Linux Daily Commands

Http://www.linuxidc.com/Linux/2015-05/117414.htm1. Command line daily shortcut keysThe following shortcuts are very useful and can greatly improve your productivity: CTRL + U-cut the content before the cursor CTRL + K-cut the cursor to

View/Manage current logged in user and user operation history under Linux

First, view and manage the currently logged in user 1. Use the W command to view the process information that the logged-on user is using,and the W command to display the names of the users who have logged in to the system and what they are

20 Useful Linux command-line tricks

Unix Command Line Tricks–part Ihttp://www.cyberciti.biz/open-source/command-line-hacks/20-unix-command-line-tricks-part-i/Deleting a HUGE fileI had a huge log file 200GB I need to delete on a production Web server. My rm and LS command was crashed

--linux Basic Command Review of Hadoop

Reprint Please specify source: http://blog.csdn.net/l1028386804/article/details/457694611. After logging into Linux via Remote Tools, the location is the home directory of the currently logged in user.2. Symbols for home directories are represented

In-depth understanding of Linux network Technology the transmission of inside--IPV4 messages

Message transmission refers to the process of sending messages out of the computer to other systems.The transmission can be initiated by the L4 layer protocol or by message forwarding.In an in-depth understanding of the Linux Network Technology

Linux Server disable ping and open ping

Modify the/proc/sys/net/ipv4/icmp_echo_ignore_all content to 1 to disable ping content for 0 to turn on Ping.Sysctl-w net.ipv4.icmp_echo_ignore_all=1 The effect of this order is ibid.There is another way to use the iptables-in Ping.Iptables-a

Linux command-line important shortcut keys

To learn the command line, you need to master a few very useful and necessary tips1. [Tab]Using the Tab key to complete the command, the greatest benefit of this technique is that when you forget the full name of a command, you can simply enter a

Linux kernel compilation and system cut (sysctl kernel module Management screen generation INITRD

Linux Components :Core/boot/vmlinuz-versionKernel module:/lib/modules/versionKernel design:Single CoreModular designMicro-coreLoad Module Command :InsmodModprobePseudo File System:/proc/proc/sys: Many of the files in this directory are readable and

Linux development environment Building and use tutorial

00. A brief history of building and using Linux development environment 1--linux01. Build and use 2--linux System (Ubuntu) installation plan for Linux development environment02, the Linux development environment to build and use 3--through the

Linux DNS Service installation configuration

System Conventions:1. Domain Name: redhat.com2, ns:192.168.101.1683, web:192.168.101.11, 192.168.101.124, mail:192.168.101.101. Install bindYum Install Bind-libs bind-utils bind2. Turn off SELinux,

Linux firewall iptables establish rules and chains

Install the boot iptables in Rhel 7.0:yum install iptables-services                      #安装iptablessystemctl  mask firewalld.service                #屏蔽firewalld服务systemctl  enable iptables.service            # Set Boot

Linux environment Mule JVM short life cycle Object performance tuning

Recently, on a project, the backend mule es CPU was found to be high. After Jstat-gcutil JVM process number 1000 10 analysis, found FGC times, more.After the GC observation, there are a large number of new generation objects, directly into the

Linux Small white-basic command-echo

Echo"function description": Echo will send the input string to standard output. The output strings are separated by white space characters, and a newline number is added at the end. "Syntax format": echo [-ne][string]echo [--help][--version]"Option

Use memory to access PCIe space under Linux

Test environment: Ubuntu 14.04LTSUnder Windows, we can easily see all of the PCIe config space with rw everything, but we recently wanted to dump PCIe config space under Linux, first we tried to use IO read,That is, usually we will use CF8 and CFC

Linux usage Tips

This article describes the Linux usage techniques that are accumulated in peacetime.Hidden properties of the file's properties file lsattr: List hidden properties of a file chattr: Modify hidden properties of a file[[email protected] ~]#

How Windows uses Telnet to manage virtual machine Linux

There are many tools for Linux remote login, such as PUTTY,SECURECRT ... In fact, with the help of the Windows Telnet tool, you can easily log on to the Linux system at the command prompt.Although Telnet is simple, there are some configurations that

Build a JAVA Runtime Environment in CentOS Linux

Build a JAVA Runtime Environment in CentOS Linux 1. Install jdk 1. Enter the usr directory Cd/usr 2. Create a java installation directory under the usr directory Mkdir java 3. Copy jdk-6u24-linux-i586.bin to the java directory Cp/home/itcast/Desktop/

View hardware information in CentOS

View hardware information in CentOS 1. The hardware information in centos is comprehensive.Common CentOS commands to view cpuMore/proc/cpuinfo | grep "model name"Grep "model name"/proc/cpuinfo[Root @ localhost/] # grep "CPU"/proc/cpuinfoModel name:

Enable iptables firewall in CentOS 7

Enable iptables firewall in CentOS 7 In the latestIn CentOS 7 linux, the default firewall is changed to firewalld, replacing the previous iptables firewall. How can I enable the iptrables firewall again? This article will show you how to delete

What exactly does target in makefile represent ?, Makefiletarget

What exactly does target in makefile represent ?, Makefiletarget When I first started using make, I thought that the target named main in makefile is the target executed by make by default (the Chinese translation is called the target (di, four

Total Pages: 5467 1 .... 1386 1387 1388 1389 1390 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.