tutorial on the use of PS commands and GITPS commands in Linux systems

Ps PS [-aacdefhjlmnvwy][acefghlnrsstuvxx][-c ][-g [G [-T [U [--columns [--headers] [--help] [--INFO] [--lines [--group [--rows [--user [--width Parameter description: -a displays the processes performed under all terminals,

Linux installation of Apache detailed

bz2

Below is the complete code for installing Apache under Linux, the system is redhat5.5 Download httpd-2.2.6.tar.bz2 put httpd-2.2.6.tar.bz2 under/soft [root@localhost ~] #cd/soft [Root@localhost soft] #tar JXVF httpd-2.2.6.tar.bz2//decompression

The way Linux processes run on which CPU kernel

When you run a program that requires high-performance HPC (high performance computing) programs or very consuming network resources on a multi-core NUMA processor, cpu/memory Affinity is one of the most important factors that limit its performance.

How to make XP and Linux systems co-exist with each other

ini

How to make XP and Linux systems co-exist with each other I. Installation 1. First of all assume that you have installed Windows XP, and the partition format is FAT32; 2. Preparatory work prior to the installation of Redhat: use some

Summary of garbage cleaning methods for Linux systems

One of the biggest advantages of Linux is that it's still stable after a while. The biggest challenge for Linux is to install it and find and configure the software you need to complete your work. Once you have finished the task, it will almost run

Switching between Ubuntu graphics mode and Linux command line mode

This article describes the Linux graphics mode and Linux command line mode switching essentials. The following is a detailed description of this execution: CTRL+ALT+F2 command line mode CTRL+ALT+F7 Graphics mode I am installing the Ubuntu version,

How to clear the System log under Linux

The code is as follows: #!/bin/sh Cat/dev/null >/var/log/syslog Cat/dev/null >/var/adm/sylog Cat/dev/null >/var/log/wtmp Cat/dev/null >/var/log/maillog Cat/dev/null >/var/log/messages Cat/dev/null >/var/log/openwebmail.log Cat/dev/null >/var/

A detailed introduction to time conversion methods in Linux systems

Linux Time conversion methods: (1) date-d "Wednesday, December 17, 2008 17:27:22 CST" + "%s" This command converts the 17:27:22 CST to a timestamp on Wednesday, December 17, 2008 Results: 1229515680 (2) Convert time stamp 1123495443 to

Linux Remote Desktop Connection

We know that under Windows we can use Remote Desktop Connection to control other computers, But Linux Remote Desktop Connection? But before you say how to connect, you have to be clear about a concept, why my title is not used in Linux Remote

Linux Next network adapter configuration multiple IP

Linux next NIC How to configure multiple Ip?linux below if there is no graphical interface to configure the network is really not too convenient, oh, habit problems, of course, habits need to change, recently encountered a problem requires a single

Linux version of WPS: Linux domestic popularization further

In mid-February 2013, Jinshan Software released a Linux version of WPS, from the official screenshot and the author of the actual installation experience, the Linux version of WPS in the use of the custom and function and the Windows version of WPS

Aliyun Linux Server Modify root admin password tutorial

Aliyun Mainframe has been a very good choice for the domestic small webmaster, not only the technology is mature and the quality of the network is very good, let's look at the Aliyun Linux server to modify the root management password method, I hope

Linux system partitioning methods experience sharing and advice

Linux partitioning method, different people have different methods, anyway, there is no uniform method. In terms of zoning, I think it is best to score according to my own actual situation. I have been playing Linux for several years, and I have

How Linux prevents access to specific IP addresses

Linux system, if you need to prohibit specific IP address access to ensure the security of the system, simply through the operation of Iptalbes to achieve, the following small set to introduce how Linux to prohibit an IP address access, interested

Linux each version root local password crack

A Redhat/centos/fedora System Password cracking 1. Enter edit mode by E in the Grub options menu 2. Edit kernel the line last plus s (or single) 3. Press B, start to Single-user mode 4. After entering, execute the following command # MOUNT-T

Linux under SpamAssassin Configuration

SpamAssassin is a mail filter that is installed on a mail server host to identify junk letters. It uses a large number of preset rules to check spam, which checks the headers, texts, and messengers of all messages sent to the domain. The way he uses

Linux Common Search command

1. Find find is the most common and powerful search command you can use to locate any file you're looking for. The Find command makes it easy to locate the specific file you need in the use and management of Linux systems. The use format of find

How Linux uses Inode to delete files

The inode of the file defines the size of the file, the characteristics of all files, and so on. Each file and directory has its own unique inode number. But why use Inode to delete files, instead of using the usual RM-RF command? The reason is if

Linux system installation diagram tutorial and uninstall repair

Many friends asked me how to install Linux system, Linux installation need to pay attention to what problems, how to properly uninstall the Linux system, the author here collected a Linux installation graphics and text tutorial, Take the red Flag

Linux under/etc/sysconfig/network-scripts/ifcfg-ethn file configuration

The configuration file for the system network device is saved under the "/etc/sysconfig/network-scripts" directory, Ifcfg-eth0 contains configuration information for the first network card, IFCFG-ETH1 configuration information that contains the

Total Pages: 5467 1 .... 1671 1672 1673 1674 1675 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.