Http://www.linuxidc.com/Linux/2015-05/117414.htm1. Command line daily shortcut keysThe following shortcuts are very useful and can greatly improve your productivity:
CTRL + U-cut the content before the cursor
CTRL + K-cut the cursor to
First, view and manage the currently logged in user
1. Use the W command to view the process information that the logged-on user is using,and the W command to display the names of the users who have logged in to the system and what they are
Unix Command Line Tricks–part Ihttp://www.cyberciti.biz/open-source/command-line-hacks/20-unix-command-line-tricks-part-i/Deleting a HUGE fileI had a huge log file 200GB I need to delete on a production Web server. My rm and LS command was crashed
Reprint Please specify source: http://blog.csdn.net/l1028386804/article/details/457694611. After logging into Linux via Remote Tools, the location is the home directory of the currently logged in user.2. Symbols for home directories are represented
Message transmission refers to the process of sending messages out of the computer to other systems.The transmission can be initiated by the L4 layer protocol or by message forwarding.In an in-depth understanding of the Linux Network Technology
Modify the/proc/sys/net/ipv4/icmp_echo_ignore_all content to 1 to disable ping content for 0 to turn on Ping.Sysctl-w net.ipv4.icmp_echo_ignore_all=1 The effect of this order is ibid.There is another way to use the iptables-in Ping.Iptables-a
To learn the command line, you need to master a few very useful and necessary tips1. [Tab]Using the Tab key to complete the command, the greatest benefit of this technique is that when you forget the full name of a command, you can simply enter a
Linux Components :Core/boot/vmlinuz-versionKernel module:/lib/modules/versionKernel design:Single CoreModular designMicro-coreLoad Module Command :InsmodModprobePseudo File System:/proc/proc/sys: Many of the files in this directory are readable and
00. A brief history of building and using Linux development environment 1--linux01. Build and use 2--linux System (Ubuntu) installation plan for Linux development environment02, the Linux development environment to build and use 3--through the
Recently, on a project, the backend mule es CPU was found to be high. After Jstat-gcutil JVM process number 1000 10 analysis, found FGC times, more.After the GC observation, there are a large number of new generation objects, directly into the
Echo"function description": Echo will send the input string to standard output. The output strings are separated by white space characters, and a newline number is added at the end. "Syntax format": echo [-ne][string]echo [--help][--version]"Option
Test environment: Ubuntu 14.04LTSUnder Windows, we can easily see all of the PCIe config space with rw everything, but we recently wanted to dump PCIe config space under Linux, first we tried to use IO read,That is, usually we will use CF8 and CFC
This article describes the Linux usage techniques that are accumulated in peacetime.Hidden properties of the file's properties file
lsattr: List hidden properties of a file
chattr: Modify hidden properties of a file[[email protected] ~]#
There are many tools for Linux remote login, such as PUTTY,SECURECRT ... In fact, with the help of the Windows Telnet tool, you can easily log on to the Linux system at the command prompt.Although Telnet is simple, there are some configurations that
Build a JAVA Runtime Environment in CentOS Linux
1. Install jdk
1. Enter the usr directory
Cd/usr
2. Create a java installation directory under the usr directory
Mkdir java
3. Copy jdk-6u24-linux-i586.bin to the java directory
Cp/home/itcast/Desktop/
View hardware information in CentOS
1. The hardware information in centos is comprehensive.Common CentOS commands to view cpuMore/proc/cpuinfo | grep "model name"Grep "model name"/proc/cpuinfo[Root @ localhost/] # grep "CPU"/proc/cpuinfoModel name:
Enable iptables firewall in CentOS 7
In the latestIn CentOS 7 linux, the default firewall is changed to firewalld, replacing the previous iptables firewall. How can I enable the iptrables firewall again? This article will show you how to delete
What exactly does target in makefile represent ?, Makefiletarget
When I first started using make, I thought that the target named main in makefile is the target executed by make by default (the Chinese translation is called the target (di, four
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service