Guide
I found a video of the children having a good time in their computer classroom. I don't know where they are, but I guess it's in Indonesia or Malaysia. Video please take your own ladder: Https://youtu.be/z8taQPomp0Y
Run the
System performance has always been a hot topic. Do operation of the past few years have been engaged in performance tuning, writing this article is also a summary of the work.The first step in tuning is to say why tuning? That is, the system
a few common Linux monitoring scriptsA few common Linux monitoring scriptsThe following is a number of host monitoring scripts, we can change according to their own circumstances, and hope to give you a little help.1. Check the host network card
I. Linux Philosophical thinking1. All Documents2. A small program consisting of a single purpose, combined with a small program to complete complex tasks3. Avoid interaction with the user (avoid graphical interface, the GUI is more prone to bug,
From a 0-based rookie of mine, slowly touching the Linux operating systemSome basic small commands:Normal user switch root command:su-Password: ************Install the interface into the graphical interface command: StartX &Setting the locale:
The Linux du commandThe Linux du command also looks at the space used, but unlike the DF command, the Linux du command is a view of the space used by the file and directory disks, or some difference from the DF command.1. Command format:du [Options]
Linux accounts and user groupsuser identifiers: Uid and GIDEach file has an owner ID and user group ID, and when we need to view the file attributes, the system will find the corresponding UID and GID corresponding account name and group name
echo display with color, need to use parameter-EThe format is as follows:Echo-e "\033[word background color; text color m string \033[0m"For example:Echo-e "\033[41;37m Tonyzhang \033[0m"Where 41 of the position represents the background, 37 of the
Network command: Ping (Test network connectivity)Network command: Ifconfig (view and set network card information)Note: When viewing the NIC information, enter the Ifconfig command directly.Network command: Last (lists user information for current
Gawk (GNU awk)The GNU version of awk in Unix, which completes the work of grep and SEDSupports mathematical operations, processes that control a large number of variables and functions built into itHow awk commands work:As with SED, it is a line of
0x00 Linux Advanced CommandWhen we are familiar with certain basic commands, we tend to be exposed to some advanced command operations, or unfamiliar command operations.0x01 Program ConstructionGeneral source code provided by the program
Installing PHP under Rehl 6.6 today requires installation of fontconfig-2.4.2.tar.gzThe following error occurred using the compiled discovery:No package ' libxml-2.0 ' foundUse the following command to find that you did not find:
NAT type of Load Balancer cluster LVS under Linux1. The cluster type is divided into 3 types:Lb:load balancing, load balancingHa:high Availability , High availabilityHp:high performance, high performanceThe 2.LB load Balancer four layer LVS type is
A test server in the office opened the Tomcat Administration page with external access enabled, and a weak password was set. These 3 factors at the same time set up, not a few days by uninvited guests put a Trojan horse. The aftermath was not
1, whichFunction: View the location of the executable file (through the PATH environment variable to find the executable file)Syntax: which executable file nameExample:which passwd/usr/bin/passwd2, WhereisRole: View the location of a fileSyntax:
Eight. Build LFS system1. Preparing the virtual kernel file systemThe kernel mounts several file systems for exchanging information between itself and the user space program. These file systems are virtual and do not occupy actual disk space, and
Before there is a semaphore mechanism written over SYSTEMV, it is now a signal. The signal here is different from the signal in front. The signal here is a process to the operating system or process of some kind of information, let the operating
Using Linux to access someone else's SMB is a need to mount it first.Mount-t CIFS//192.168.1.50/sgk/aaa-o USERNAME=SMB,PASSWORD=SMB192.168.1.50 Shared IPSGK corresponding folder/AAA mount point-o username=smb,password=smb Specify access password if
In order to better understand the principle of SSH password-free login, we first say that SSH security authentication, SSH using "asymmetric Key System", known as public key private key encryption system, its security verification is divided into
Centos proxy Internet access settings1. Set proxy on the built-in centos Interface1. interface settings
The default proxy port of squid is 3128.
2. firefox settingsSettings> LAN Settings> ip: port/username: passwdIi. Set proxies for terminal1.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service