu search command list, ubuntu search command details, you can look at Ubuntu 1. search by file name:1. find commandFind/-name "filename"Purpose: to search for a file named filename in the root directory "/". The "filename" file name can contain

Detailed steps for compiling and installing MySQL5.6.14 under CentOS6.4

MySQL 5.1 installed through yum in CentOS6.4 is old, so we can install MySQL 5.6.14 of higher version through source code. CentOS I. uninstall the old versionRun the following command to check whether MySQL Server is installed.Copy codeThe code is

11 Linux commands that are rarely known but useful

Linux command lines attract most Linux enthusiasts. A normal Linux user generally has about 50-60 commands to process daily tasks. Linux commands and their conversion are the most valuable treasures for Linux users, Shell script programmers, and

Introduction to linux network programming socket

Linux network programs are divided into server programs and client programs. when writing network programs in linux, network communication is generally based on TCP or UDP. 1. Introduction to ConceptsNetwork programs are divided into server programs

Solution to the problem that the USB flash drive cannot be deleted in Linux

When using a USB flash drive in Linux, it is suspected that a file such as auto is a virus, because its attributes are not completely deleted, baidu has found a good solution here to share with you. interested friends can understand it. When using

Basic network devices on Linux

The introduction of Linux abstract network devices is similar to that of disk devices. if a Linux user wants to use network functions, the hardware cannot be directly operated, but a Linux user needs to operate directly or indirectly as a device

Ubuntu12.10 + Hadoop1.2.1 cluster configuration

1. introduction Hadoop is a distributed system infrastructure developed by the Apache Foundation. Users can develop distributed programs without understanding the details of the distributed underlying layer, and make full use of the power of

CentOS graphical installation interface

This article mainly introduces how to install a graphical interface in centos. in some cases, the command-only interface is too tired. for personal learning, you can use the image interface. the server strongly does not recommend using the graphical

My Vim common plug-ins and key-bit ing configuration

I remember that I used Coda to write code when I first got started with Mac. it took a long time to write code. After that, the SublimeText fire took several months. Now, we have become a Vim party for two years. Vim is a magic editor, no matter

Linuxawk string connection operation (string to digit, number to string)

The data types in awk do not need to be defined and are adaptive. Sometimes forced conversion is required. You can complete the following operations: I. convert an awk string to a number [Chengmo @ centos5 ~] $ Awk 'In in {a = "100"; B = "10test10"

Use the find command in linux to find files based on system time

This article describes how to use the find command to search for files based on the timestamp of your system. For more information, see LinuxFind These timestamps include Copy codeThe code is as follows:Last modification time of mtime file

Disable root remote login to centos (enable sudo)

By default, sudo is not enabled for CentOS, and you can directly log on to the server as a Super Administrator. to ensure security and reduce the loss caused by misoperations, we recommend that you enable sudo CentOSsudo. 1. add a sudo userRun the

Ubuntu12.04 QQ screenshot installation tutorial

I believe that anyone who has used a linux system knows that the software in linux is not bad. Although the system itself has a tool, it has no way to draw circles and write text instructions on captured images. Ubuntu I believe that anyone who has

Ten habits of UNIX experts

Use 10 good habits that can improve the efficiency of your UNIX command line and get rid of bad usage patterns in this process. This article guides you step by step to learn several techniques used for command line operations, which are very good

29 practical examples of Nmap commands prepared for Linux/network administrators

Nmap is an open-source and generic tool for Linux systems/network administrators. Nmap is used to detect networks on remote machines, perform security scans, perform network audits, and search for open ports. It scans the remote online host, the

Why does Linux not need to be fragmented?

If you are a Linux user, you may hear that the Linux file system does not need to be fragmented. You may also notice that neither the Linux release nor the disk fragment function is available. Why? To understand why Linux does not consider Windows

How to modify the IP address and gateway of the NIC in centos

This article describes how to configure NICs, modify gateways, and modify DNS in centos. For more information, see CentOS. 1. modify the IP address of CentOS Modify the configuration file of the corresponding nic ip addressCopy codeThe code is as

Proficient in Vim

Vim is well-known and well-deserved. Although the built-in vimtutor teaching material can teach you some very basic usage and let you know how to edit a file, what if you want to be as proficient as the legendary vim master? With simple Google

Total Pages: 2732 1 .... 2615 2616 2617 2618 2619 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.