Compression format:GZ, bz2, XZ, zip, Z.Gzip:
Role
Compress the file. The source file is deleted when the compression is complete.Gzip/path/to/somefile.
Options
-D: Unzip the file.-num:1-9, specify the compression
Linux Common CommandsCD command, enter the specified path example: Cd/home Enter home path CD. /test Enter the parent directory under the test path . Represents the current directory /represents the root directory .. On behalf of the parent
The Vmstat command is the most common Linux/unix monitoring tool that can show the status of a server at a given time interval, including server CPU utilization, memory usage, virtual memory exchange, IO Read and write situations.The use of the
We learned more about the view find help command in the previous section, find the Class command in the Which,find is what we must grasp, see the Class command cat,head,tail is what I must master, as for the help command we know the simple use of
" Linux System Kernel Analysis "experimental report 1By compiling a simple C program, analyze the assembly code to understand how the computer worksZhang + Original works reproduced please specify the source + "Linux kernel analysis" MOOC course
von Neumann architectureCore Ideas1. Von Neumann is: The digital computer system is binary; the computer should be executed in the order of the program.2. The binary system is used as the basis of computer numerical calculation, and 0 and 1
1. Explanation of top command and Vmstat commandThe top command is a real-time monitoring of the current system's overall process state and the process state of each program, Vmstat can show the status of the server at a given time interval,
This cron cannot be executed: * * * * * */bin/echo '/bin/date + "%y-%m-%d-%t" ' >>/home/adminuser/test.txt 2>&1 need to be modified to: because% is required in cron To be transferred */1 * * * */bin/echo/bin/date + "\%y-\%m-\%d-\%t"
For the OSI seven layer model, TCP five layer model, TCP three handshake, HTTP protocol, DNS parsing and other related network basics please refer to my blog: http://www.cnblogs.com/wxisme/p/4699049.htmlthe port used by the TCP protocol, 0-65535,1-10
10.Linux command ExplanationCourse Requirements:1. Learn about the use of common commands for Linux systems.Laboratory Equipment:Software:1. A VMware virtual machine with RHEL6 installed.Hardware:1.PC Machine one set.Background knowledge:1.
Use glances on linuxtable of Contents
1. Why use Glances
2. Install
2.1. Install on Ubuntu
2.2. Install on Centos
2.3. Watch version
3. Statistical indicators
3.1. CPU
3.1.1.
Before we learn to develop Linux , we have to build a good environment for compiling and developing. But because of the environment and the choice of tools, everyone's habits and hobbies are different, so this article I will post some necessary
How to view the current system version under Linux:Uname-rFunction Description: Uname is used to obtain information about the computer and the operating system.Syntax: uname [-amnrsvpio][--help][--version]Supplemental Note: uname can display basic
Knowledge that OPS personnel need to know:1, understand the history of the operating system and Linux system2. Understanding Linux Distributions3, Linux Basic instructions to use the introduction: Man, LS, CD, RM, Mount, INIT, such as nearly hundred
LS/down a few common files:650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/7A/8B/wKioL1arcCCAhzO3AAAeMb_ahlk827.gif "title=" 1.gif " alt= "Wkiol1arcccahzo3aaaemb_ahlk827.gif"/>/ Boot: System boot related files, such as kernel, INITRD, and
Here are some of the issues that are encountered with the two-system installation of CentOS and Windows7One, disk partitioningThis has to say in Windows under the pit Dad set up, if the default disk partition, the system will first draw a 100M or so
Use ssh to log on to the server, and use ssh to log on to the server
1. What is SSH?
To put it simply, SSH is a network protocol used for encrypted login between computers.
If a user logs on to another remote computer from a local computer using the
Detailed description of the mount command in linux and detailed description of the mount command
In linux, you can use the mount command to mount the disk image file, mobile hard disk, USB flash disk, Windows network sharing, and unix nfs network
SolrCloud-5.2.1 cluster deployment and Testing
I. Description
Solr5 has built-in Jetty service, so you do not need to install and deploy Tomcat. The information on deploying Tomcat on the internet is too extensive.
Preparations before deployment:
1.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service