Centos5.x Mount iscsi practice recently in the production environment, we need to use centos5.x to Mount iscsi, and summarize the operation experience www.2cto. com1 downloads the latest related components. it is best to use the latest components.
Tar. how to decompress the file ended in xz today, I tried to compile the kernel and downloaded a tar file. there are few online solutions for compressed files at the end of xz, but I still found them as follows: www.2cto.com $ xz-d ***. tar. xz $
Some applications are deployed in the solaris command to clear log files. you need to use a cronjob to regularly clear log files. You need to write a command to find some files to delete. Run the following command: www.2cto. comfind
Debian scheduled task management cron settings (the easiest way to shut down at a specific time every day: 1. gedit/etc/crontab2. add a line at the end of the file: 0122 * roothalt-p # indicates shutdown at every day.) all tasks with system
Cross-compile Linux kernel 1. download linux kernel source code I'm using a linux-loongson-release-zb-kernel.tgz to decompress it to the/usr/src Directory: tar-xzvflinux-loongson-release-zb-kernel.tgz will generate linux -... cross-compile Linux
After vim exits, terminal content is restored. some terminals can be restored to the status of the terminal before vim is enabled after vim exits, similar to the following: www.2cto.com $ vim/etc/sysconfig/#### open vim ##### sdskk here. some file
How to use ulimitulimit to manage different types of system resources through some parameter options. In this section, we will explain how to use these parameters. Www.2cto. the format of the comulimit command is: ulimit [options] [limit] specific
Simple Linux command line notes: w display information about system users w [options] [username] w is used to display the names of users currently logged on to the system, as well as their terminal device numbers, logon times, running commands, and
This example shows how to read and operate a specific field from a data file in a shell script in Linux. For example, the format of the hypothetical file employees.txt is {employee-name }:{ employee-id }:{ departm... this example shows how to read
We know that the root user is very important in Linux, and its position is as if Adminstrator in Windows has the root permission and we can modify the passwords of other users. However, what if the root user's password is lost? Don't worry, the
When using windows to manage linux servers, SecureCRT, Xshell, and open-source putty are usually used. Most of my work environments use password authentication for logon. Today I learned some SecureCRT key logon methods. Compared with password
When a power outage occurs in a medium-sized enterprise data center, what is a power switch? what is a medium-sized data center? the number of servers is more than 100, and the number of servers is less than 1000. why do enterprises have to worry
View hard disk information on aix # iostat110 find the busiest hard disk # lspv-lhdiskN find the file system corresponding to the hard disk # lsdev & amp; ndash; Ccdisk view all hard disks (including logical disks) status # bootinfo-shdisk0 query
UbuntuCtrl + Alt + Del appears in the settings of GNOME System monitor WindowsNT, 2000, XP and Vista. if you press Ctrl + Alt + Del, the Windows Task Manager will appear. In Ubuntu, this key combination will close the system window. If you like the
Some programs are directly decompressed and installed, so the menu items of the application will not be added. you can manually add the menu items by enabling system & mdash; preference & mdash; main menu, add.
Linux single-line script command collection this article will recently used some of the more interesting and powerful single-line commands to sort out, saving space is not an example. New updates will be found in the future. Www.2cto.com # export
SSH usage and summary SSH service (TCP port 22): secure command interpreter provides a secure Shell environment for clients to remotely manage SSH based on public key encryption (asymmetric encryption) technology: encrypted data transmission; client
Open the httpd. conf file and cancel the comments of the five lines below to open the. so support module required by the proxy. ViewCode1 # LoadModuleproxy_http_modulemodules/mod_proxy_http.so2 # LoadModuleproxy_connect_modulemodules/mod_proxy...
The problem of creating a new user by adduser under ubuntu was encountered yesterday. I used the user's ub and created a new user by using useradd, however, when switching to this user, the terminal does not display as usual [user @ hostname ~] $,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.