According to the number of dirty words/version number statistics
By language density/version number statistics
The above illustration shows the c,h in the Linux kernel and the bad language statistics in the s source code, which I
In this article, I'll show you another nifty use case for Linux command lines: Visit Google's Gmail service, with the help of a small partner in need.
Linux access to new Gmail Mail via command line without entering @gmail.com part
?
1
First into the Linux program staff, often get garbled greetings. "Toss". Because of garbled, and finally gave up Linux is not a minority. OK, go to the matter, first see how all kinds of garbled is formed.
Chinese character garbled
This situation
1. Read the MBR information and start boot Manager
Windows uses NTLDR as the boot Manager, and if you have multiple versions of Windows installed on your system, you will need to select the system you want to enter in NTLDR.
Linux typically uses a
How to set up Linux system network card bindings
Brief introduction
A port binding is the binding of multiple physical network cards to a logical network card; Depending on the pattern, the function of the NIC binding can be divided into two
In Linux, each file has a specific attribute. Mainly includes the file type and the file permission two aspects. Can be divided into 5 different types: Normal files, directory files, linked files, device files, and piping files.
The so-called file
If your XXX card is not supported by the kernel, and you fear that your own compiled kernel will cause system damage, you can try this method ^_^
VMware Three network connection Internet settings:
1.bridge:
Default Use Vmnet0
The IP settings of
The essence of a server is to provide access to a variety of services. Make the server run only the required services, and turn off services that are not in use. This will not only release some system resources, but also make the server more secure.
1. Installation Iproute
The code is as follows:
Yum-y Install Iproute
2, limit the bandwidth of the Eth0 network card to 50kbit
The code is as follows:
/SBIN/TC qdisc add dev eth0 root TBF rate 50kbit Latency 50ms Burst 1000
3, limit the
1. Display the currently initiated network Interface command:
The code is as follows:
Ifconfig
2. View all current network interface commands:
The code is as follows:
Ifconfig-a
3. View the specified network interface command:
The code is as
To view the host name of Ubuntu, you can view it by command:
Hostname
Modifying the host name requires two files to be changed:
/etc/hostname
/etc/hosts
In the hostname file, change the original host name to a new one. In the Hosts file, you
Create audit log Directory
The code is as follows:
Mkdir-p/var/log/user_audit
Create user audit log files;
The code is as follows:
Touch/var/log/user_audit/user_audit.log
Assigning files to users with low privileges
The code is as follows:
Managing junk files in Linux is not that simple, although the resulting number of Linux spam files is less, but as the operation of the Linux system will inevitably produce a variety of software installation packages, software remnants, browser
Linux system disk prompts are full, but the size of the files on the disk and the size of the usage is not consistent, this is the case of disk loss, then what is the program to occupy the disk space? The following small series for you to introduce
In the Linux system there are many command programs to assist the normal and convenient operation of the system, then there is a system called the GDB command program, then we today to understand the knowledge of the GDB command!
First, the
The code is as follows:
Setting Install-info (5.2.0.dfsg.1-2) ...
/etc/environment:line 2:class_path:command not found
Dpkg:error Processing Package Install-info (--configure):
Child process installed Post-Installation script returned error number 1
#whereis find software that is already installed
Looking up a file on Linux is a bit of a hassle. After all, in Linux we need to use the dedicated "find" command to find the files on the hard disk.
Inux file expression format is very complex,
In a Linux hierarchy, users can use the mkdir command to create a new directory under any authorized directory, or they can use the CD command to convert from one directory to another. However, there is no prompt to tell the user which directory is
Name: More
Use Rights: All users
Use mode: more [-DLFPCSU] [-num] [+/pattern] [+linenum] [fileNames ...]
Description: Similar to cat, but will be a page of the display to facilitate the user read-by-page, and the most basic command is to press
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service