The first thing to do is the/etc/sysctl.conf configuration file Net.ipv4.ip_forward = 1 default is 0.This allows Iptalbes FORWARD.Vi/etc/sysconfig/iptables adding *nat Segments*nat:P rerouting ACCEPT [0:0]:P ostrouting ACCEPT [0:0]: OUTPUT ACCEPT [0:
The grep command in a Linux system is a powerful text search tool that uses regular expressions to search for text and print matching lines. The grep full name is global Regular expression Print, which represents the globally regular expression
Vamei Source: Http://www.cnblogs.com/vamei Welcome reprint, Please also keep this statement. Thank you!1. Introduction to LinuxLinux can be defined in both narrow and generalized ways. In a narrow sense, Linux actually refers to the Linux kernel
Through SSH access to the server, will inevitably use compression, decompression, packaging, unpacking, etc., this time the tar command is an essential tool for a powerful. The most popular tar in Linux is the perfectly formed, the most powerful.The
The KILL command in Linux is used to terminate the run of the specified process (terminate a process) and is a common command for process management under Linux. Typically, terminating a foreground process can use the CTRL + C key, but for a
Locate allows users to quickly search the file system for specific files. The method is to set up a database that includes all the file names and paths within the system, and then simply query the database when looking for it, rather than actually
The most important concept in network programming is the connection orientation (connection-oriented) and the non-connected (connectionless) protocol. Though the essence. The difference between the two is not difficult to understand, programming
Task or job: scheduled commandAt : Schedule A one-time taskA System daemon (ATD), which has a set of command-line tools to interact with the daemon; The ATD Daemon provides a-to-Z total of 26 queues, the jobs are arranged alphabetically, and the
Each file and directory in a Linux system has access permissions, which are used to determine who can access and manipulate files and directories.Access to a file or directory is divided into read-only, write-only, and executable three types. As an
In a Linux system, sometimes when a command is executed, another file needs to be manipulated, and the file to be made is not an ordinary user with permission to operate. For example, to modify the user password passwd, the command file owner and
Linux study--redhat EL6 configuring VNC serverSystem environment:Operating system: RedHat EL6.4 (64)RH6 the installation and configuration of the VNC server is slightly different from the RH5, the following cases are installed on the RH EL6.4 to
Simulation experiment of Linux emergency rescue modeRescue mode: Emergency rescue modeStart a Linux system on the CD, which detects the local hard disk device during startup and looks for the original root file system to complete some repairs with
Basic Components :The basic component of a regular expression.
Regular expressions
Describe
Example
\
Escape characters, escaping special characters, ignoring their special meanings
A\.B matches a.b,
in the LUnix system, the control of the permissions of a file or directory is managed by the owner and the group being sued. You can use the CHGRP command to change the file and directory to belong to the group, this way with the group name or group
Location Syntax: Location [=|~|~*|^~]/uri/{...}Default: No Context: Server This command accepts different structures depending on the URL. You can configure the use of regular strings and regular expressions. If you use a regular expression, you
Linuxmkdircommand to create a directory of the specified name, requiring the user who created the directory to have write permissions in the current directory, and the specified directory name cannot be a directory that is already in the current
if!supportlists]-->ÿwait for the child process to end pid_t Waitpid (pid_t pid,int*stat_loc,intoptions) There is another function called wait, which is equivalent to Waitpid (-1, &status,0The Classic example of waitpid that you've seen so often is
Linux File System (inode and block), inodeblock
Linux File System (inode block superblock)Formatting: The file attributes/permissions set by each operating system are different. to store the data required for these files, you need to format the
Centos uses yum to install mysql and centosyummysql
Reference: http://dev.mysql.com/doc/mysql-yum-repo-quick-guide/en/
1. Add a yum Data Source
(1.1) getting the right data source from the http://dev.mysql.com/downloads/repo/yum/
(1.2) install the
Nginx. conf weight loss notes
The problem is that the nginx. conf file is too long, too large, and inconvenient to maintain. Therefore, you can split the file so that it is easy to read and maintain.
1. Remove all weixin configurations in nginx
As
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service