In a UNIX system, a process ends, but his parent process does not wait (call Wait/waitpid) him, then he will become a zombie process. In the fork ()/execve () procedure, when the parent process is still present at the end of the child process, and
Someone has found an interesting problem with the Linux system, which is that the audio files cannot be played on the web version of the micro-trust public platform. This means that there is no way to listen to the language messages from the other
A powerful network data acquisition and Analysis tool in Linux--tcpdumpTcpdump takes the command line, and its command format is:tcpdump [-ADEFLNNOPQSTVX] [-C Quantity] [-f filename][-I Network interface] [-R FileName] [-S Snaplen][-T type] [-W
Last night encountered a very depressing problem, XenServer machine XAPI can not start, all XE commands can not be executed, the only way to access only SSH, the problem is that there are many virtual machines on this machine is running, try a lot
Security mechanism of the system: Umask (Filter code)
Use the Umask command to view the value of the current userFor the average user speaking umask:0002For administrators umask:0022
So when
When the administrator creates the folder, it is
The LVM is shorthand for Logical Volume Manager (Logical Volume management), a mechanism for managing disk partitions in a Linux environment that is implemented by Heinz Mauelshagen on the Linux 2.4 kernel. The latest version is: Stable version 1.0.5
Add WebDAV support for Nginx
In compiling nginx know there is a "–with-http_dav_module" of such a parameter, but really let me have to actually be used for this feature, say something surprisingly – solve the problem of cotton using Android phone
1 netstat-nlp to view the service that uses the port number2 process to find this port number3 Find the Process ID4 Kill it
How do I view the port number of a process?
NETSTAT-LNP | grep EXFTCP 0 0 0.0.0.0:9101 0.0.0.0:* LISTEN 5791/exfilter
Note:
Previously encountered cases (DNS server caught incorrectly, and will be overwritten!) )
Ubuntu 6.10 (Edgy) only catches the ADSL Modem DHCP server IP when dialing via PPP.Ubuntu 7.04 (feisty) The hateful Network-manager program will periodically
There are usually 4 ways to copy files between different Linux1.ftp2.samba Service3.sftp4.scp
The above three methods, are more cumbersome, here do not repeat. The simplest approach is the SCP, which can be understood as the CP command under the
Method one, compile installation OpenSSL
2.1. Preparation work
System version: Ubuntu-10.10-server-i386Update Source: Apt-get updateUpgrade Software: Apt-get upgradeUpdate system: Apt-get Dist-upgrade
2.2, view OpenSSL version
Some Linux systems
DescriptionComputer room to do network transformation, need to replace the original internal and external network switch. The server is just the few cabinets that are replacing the switch. Replace the front room to ask us if we have to do mac
Method One, filter some IP access to this server
To shut down an IP, use this command:
The code is as follows
Copy Code
Iptables-i input-s ***.***.***.***-j DROP
To unlock an IP, use the following command:
Clear temporary filesYou can use the trap command to capture signals. The trap capture signals in shell are equivalent to signal or sigaction in C language or most other languages.One of the most common scenarios of trap is to clear temporary files
Note:Use the yum command in CentOS to install the httpd version by default. It is no problem to directly install the Apache version of the server security dog.However, if Apache is a custom path and the module is added for compilation and
Top. sls is the entry file for configuration management. Everything starts from here. On the master host, it is stored in the/srv/salt/directory by default. top. by default, sls will start parsing and executing from the base tag. The next level is
I. Linux search command overviewThere are five Linux search commands:Which: searches for the location of a system command in the PATH specified by the PATH variable and returns the first search result;Type: used to identify whether a command is
1. List the usernames of all logged-on users on the current system. Only one user logon is displayed.[Root @ localhost ~] # WhoRoot tty1Root pts/0 2016-08-26 05:09 (172.16.16.201)User1 pts/1 2016-08-26 05:11 (172.16.16.201)[Root @ localhost ~] # Who
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service