2018-05-07 Linux Learning

13.1 Setting Change root password/usr/local/mysql/bin/mysql-urootChange environment variable path, add MySQL absolute pathMysqladmin-uroot password ' 123456 'mysql-uroot-p123456Password resetVI/ETC/MY.CNF//Add Skip-grantRestart MySQL

Linux Text Processing tool awk

Very good text processing tools, especially variables and control statements, using the awesome.Personal understanding of the general process is as follows1. Normal output# $0表示正行 默认是按照行分割 $1 $2#-----------------------------------------------------

Linux under Ps-ef and PS aux difference and format detailed-turn

Original: https://www.linuxidc.com/Linux/2016-07/133515.htmLinux Displays the system process command PS, the most commonly used are ps-ef and PS aux. What is the difference between the two? There is not much difference between the two, to discuss

"Azure" Linux VMS expand operating system disk space

Azure Linux VM expands operating system disk spaceCurrently, Azure offers new features for Linux VMS that increase operating system disk space, and currently support virtual machines primarily include DS, DSV2, and FS series virtual machines. This

Connecting a Googlecloud Linux virtual machine via a local client

The connection tool used for this time is Tera term.The total steps are{1: Generate SSH keys, including public and private keys.2: Upload the public key to Google.3: Log on locally with the private key authentication.}1.1 Open Tera Term1.2 Select

"Linux learning is not difficult" Linux Network Command (2): Ifconfig command to display and configure the network interface

27.2 "Linux learning is not difficult" Linux Network Command (2): Ifconfig command to display and configure the network interfaceUse the Ifconfig command to display and configure network interfaces, such as setting an IP address, MAC address,

How does Linux operations rsync debug?

Rsync is an open source, fast and versatile tool for simultaneous, full-scale, incremental, local or remote data backupand one of the essential skills of OPS personnel.. So how do ops people do when you deploy the architecture in OPS ?Rsyncthe wrong

Linux Technology learning: IO redirection redirection detailed

File descriptors are less used in bash, starting with 0 users representing the flow of data, 0 for standard input, 1 for standard output, 2 for callout error output, and others starting from 3. The most common scenario is to output an error message

Linux common commands: ls command

The LS command is the most commonly used command under Linux. The LS command is the abbreviation of list, the lack of saving LS is used to print out the current directory of the list, if LS specifies a different directory then will be displayed in

Hadoop installation under Linux (local mode)

System for CentOS 6.9,hadoop version 2.8.3, virtual machine vmware WorkstationThis article focuses on Linux virtual machine installation, environment configuration, and Hadoop local mode installation. Pseudo-distributed and installation under

Linux Account Management

User identifiers: Uid and GID we know that there are two kinds of identity elements, one is the userUID userId, one is the user groupGID Group ID。 For Linux systems, or for machines, ID numbers are identified, so the UID and GID are based

Linux directory structure detailed description

Directory1. Tree-like directory structure diagram .... 12,/directory .... 23./etc/directory .... 34./usr/directory .... 65./var/directory .... 76./proc/directory .... 87./dev/directory .... 9This article mainly comes from the network to

The process model of source code analysis based on Linux Kernel Version 4.13.0-36-generic

First, IntroductionThis article is based on the Linux Kernel Version 4.13.0-36-generic Source code, to carry out in-depth analysis of its process model, specifically contains the following:1. How the operating system organizes processes2. How

Linux common Commands--constantly updated

Linux commands:!. 1.[[email Protected]/root]# said landing into the system, where # is super? User is root? user's system prompt#. 2.reboot command to restart the system$. 3. Turn off the system to use (the command can only be used by the super-user)

2018-04-26 Linux Learning

12.13 Nginx anti-theft chainThe configuration is as follows and can be combined with the above configuration.location ~* ^.+\.(gif|jpg|png|swf|flv|rar|zip|doc|pdf|gz|bz2|jpeg|bmp|xls)${ expires 7d; valid_referers none blocked server_names

Linux--makefile Writing

Before the preparation of makefile, limited to the beginning of contact, I have been more limited to some rigid format, sometimes it will seem a bit cumbersome. After further understanding of some of the system compiling and linking knowledge, the

One Linux command per day: Tar command

Through SSH access to the server, will inevitably use compression, decompression, packaging, unpacking, etc., this time the tar command is an essential tool for a powerful. The most popular tar in Linux is the perfectly formed, the most powerful.The

Linux switches Python2 and python3 to the default execution of versions (can also be used for the default execution of editors such as Sublime)

Using the alternate mechanism, you can freely switch to the Python default version by simply entering a few simple instructions at the terminal:sudo update-alternatives --install /usr/bin/python python /usr/bin/python2 100sudo update-alternatives

A dig pit and pits for Linux sh scripts written in Windows environment

Recently, when researching Docker clusters and installations, several machines need to be prepared. So I want to save time, I intend to bulk copy VM machine, and then use the SH script command to perform machine name and IP and other basic

Linux Learning materials: teach you to run Linux in Win10

Windows and Linux systems have always been incompatible, and the new IN10 system is perfectly compatible with Linux, which has to be said to be a developer's fairy tone. Of course, this Linux system is not installed by default, users need to install

Total Pages: 5467 1 .... 1461 1462 1463 1464 1465 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.