Get to know two files first/etc/passwd/etc/shadowWe print out three lines to understand the following:Each line consists of: Split into 7 segments, each paragraph meaning:First paragraph: User name, such as root user, ordinary user test,lv,test1The
1. Update the software Source:To modify the Sources.list file:Vim/etc/apt/sources.list or Leafpad/etc/apt/sources.listThen choose to add the following sources:Deb Http://mirrors.tuna.tsinghua.edu.cn/kali kali-rolling main contrib Non-freeDEB-SRC
UseLinuxcommand to generate random passwords is a basicLinuxoperation function, and there are many forms of implementation, the specific use of the following:1. generate random passwords using OpenSSLThe specific usage is as follows:OpenSSL
1. Basic system architecture of logs in Linux 7Processes and operating system cores when events occur, the events are recorded accordingly; RHEL7 Two services are responsible for the processing of logs;Journald can collect relevant log
My knowledge is not deep, the following content is on-line harvesting for future use.
Signal
Signal Detail Description
Concise Description
processing Mode
1) SIGHUP
This signal is issued at the
Common directivesls???? show files or directories???-l????? List file details L (list)???? to list all files and directories under the current directory, including Hidden A (all)Mkdir???? Create a Directory???-P????? Create directory, if no parent
Original: http://www.cnblogs.com/fnlingnzb-learner/p/5831284.html Thank you.I've been working with Linux lately, and I've had to buy a bird's-brother's book to look at, and it feels good. I think Linux is more troublesome than Windows is a lot of
ssh is a kind of secure channel protocol, which is mainly used to realize the functions of remote login and long-distance copying of character interface. The SSH protocol encrypts the data transmitted by both parties, including the user password
The first method:(1) Log in as root, run the Setup command into the text mode Setup utiliy Configure the network, where IP, subnet mask, default gateway, DNS settings can be made.(2) The configuration of the network card is not in effect, run/etc/rc.
A sudden increase in the Linux root directoryFirst through the Zabbix monitoring and troubleshooting, hard disk increase is sudden increase, or continuous growth caused by the alarmThe first to find the most recent changes to the directory with the
Linux Installation and learning one, VirtualBox and Ubuntu installationDownload the VirtualBox 5.2.6 and Ubuntu 16.04.3 in accordance with the steps given by the teacher.Follow the step by step installation, there are problems with the Ubuntu
Modify the Host Name and Centos Host Name
Centos configuration Host Name:
1. First query the current host name
[Root @ localhost ~] # Hostnamectl status Static hostname: ****** // permanent host name Pretty hostname: [*******] // temporary host
Customized embedded Linux release
The popularity of cheap Iot board means that it will not only control applications, but also control the entire software platform. So how to build a custom release for a cross-compiled application for a specific
Linux iftop installation and parameter explanation, iftop parameter explanation
Introduction
Iftop is a real-time traffic monitoring tool that monitors TCP/IP connections. Its disadvantage is that it has no report function. It must be root.
Install
WEB architecture in-depth Optimization of Linux O & m php and linuxweb
In-depth Optimization of WEB architecture PHP
I. PHP engine cache acceleration and optimization (4 types)
1. eAccelerator
2. XCache
3. APC
4. Zend
2. Use tmpfs as the cache
On CentOS 7, how does one deploy Google BBR [handling, turning over] And centosbbr?
How to deploy Google BBR on CentOS 7
This article carries from https://www.vultr.com/docs/how-to-deploy-google-bbr-on-centos-7
[Note: The kernel version used at the
Detailed description of libjpeg usage in Embedded Linux and libjpeg usage
1. The question is, what is libjpeg?
I certainly didn't know it at the beginning. Okay, So Baidu. Of course, I am not the first peach-picking person. Someone has already
Linux/etc/init. d/service script example, etcinit. d
1. Write the script and put it in the/etc/init. d/directory, and set the executable permission chmod + x scriptnamed.
2. The script contains several methods: start, stop, restart, and
ELK + filebeat log analysis system deployment document
Environment DescriptionArchitecture Description and architecture Diagram
Filebeat is deployed on the client to collect logs and send the collected logs to logstash.Logstash sends the collected
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service