Before installing Nginx, first install the compilation environment GCC and g++, and then use CentOS as an example to install Nginx, install nginx need Prce Library, zlib Library and SSL support, in addition to SSL outside the other we are to the
First, the principle analysis1. Description of the processProcess Control block pcb--task_struct, in order to manage processes, the kernel must have a clear description of each process, and the process descriptor provides the process information
"Linux kernel design and implementation" Chapter 3 reading notesProcess management is the heart of all operating systems.First, the process1. A process is a general term for the procedure in which it is implemented and the resources it contains.2. A
1. Check if the shadow has empty password users and other Super Administrator users:Awk-f: ' ($ = = "") {print $} '/etc/shadowawk-f: ' ($3==0) '/etc/passwd2. Lock out redundant self-built (test) accounts in the system and back upCAT/ETC/PASSWD && Cp/
these days busy recording work, inadvertently saw an article of Zhu Lao (Qian Guang), when he was a child, he liked to read his article, and now vaguely remember his article "Talk about reading." So write a summary of my idea of Linux operations! 650
First, install the virtual machine.Installing virtual machines can be consulted: Installing virtual machines on Windows detailed graphics tutorialII. Preparation of informationFirst prepare the installation image of Red Flag Linux. NET disk Download:
A directory is a file, a path mapping file; a path is a location (hierarchical) from a specified starting point to a destination.The path is divided into 2 types:Absolute path: Starting from the root, after subdirectories, double directories, files;
Label:TOMCAT7JVMPerformanceShare to:Source: http://www.iteye.comThis optimization is for Linux x86_x64 environments1. Tomcat optimization is actually optimized for Server.xml (account thread pool, adjust HTTP connector parameters)Search for
Some users when using Azure Linux virtual machine installation software, some software license and the current system's MAC address binding, then the Azure VM restart, Reszie (change size), stop and then boot, the virtual machine MAC address will
First of all, about Linux remote login, a lot of students know, but also basic use of tools to connect. This is only about the Xshell configuration method.As we all know, Xshell provides two kinds of authentication methods: Password Authentication,
Permissions for a file or directoryDirectory and file ownership: Read R, write W, perform x permissions.// 使用 ls -l命令查看当前目录的文件权限信息#ll-rw-r--r--1 root root 1612020:39 test.// test文件所有者拥有读写权限、所属组和其他用户拥有读权限drw-r--r--1 root root 2482321:03 downloadThe
Command suSyntax: su [-] usernameCan be followed with '-' can also not, ordinary users su username is to switch to the root user, of course, the root user can also su to ordinary users. '-' The function of this character is, plus will initialize
Thread-"signalSignal is an event that occurs when UNIX and Linux systems respond to certain conditions. The process that receives the signal takes some action accordingly.Raise generation represents the generation of a signalCatch capture indicates
RPM is the abbreviation for "Redhat package Manager", which can be guessed by name as Redhat company developed. RPM is a set of management programs that installs the packages you need into your Linux hosts in a database-logged way. In other words,
1 SED supports the substitution of variables in two ways, it is recommended to use the following second, relatively simpleThis allows the variable A to be assigned a number of special characters, such as Assignment a= '! @#¥% ... 'Sed-n ' s/echo/' "$
[System O & M] -- Precautions for uploading test code to linux servers
Putty.exe
-- Is a Telnet, SSH, rlogin, pure TCP, and serial interface connection software. It is mainly used to connect to linux, execute linux commands, and restart
[System O & M] -- Precautions for uploading test code to linux servers
Putty.exe
-- Is a Telnet, SSH, rlogin, pure TCP, and serial interface connection software. It is mainly used to connect to linux, execute linux commands, and restart
Linux Study Notes-common shortcut keys in the command line
This section describes several common shortcut keys in Linux Bash Shell.
Delete shortcut keys:
"Ctrl + k" delete all characters after the cursor "ctrl + u" delete all characters before the
Disable firewall in CentOS 7.0
CentOS 7.0 uses firewall as the firewall by default. You must reset it when using iptables.
1. Directly disable the Firewall
Systemctl stop firewalld. service # stop firewall
Systemctl disable firewalld. service #
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service