First, view and manage the currently logged in user
1. Use the W command to view the process information that the logged-on user is using,and the W command to display the names of the users who have logged in to the system and what they are
System InformationThe processor architecture of the Arch Display machine (1)UNAME-M Display the processor architecture of the machine (2)Uname-r displaying the kernel version in useDMIDECODE-Q Display hardware system
If you use Linux long enough, then you naturally know that some tools come and go. The 2009 Debian Developer Mailing List announced the abandonment of the lack of maintenance of the Net-tools Toolkit. To this day net-tools is still used by some
1. Command formatCD [Directory name]2. Command functionSwitch the current directory to the input directory3. CaseCD/go to the root directoryCD ~ Go to the/home/user user directoryCd/usr go to the USR directory in the root
Date command1. Command function: The date command can be used to display or set the system's dates and times.2. Command format: Date [options] ... Format3. Command parameters:-D Displays the date and time that the string refers to650) this.width=650;
XZ This compression may be a lot of strange, but you can know that XZ is the largest number of Linux by default with a compression tool.Before XZ use has been very little, so there is hardly anything to mention.I was in the download phpmyadmin when
Linux uses a combination of letters and numbers to refer to a disk partition. This may be confusing, especially if you previously used the "C drive" method to refer to hard disks and their partitions. In the Dos/windows world, partitions are named
I am a Linux operations engineer, a bit of experience in this area, and now I say to master what kind of tools itwhen it comes to tools, it can be said to be a skill, and in the line we are generally called tools, which are tools that must be
Is that you want to copy the file from another machine is complete, not lostSpecific information I will not tidy up, see some of the following reference links, probably also understand
The reference links are as
1. Ignore foldersIf the directory oa.youxi.com is from SVN checkout, add material to the server's local directory, but do not want to add material to version control, so we need to ignore this directoryFirst use the SVN status command to view the
Requirements: Copy the folder to the Linux directory, overwriting all folders with the same name under the Linux directory target: Linux, execute this script, enter the folder name, you can bulk copy overwrite. Instructions for use: first putThis
(1) Permanent effect after reboot: Open: Chkconfig iptables on OFF: Chkconfig iptables off (2) Immediate effect, failure after restart: Open: Service iptables start Close: Service iptables stop It should be stated that for other services under Linux,
• Regular ExpressionsSEDawkRegular expressionsUse a single string to describe and match a series of strings that conform to a grammar rule.1. Features:(1) Flexibility, logic and functionality are very strong;(2) The complex control of strings can be
Linux Basics--linux File system and Bash's basic featuresA. linux file system:A file in a Linux file system is a collection of data that contains not only the data in the file but also the structure of the file system, where all Linux users and
Hadoop begins, according to the Convention, first compile the source code, import into Eclipse, so that later to understand that piece, or that block of problems, directly find the source code.hadoop2.4.1 compilation requires protoc2.5.0 support, so
Suppose you use LS under Linux. Careful you will find that actually the folder has permission to run. For example:DRWXRWXR-X CL CL 4096 9 25 14:22.DRWXR-XR-X CL cl 4096 October 10 16:00. /Drwxrwxr-x 5 CL cl 4096 September 10:58 algorithm/Drwxrwxr-x 2
The first thing we need to know is, what are the types of libraries? According to the type of function library being used, it is divided into two categories, namely static and dynamic function libraries.Features of the static function
1. Overview of AideAIDE (adevanced intrusion Detection environment, advanced intrusion detection environment) is an intrusion detection tool that is primarily used to check the integrity of text.Aide is able to construct a database of the specified
1. A brief introduction to the core fileWhen a program crashes, it typically generates a core file in the specified directory. The core file is simply a memory image (plus debugging information), which is used primarily for debugging purposes.2.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service