This article mainly introduces linux password-less ssh login settings. For more information, see
Overview
Ssh and scp between some common devices can save a lot of time without entering a password.
Generate key
Check whether the local device has
This article mainly introduces multiple methods for clearing disk space in ubuntu. For more information, see the following tag: Ubuntu
Linux hard disks are not as lightweight as they can. For example, after you install the software, the APT package
Cacti is a set of graphic analysis tools for network traffic monitoring developed based on PHP, MySQL, SNMP, and RRDTool. It uses snmpget to obtain data and draw images using RRDtool, and you do not need to understand the complex parameters of
Df command: view the available space and usage of all file systems. df can view a large folder.
Df command: view the available space and usage of all file systemsDf allows you to view the size, usage ratio, file system, and its Mount point of a
This article mainly introduces the detailed steps for linux disk partitioning (illustration of how to use linux partition commands). For more information, see
First, we will introduce several simple commands:
Free view the current system memory
This article describes how to set the root permission in ubuntu13.04. For more information, see Ubuntu.
Many of my friends do not know how to set the root permission of Ubuntu 13.04 after installing and upgrading ubuntu 13.04. This article will
This article mainly introduces the detailed illustration of how to manage mail email logs (mail system) in linux. For more information, see
We all know that many log modules are placed below
What if I want to modify or add logs of other services?
This article describes how to configure java environment variables in linux. For more information, see
1. decompress and install jdk
Go to the jdk-6u14-linux-i586.bin file directory under the shell terminal,Execute the
Have you heard of quick reading? To be honest, neither have I. Until a new company named Spritz raised 3.5 million seed funds to develop an API that enables users to read 1000 words per minute. The concept of quick reading is very simple: dividing a
This article mainly introduces the differences between the basic data types of 32-bit and 64-bit machines in linux. For more information, see basic data types.
Data type
32-bit
64-bit
Char
1
1
Int
I went to the company for an internship Today. the company assigned me an old computer with a dual system (XP and Ubuntu) installed on the computer. the user name and password are required for the Ubuntu system to start up. what should I do? Label:
We will demonstrate the following notable phenomenon: the more men who disagree with women's looks as a group, the more people who love her. Men usually ignore cute girls. In fact, some men think that she is ugly, but this will help this woman.
For more information, see How to decompress the tar.gz file in the linuxlinuxsystem to view the file size.
If you do not want to decompress the tar.gz file to view the file size
Tar tvf my_file.tar.gz
Output format:-Rwxr-xr-x root/root 2348366 11:09:
In Linux, if you do not need to install some green software, you can double-click it to start it. However, after some programs are opened, right-click the Launcher and choose LocktoLauncher to use some default icons, in general, if your aesthetics
The following error occurs recently when you use the apt-getupdate command in VPS, in the form of "W: GPGerror: http://security.ubuntu.comtrusty-securityRelease: Thefollowingsignaturescouldn 'tbeverifiedbecausethepu
This problem may also occur in
SublimeText2 is the best code editor I have ever used. It provides great UI and plug-in management, and is now available for free trial for an indefinite period of time, here, I will share with you how to install SublimeText2 in Ubuntu. if you need
Now you have upgraded or installed Ubuntu14.04, but there is another thing you need to do to protect your new system: Backup! Ubuntu has a built-in backup tool DjDupBackupTool. It allows you to back up your system and save it locally or by using
Ubuntu when you use a USB flash drive, you will find that the USB flash drive has become read-only. when you copy data to the USB flash drive, the system prompts that the target is read-only. if you need it, refer to the following tag: Ubuntu.
When
This article mainly introduces 11 methods to check whether Linux has been infiltrated. they are all checked by some linux commands. For more information, see
This article collects and sorts out some methods for reviewing Linux System Intrusion.
This article mainly introduces how to temporarily and permanently modify DNS in Linux. it is simple, clear, and easy. if you need it, refer
Recently, the VPS system has been reinstalled. because the service provider does not provide DHCP, you have
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.