I. Archiving and compression
Compression Command tool: GZIP,BZIP2
Archive Command tool: Tar
Second, compression2.1. GzipGzip is a standard, widely-used file compression and decompression utility. Gzip allows file to be collocated.
1. Abandon Sectarianism,Don't bother with Windows or Linux (because Windows is closed and Linux is open source, so Linux is more conducive to learning)Unix or Linux, (Unix runs on a specific hardware environment, the scope is relatively small, and
OverviewThe shared memory area is the fastest IPC form . Once such memory is mapped to the address space of the process that shares it, these inter-process data transfers no longer involve the kernel, in other words, the process no longer passes the
The signal is the oldest of the process communication methods used by UNIX systems. The signal not only can be sent from the kernel to a process, but also can be sent from a process dealings a process. For example, a user starts a program in the
Linux System Information query: Kernel version, branch (release version) name, number of bits, CPU information, etc.1, # uname-a (Displays the system name, node name, operating system's release number, operating system version, machine ID number
Section II Basic commands
Uname–r Query the Linux core version.
The file name of the device and device within Linux
IDE HDD/dev/hd[a-d]SCSI/SATA/USB HDD/dev/sd[a-p]USB Flash Disc/dev/sd[a-p]Floppy disk
Problem Description:Before a Python service on the server, put it in the background to run. Python pyserver.py &. When I close this SSH, the service is not available, log in to the server again, there is no such Python process.Problem Locator:By
Open source, almost the meaning of omnipotent, and recently because it played hi ...Due to business development, the need for temporary access to 300MB and gigabit routers, and the company's existing routers are hundred trillion, for cost reasons,
When you shut down today, you use shutdown to do this, but a "Bash:shutdown:command not found" error message appears. This makes me very confused, this command in the system is sure to exist, but why this problem, after checking the data, found
Original URL: http://blog.chinaunix.net/uid-25909722-id-2912890.htmlTransferred from: http://blog.chinaunix.net/space.php?uid=7589639&do=blog&id=2897930a.out > outfile 2>&1 redirection issues under LinuxThe problem stems from the UNIX advanced
I. Overview of the OrderDirectory Management Commands: Ls,cd,pwd,mkdir,rmdir,treeFile Management: Touch,stat,file,rm,cp,mv,installIi. detailed usage of commands1.ls-list Directory Contentsls [OPTION] ... [FILE] ...-L: Long format1th column 1th bit:
Since the first four days have been looking at Bird's Linux books computer some basic knowledge, today only touch the basic commands, from today on a daily record of their own Linux learning process.Cal: CalendarCalCal 2015: List all calendars for 20
How to analyze the password of new users in Linux, and how to analyze the linux Password
When we create a user in Linux, if no password is set, the password is unknown, and it is not an empty password, we can use passwd to modify and find that no
How to check the memory usage of Linux
Problem: I want to monitor the memory usage of Linux. Which graphic interfaces or command line tools are available to check the current memory usage?
When it comes to Linux system performance optimization,
APT-GET for common Linux commands
What is
apt-get
Advanced Packaging Tools (APT) is the software package manager for Debian and its derivative releases (such as Ubuntu. APT can automatically download, configure, and install software packages in
Instructions and examples of using GPG encryption and decryption in Linux
1. Generate a key pair: gpg -- gen-key
Generate a new key pair for the user. Required: Key type (RSA/RSA by default); key length (in bits); expiration time (to prevent key
Analyze memory ing process in Linux x86-64 ModePreface
In the previous article, we analyzed the virtual memory ing process of Linux in x86-32 mode, this chapter mainly continues to analyze the virtual memory ing process of Linux in x86-64 mode.
The
Linux dd command to create a USB flash drive
As the boot Disk of the USB flash drive, Ubuntu has a graphical interface tool Startup Disk Creator, which is easy to use, but the disadvantage is that it can only be used to create the boot Disk of
Centos6.6 system root user password recovery case (transfer), centos6.6root
Original article:Http://www.centoscn.com/CentOS/Intermediate/2015/0131/4604.htmlRecover the root user password in single-user mode
After the host is restarted, press the
Detailed explanation of iptables configuration in CentOS
If you do not know the basic knowledge about IPTABLES, we recommend that you first check it out.
Start Configuration
Let's configure a filter table firewall.
(1) view the settings of IPTABLES
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service