First, user management1. User1) Token token,identity2) Linux Users: Username/uid3) Administrator: root,04) Normal Users: 1-65535System User: 1-499 (CentOS6), 1-999 (CentOS7) Assign permissions to the daemon to get resourcesLogin User: CENTOS6, 1000+
Under Linux, get the 10 processes that consume the most CPU resources, using a combination of the following commands:PS Aux|head-1;ps aux|grep-v pid|sort-rn-k +3|headUnder Linux, get the 10 most memory-intensive processes, which can be combined
9.6 awk (UP)Awk is a programming language that is used to process text and data under Linux/unix. The data can come from standard input (stdin), one or more files, or the output of other commands. It supports advanced functions such as user-defined
Understanding Linux Inode?
?1. Origin and role of the Inode 2. What content is contained in the Inode table 3. How the file system reads file 4 through the inode. A special type of existence: Hard link 5. Structure of the catalog file?
?1
In Linux or Unix operating systems, the daemon (Daemon) is a special process that runs in the background, independent of the control terminal and periodically performs some sort of task or waits for certain occurrences to be handled. Because in
Using VISUALVM to remotely monitor Linux server JVM One, JMX mode: 1. The first thing to do is to modify the configuration file for the JMX service in the JDK to get the appropriate permissions:Enter the/jre/lib/management subdirectory of the root
I. The concept of command. Terminal (Terminal)?? command is a Linux system management, Linux system users through the terminal login shell process, terminal is the shell Process Control terminal.
??
?? TTY displays the terminal name of the
Yum-y install java-1.7.0-openjdk-devel.x86_64 Using this command is better. Use other commands when there is no Javac command, specifically to uninstall the previously installed JDK is useful.After installation, configure environment variablesVi/etc/
1. Understanding of SSH ProtocolSSH is the abbreviation for secure Shell, which is developed by the IETF Network Working Group, and SSH is a security protocol based on the application layer. SSH is currently a more reliable protocol that provides
The Linux operating system relies tightly on process creation to meet the needs of users. For example, as soon as a user enters a command, the shell process creates a new process, and the new process runs another copy of the shell and executes the
A Brief introductionSdtin, stdout, stderr are referred to as standard inputs, standard outputs, and standard error outputs, which are declared as follows:/* Standard streams. */extern FILE *stdin; /* standard input stream. */extern FILE *stdout; /*
The top command is primarily used to view information about the process, and it also provides the system's average load, CPU information, and memory information. The following shows the information that the top command provides by default:Average
Shell script IF condition judgment and judgment condition details, shellifPreface:
No matter what programming language, conditional judgment is indispensable. SHELL is no exception.
if list thendo something hereelif list thendo another thing
Other operation commands in wubantu (2), wubantu1. Search for files
The find command searches for files that meet the conditions in a specific directory.
Find [path]-name "*. py" find the file with the extension name ". py" in the specified path,
GIT server for automatic web code deployment
Here, we will briefly record how the GIT server can automatically deploy web code.
1. git mechanism Overview
Git uses a code repository. The git server has a repository called a remote repository. The
Install JDK in linux and JDK in linuxDownload the corresponding system JDK, which is generally at the end of .tar.gz;
1.1 install DependenciesYum install glibc. i686Yum-y install libaio. so.1 libgcc_s.so.1 libstdc ++. so.6Yum update libstdc ++-4.4.7-
Nginx installation in lnmp environment and nginx in lnmp Environment
1. What is nginx?1) Nginx is a lightweight Web server/reverse proxy server and email proxy server, which is released under a BSD-like protocol.2) features: it has a small amount of
Linux system programming: Write a cp command by yourself, linuxcp
Basic usage of the cp command: the target file of the cp source file
If the target file does not exist, create it. If yes, overwrite it.
Implementing a cp command is actually an
Linux compression and decompression commands, linux compression and decompression
. TarUnpack: tar xvf FileName.tarPackage: tar cvf FileName.tar DirName(Note: tar is packed, not compressed !)---------------. GzDecompress 1: gunzip
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service