This article is mainly for beginners of kernel learning, mainly on the VMware virtual machine to operate.Install the corresponding version of the compilation Toolchain first.Compile and install the following.1. First unzip the source code.2. Use the
This content is Linux user base, related content see Linux change username and Ubuntu change username and host name.User. GroupWhen we use Linux, we need to log in as a user, and a process needs to be executed as a user. Users restrict which
1. Experimental backgroundPrior to the Linux DNS configuration 1-dns get started, where only one DNS server, but generally in large networks, through the configuration of the secondary DNS server can improve the reliability of the DNS service2.
1. If CentOS is installed using minimal installation, the Setup command will not be available after installation.~]# Setup-bash:setup:command not found2, need to install setuptool;~]# yum-y Install Setuptool3, after the installation is complete, you
Find files ending in. txt in the/apps/tomcat/tomcat3/apache-tomcat-7.0.69/logs directory, search for the keyword ifcmpecrservice in the file and print the line numberFind /apps/tomcat/tomcat3/apache-tomcat-7.0. the ' *.txt '| Xargs grep "
[[email protected] ~]# ssh-keygen-t RSA # Create key pairGenerating public/private RSA key pairEnter file in which to save the key (/ROOT/.SSH/ID_RSA):Created directory '/root/.ssh '.Enter passphrase (empty for no passphrase):Enter same Passphrase
If you need to install Zabbix machines that can be networked, then you can follow the steps below to install the desired environment for configuring Zabbix.As we all know, installing Zabbix under Linux, the required underlying environment is
A few days ago in the end of the PHP project, the final project for one months, and finally add a clear cache function can be completed, but the tragedy is in the last send, wrote a clean cache of code, because the students in the learning phase,
1 command line daily shortcut keys:
CTRL + U-cut the content before the cursor
CTRL + K-cut the cursor to the end of the line
CTRL + Y-paste
CTRL + E-Move cursor to end of line
CTRL + A-Move the cursor
In the development process, some of the development packages within the company are sometimes used, and it is obvious that it is inappropriate to put these packages externally. In addition, these internal dependencies may be constantly being updated
Storage Management:Here we are going to learn about two types of disk arrays:The disk array is made up of many inexpensive disks , combined into a large-capacity disk group, the use of individual disks to provide data generated by the bonus effect
Counts the number of files in the current folder, including subfoldersLs-lr|grep "^-" |wc-lThe number of directories under the statistics folder, including the sub-foldersLs-lr|grep "^d" |wc-lCount the number of files in the current folderLs-l |grep
It is necessary to delete the files under this directory according to time,/home/lifeccp/dicom/studies, and clean up the invalid data 20 days ago.You can use the following command to complete:Find /home/lifeccp/dicom/studies-mtime +"* *"rm -rf {}
Find Path-option [-print] [-exec-ok command] {} \;The directory path that the Path:find command looks for. For example, use. To represent the current directory, and/to represent the system root directory.-print output of the found file to standard
Wow, it's been a long time since it's been updated, let's talk about Linux's memory mechanism today.First, let's take a look at the conceptFirst, what is the memory mechanism of Linux?We know that reading and writing data directly from physical
PWD Show current folder, ls View files under folder, CD into folder-bash-4.2$ pwd/home/myhaspl-bash-4.2$ lsABC hadoop-2.4.1 mydoclist mypylst mypylsts numpyAbd hadoop-2.4.1-src.tar.gz myl2 Mypylst1 myrun pypy-2.3.1-srcError.log hadoop-2.4.1.tar.gz
Common CentOS Log Viewing commands
CatTail-f
Japanese text description/Var/log/message information and error logs after the system is started. It is one of the most commonly used logs in Red HatLinux./Var/log/secure security-related log
SSH logon principle, ssh Logon
Nature
SSH is a network protocol (Application Layer) used for encrypted login between computers.
SSH has multiple implementations, both commercial and open-source. OpenSSH is an open-source implementation.
Installation and deployment of svn in Linux and deployment of linuxsvn
I encountered a problem in my recent work. I developed a management system with one of my associates and modified it based on the original code, I have to confirm with him
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service