Note the following when installing zip extension in xampp in linux: 1. When installing xampp, the following error occurs: grep:/opt/lampp/include/php/main/php. h: No such file or directory grep:/opt/lampp/include/php/Zend/zend_modules.h: No such
Concise Linux Command Line NOTE 2: cd cdcd is the abbreviation of change directory, mainly used to change the current directory www.2cto.com 1. usage cd [dirName] 2. common parameters without parameters indicate that the path is directly changed to
The establishment of cacti Cacti on nginx is a set of network traffic monitoring graphical analysis tools developed based on PHP, MySQL, SNMP and RRDTool www.2cto.com Cacti and Nagios are now using a lot of network monitoring software, the
The braces and parentheses in shell I want to talk about here are several types of shell parentheses, the structure of braces and the variables in parentheses. The command usage is as follows: www.2cto.com 1. $ {var} 2. $ (cmd) 3. () and {} 4. $
Mandatory Access Control System in Linux KernelAppArmorBecause I recently studied the implementation of the OJ (oline judge) Background security module, I have been studying the sandbox in Linux and found that Apparmor can provide access
The repair method for the grub menu damage of the dual system is to merge the edisk and the F disk this afternoon. After restarting the computer, it is found that it cannot enter the system, either vista or fedora, which is extremely depressing.
SSH connection timeout settings (1) for security reasons, no input is made within a certain period of time (the number of seconds is unknown, but it is very short) after the SSH connection to the remote server, the server automatically disconnects.
After TSM sch does not start automatically and the operating system is restarted, view the/tsm_sch.log file as follows and find that the/dsmerror cannot be opened. log file: www.2cto.com WOLF:/# cat/tsm_sch.logANS1398E Initialization functions
Account Management under CentOSIn Linux, each file has three types of permissions: account permissions, group permissions, and other permissions. Accounts and groups are many-to-many relationships, that is, an account can belong to multiple groups,
Relationship between Linux device drivers and the entire hardware system 1. Device Classification and features the hardware of a computer system consists of CPU, memory, and peripherals. With the development of the IC (Integrated circuit)
Note on managing UID and GID for CNU/Linux users ① what a user can do depends on UID and GID. ② file permissions involve three types of users: ● owner ● group ● other ③ manage three User Files: ●/etc/passwd: there are 7 fields, and UID No. 4 is the
Optimize TCP/IP connections to reduce the TIME-WAIT command (1) the status and number of TCP/IP connections: # netstat-an | awk '/^ tcp/{++ s [$ NF]} END {for (a in s) print a, s [a]}' (2) improve server load capabilities: # vim/etc/sysctl. conf and
Ubuntu 12.04 didn't install the MIB files. even if you install the SNMP applications. just check the preamble of/etc/snmp. conf # As the snmp packages come without MIB files due to license reasons, loading # of MIBs is disabled by default. if you
I think everyone is familiar with the YUM service in linux. I have previously written down the steps for building the YUM in linux redhat. Today I mainly want to write about how to build the YUM in centos, although centos is a clone of redhat,
1. Understand the concept of single-user multi-task and multi-user multi-task in Linux;
Linux is a multi-user, multi-task operating system; we should understand the concept of single-user multi-task and multi-user multi-task;
1. single-user
When running commands in AIX, the system prompts "ksh: There is not enough space in...OS: AIX7.1Run ls and the following message is displayed: "ksh: There is not enough space in the file system."1. view available PPs: lsvg rootvg-> free space
Linux/bin,/sbin,/usr/bin,/usr/sbin is different from the following four application directories in linux: /bin,/sbin,/usr/bin,/usr/sbinBin:The short description of "bin" as "binary" mainly places some necessary execution files of the system, for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service