Linux Unzip files

Here are tar some summary 12 of the commands:# tar -cvf test.tar test 仅打包,不压缩 # tar -zcvf test.tar.gz test 打包后,以gzip压缩 在参数f后面的压缩文件名是自己取的,习惯上用tar来做,如果加z参数,则以tar.gz 或tgz来代表gzip压缩过的tar file文件Decompression operation:#tar -zxvf

Analysis of the backlog of connection queues for Linux sockets

ack

The process of establishing a socket connection 1:client send a SYN request to Server2:server after receiving the request placed in the SYN queue, the maximum value of this half-connection queue is the system parameters Tcp_max_syn_ Backlog

Package Management-----Linux operating system RPM package installation method steps

Linux operating system RPM package installation method stepsAugust 04, 2016 07:00:26Hits: 17140Transferred from: http://os.51cto.com/art/201003/186467.htmParticularly noteworthy is the Linux operating system has a lot to learn about the place, here

Linux basic commands

1 Traversing a directoryCd:change dicrectory abbreviation. Or./represents the current directory,.. Or.. /represents the previous table of contents, CD-Represents the last directory entered.2 List of files and directoriesLs:list, the file under the

Jenkins01:linux+jenkins+ant+jmeter Integration

Directory[TOC]First, jmeter and ant environment constructionJMeter environment Building is relatively simple, upload the JMeter package to Linux, unzip can, but need to configure environment variables, the configuration environment variable code is

Fifth week of Linux jobs

1, describe the functions, usage scenarios, and differences between bridges, hubs, two-layer switches, layer three switches, routers. 1, the bridge is used to isolate the conflict domain, the bridge belongs to the two layer network equipment.2. Hub:

2018-05-08 Linux Learning

13.4 MySQL User managementMySQL Create user and authorizegrant all on *.* to ‘user1‘ identified by ‘passwd‘;grant SELECT,UPDATE,INSERT on db1.* to ‘user2‘@‘192.168.133.1‘ identified by ‘passwd‘;grant all on db1.* to ‘user3‘@‘%‘ identified by ‘passwd‘

Two methods to implement the Linux inactive user login timeout after the automatic logout

In normal work, the Windows system uses more, many colleagues around the computer to do some personalized settings, such as the automatic lock screen after a period of time, automatically turn off the screen, automatically log off the current login

Linux: File packaging and compression

Learning content Source: Experimental BuildingLinks: https://www.shiyanlou.com/Learning content: Linux commonly used compression/decompression tools, introduced the zip, RAR, tar use.File packaging and compressionThe compressed package file format

Modify apt download source under Linux

Many times the unable to fetch somearchives error occurs when using the APT Install command, and we need to run the following apt update, but often there is a slow download situationHere's a note to change the download source of apt to some source

NO19 Optimizing Linux System--important boot-up service--turn off self-starter

* * How to optimize Linux systems:1 without root, add a normal user, with sudo authorization management.2 Change the default remote connection SSH service port and prevent the root user from connecting remotely.3 Timing automatically updates server

Linux common commands: at command

In Windows systems, Windows provides the ability to schedule tasks, such as task scheduling in Control Panel, performance and maintenance, and its function is to schedule tasks to run automatically. You can set up a scheduled task by stepping

The first chapter on Linux history

a lot aboutLinuxBooks in the previous chapters have written a whole bunch of things to introduceLinux, but the reader has not officially started to enterLinuxof the world, which led them toLinuxlost some interest, and threw a thick book away.

Introduction to Linux Network management

CENTOS6 Traditional Naming conventions: Ethernet: EthX, [0,oo], e.g. eth0, eth1, ..... The number defaults from 0, and 1 indicates the second NIC PPP Network: PPPX, [0,...], for example, Ppp0, PPP1, ... Centos7 predictable naming:

Linux Common commands: ifconfig command

Many windows are familiar with the ipconfig command-line tool, which is used to obtain and modify network interface configuration information. The Linux system has a similar tool, the ifconfig (Interfaces config). You typically need to log in as

Linux inode exhaustion Failure handling

Linux system Everything is a file, the system does not use the file name, and use the Inode number to identify the file, a file must occupy an inode, because each file must have an inode, it is possible that the inode has been exhausted, but the

Linux system Configuration and service management--rights management

1, the basic authority UGO? 1. Permission Setting object: Genus (U) Group (g) Others (O) owner (A (u+g+o))? 2, the type of permission: read: r=4 write: w=2 execution: x=1 number plus minus sum to get the number,? You get two of the files and more

Linux-View file, folder size command, DH life u

1. Ls-lsh2. Du-sh Du = = Disk usage (disk usage, disk space occupied)The amount of disk space a file occupies and the size of a file is a different situation. The footprint depends on the size of the file system block (block), Linux is

RPM details of Linux package management tools

When it comes to package management tools, let's look at the application interface (API) and Application Binary interface (ABI). Api: Programming Interface Application Program Interface In other words, things like the

1.linux Source Installation Nginx

Download nginx.tar.gz source package from official website Copy to Linux system for decompression TAR-ZXVF nginx.tar.gz Enter the extracted directory, need./configure, this step will report multiple errors, such as the installation of GCC

Total Pages: 5467 1 .... 1309 1310 1311 1312 1313 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.