The basic method of killing zombie process in Linux system

In a UNIX system, a process ends, but his parent process does not wait (call Wait/waitpid) him, then he will become a zombie process. In the fork ()/execve () procedure, when the parent process is still present at the end of the child process, and

Solution to Linux micro-trust public platform web version of audio can not play the way

Someone has found an interesting problem with the Linux system, which is that the audio files cannot be played on the web version of the micro-trust public platform. This means that there is no way to listen to the language messages from the other

A tutorial on the use of network data storage Tools command tcpdump in Linux systems

A powerful network data acquisition and Analysis tool in Linux--tcpdumpTcpdump takes the command line, and its command format is:tcpdump [-ADEFLNNOPQSTVX] [-C Quantity] [-f filename][-I Network interface] [-R FileName] [-S Snaplen][-T type] [-W

Common SSH Utility commands in Linux

Common SSH Utility Commands 1. Statistics of current directory filesFind. -type F-print |wc-l2. Packing and compressingCompressed TAR-CJVF xxxx.tar.bz2 xxxx (folder)Extract Tar Xvjf xxxx.tar.bz23. Foldercd[Directory name] conversion pathCd.. Return

Example of XenServer data recovery and restoration under Linux

Last night encountered a very depressing problem, XenServer machine XAPI can not start, all XE commands can not be executed, the only way to access only SSH, the problem is that there are many virtual machines on this machine is running, try a lot

A detailed explanation of the usage settings of Linux umask commands

Security mechanism of the system: Umask (Filter code) Use the Umask command to view the value of the current userFor the average user speaking umask:0002For administrators umask:0022 So when When the administrator creates the folder, it is

Direct mount/Uninstall of LVM partition tutorial in Linux

The LVM is shorthand for Logical Volume Manager (Logical Volume management), a mechanism for managing disk partitions in a Linux environment that is implemented by Heinz Mauelshagen on the Linux 2.4 kernel. The latest version is: Stable version 1.0.5

Add WebDAV support for Nginx under Linux

Add WebDAV support for Nginx In compiling nginx know there is a "–with-http_dav_module" of such a parameter, but really let me have to actually be used for this feature, say something surprisingly – solve the problem of cotton using Android phone

Linux view process port number, process ID

1 netstat-nlp to view the service that uses the port number2 process to find this port number3 Find the Process ID4 Kill it How do I view the port number of a process? NETSTAT-LNP | grep EXFTCP 0 0 0.0.0.0:9101 0.0.0.0:* LISTEN 5791/exfilter Note:

/etc/resolv.conf often automatically rewrite solutions in Linux

Previously encountered cases (DNS server caught incorrectly, and will be overwritten!) ) Ubuntu 6.10 (Edgy) only catches the ADSL Modem DHCP server IP when dialing via PPP.Ubuntu 7.04 (feisty) The hateful Network-manager program will periodically

The easiest way to transfer files between Linux two servers

There are usually 4 ways to copy files between different Linux1.ftp2.samba Service3.sftp4.scp The above three methods, are more cumbersome, here do not repeat. The simplest approach is the SCP, which can be understood as the CP command under the

Linux system installation OpenSSL two ways

Method one, compile installation OpenSSL 2.1. Preparation work System version: Ubuntu-10.10-server-i386Update Source: Apt-get updateUpgrade Software: Apt-get upgradeUpdate system: Apt-get Dist-upgrade 2.2, view OpenSSL version Some Linux systems

Linux view static ARP address binding or ARP attack IP address

DescriptionComputer room to do network transformation, need to replace the original internal and external network switch. The server is just the few cabinets that are replacing the switch. Replace the front room to ask us if we have to do mac

Linux firewall iptables prohibit certain IP access

Method One, filter some IP access to this server To shut down an IP, use this command: The code is as follows Copy Code Iptables-i input-s ***.***.***.***-j DROP To unlock an IP, use the following command:

In linux, Bash uses trap to process signals.

Clear temporary filesYou can use the trap command to capture signals. The trap capture signals in shell are equivalent to signal or sigaction in C language or most other languages.One of the most common scenarios of trap is to clear temporary files

Install Apache for Linux server dongle

Note:Use the yum command in CentOS to install the httpd version by default. It is no problem to directly install the Apache version of the server security dog.However, if Apache is a custom path and the module is added for compilation and

Install apache services in batches using salt in linux

fpm

Top. sls is the entry file for configuration management. Everything starts from here. On the master host, it is stored in the/srv/salt/directory by default. top. by default, sls will start parsing and executing from the base tag. The next level is

Detailed explanation of the five search commands for Linux files

I. Linux search command overviewThere are five Linux search commands:Which: searches for the location of a system command in the PATH specified by the PATH variable and returns the first search result;Type: used to identify whether a command is

Linux text processing commands, user and group command exercises

1. List the usernames of all logged-on users on the current system. Only one user logon is displayed.[Root @ localhost ~] # WhoRoot tty1Root pts/0 2016-08-26 05:09 (172.16.16.201)User1 pts/1 2016-08-26 05:11 (172.16.16.201)[Root @ localhost ~] # Who

Total Pages: 5467 1 .... 1499 1500 1501 1502 1503 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.