This document uses tomcat-5.5.33 as an example. 1) decompress the package into a folder, depending on the file format. 2) $ vi/etc/profile # open the file in the vi editor for editing (add environment variables) and add the following code at the end
Upload the installation file to the/OPT directory of linux. Environment: REDHAT5.5 tools: httpd-2.2.17.tar.gzmysql-5.0.22.tar.gzphp-5.2.17.tar.gzphpMyAdmin-3.3.4-all-languages.tar.bz2gd-2.0.32.tar.gzfreetype-2.1.1
Upload the installation file to
A command can be: # uname-arLinuxtony-PC2.6.38-10-generic #46-effectusmptuejun2815: 07: 17UTC2011x86_64x86_64x86_64GNU/Linux description is 64-bit system % can also be more intuitive # getconfL...
One command:
# Uname-ar
Linux tony-PC 2.6.38-10
When you use yum to install software in CentOS, the following message is displayed: reference warning: rpmts_HdrFromFdno: HeaderV3DSAsignature: NOKEY, keyID ***** this is because yum has installed the old version of GPGkeys. the solution is to
C programming practices in Linux (1 )?? Build a development platform. GCC compiler GCC is the most important development tool on the Linux platform. it is the gnu c and C ++ compilers. its basic usage is as follows: gcc [options] [filenames] options
In this section, we will analyze the magical and NB handle_stripe. for version 2.6.21, raid5 and raid6 use the functions 'handle_stripe6 'and 'handle_stripe5, handle_stripe6, and handle_stripe5, respectively, as long as you care...
In this section,
In linux, software installation in linux has two main methods: one is to directly download the source code package and install it after self-compiling; the other is to directly obtain the rpm Package for installation. No matter which method the
I/O on the server is very large, but the built-in commands of the system do not show which process produces I/O. iotop imposes a requirement on the system kernel 2.6.20 or higher, you can also install wget-chttp in the latest version of dstat: //
1. the user information is stored in/etc/passwd, the password is stored in/etc/shadow, and the group name is stored in/etc/group2. it indicates 7 columns of file/directory permissions: Column 1: d: directory-: File l: linkfile (connection file) B:
Shell is just getting started. it mainly uses tail-f to redirect to nc through the pipeline to communicate with the irc server, and then uses sed to format it to conform to the protocol, other functions are command execution. The code is not very
Linux command: cat/proc/cpuinfo use the command to determine the number of physical CPUs and cores: number of logical CPUs: # cat/proc/cpuinfo | grepprocessor | wc-l number of physical CPUs: # cat/proc/cpuinfo | grepphysicalid | sort |...
Linux
Section 1 VPN introduction and its classification 1PPTP-BasedVPNPPTP (PointtoPiontTunnelingProtocol) is a Microsoft-initiated protocol that can work on multiple Microsoft operating systems, including Windows 95. although it has been used for a long
PS1: the user's usual prompt. PS2: the first line is not complete. wait for the prompt entered in the second line. Echo $ PS1: you can see the current prompt settings such as: Display green, and add the time and shell version exportPS1 & quot; \ [\
Sed is a useful (but often forgotten) UNIX stream editor. It is an ideal tool for editing files in batches or creating shell scripts effectively to modify existing files. This article is the continuation of the previous article about sed. Replace!
I recently learned how to configure raid in linux as follows: 1. pre-work modify the systemid of the partition to fd2. do raidmdadm-C/dev/md2-l5-n3/dev/sdb8/dev/sdb9/dev/sdb10-C is creating raid volumes with the specified name/dev/md2-l ...
I
1. select a language. it is best to select ENGLISH. It's a good habit to start from English. In fact, garbled characters are also saved. 2. Disk partitioning. If your disk is large and you do not need to consider fixing the machine crash, you can
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.