The Linux default security level is 0, and if you raise it to 1, you can improve the security of the system to some extent. Security level
When 1, it disables the modification of the immutable and append-only bits of the files in the EX2FS system,
Linux command set command verb brief description CD directory goes to the specified directory CD. Go to directory cd/directory Access directory CD Enter the user's own directory CP file_from file_to copy File ln [s] source linkname for a file link
Currently Linux operating system is very hot, so many friends want to know about Linux under the virtual domain name implementation process. The following is based on the current more popular Redhat to discuss. First, DNS server settings
We know
Linux itself can act as a proxy firewall by adding socket packages, and it's all free.
What is a proxy firewall
The proxy firewall does not allow any direct network to flow through it as between the Internet and internal network
A. Install boot iSCSI target under Linux
1. Install Start iSCSI Service[root@wjb10000 ~]# yum-y Install Targetcli.noarch
2. Set up a directory as an iSCSI device[root@wjb10000 ~]# Mkdir/iscsi_disks
3. Set Target
[root@wjb10000 ~]# targetcli
Accidentally installed a Redis service, opened a full network of the default port, the first thought that this server does not have public network IP, the results found regret Mo and AH
One day found that the CPU load is unusually high, found a
For some reason, need to change a VPS, so need to transfer files for the server. But when I was in the original server to pack the things, the problem comes, the package is not half, the hint server space is insufficient! This last time because the
In Linux under the software development of friends, few do not know strings command. Let's take a look at man strings first:
Prints the printable characters in the file. Let me add, this file can be a text file (test.c), executable
One, under the Linux
Deleting these directories is simple, and commands are as follows
Find. -type d-name ". SVN" |xargs RM-RF
Or
Find. -type d-iname ". SVN"-exec rm-rf {} \;
ii. under Windows, use the following:
1, in the project peer
How to log into the console of the network station?
.
Special Note: This site all reproduced articles do not represent the views of the site, the site provides photographic photos, illustrations, design works, if necessary, please contact the
So all use Linux host, I will define a 301 redirect to facilitate SEO. Yesterday, as usual htaccess uploaded to the server, did not expect to post the site can not be accessed, a delete will return to normal. Read a lot of code, also did not find
This article describes the Linux grep command, as follows:
1. Role
The grep command in a Linux system is a powerful text search tool that uses regular expressions to search for text and print matching rows. The grep full name is global Regular
Webbench is a very simple stress testing tool, webbench can simulate up to 30,000 concurrent connections to test the load capacity of the site.(1) Webbench installation
Copy Code code as follows:
wget
In this section we will show you how to install Node.js on Windows and Linux.
This installation tutorial takes the Node.js v0.10.26 version as an example.
Node.js installation package and the source code download address:
Node.js is built on Google's V8 JavaScript engine server-side software platform. Node.js is already the preferred option in JavaScript for building high-performance server-side applications. What makes it so popular to develop server backgrounds
In the previous tutorial (http://www.jb51.net/article/97357.htm), we have created a Virtual PC in VMware Virtual machine management software, but have not yet installed the Linux operating system. Here, we continue to explain how to install the
View and modify directory file permissions under Linux
There are several folders under my server
You can also use Ls-l to view the permissions for these several files.
Look at the assets file, which has a total of 10 digits, of which:The front
Today has the same knowledge how to batch change file suffix name in Linux, this question was asked three times, so here are a few solutions
A. Rename Solution
1. The Ubuntu system
Rename ' s//.c//.h/'./*
Change the file with the suffix
Timer Timer application Scenarios are very wide, under Linux, there are several ways:
1, using sleep () and Usleep ()
Sleep accuracy is 1 seconds, usleep precision is 1 subtle, the specific code is not written. The disadvantage of using this
Here's a few commands for Linux to clean up, there are: Hibernate, suspend, standby, shutdown and so on several commands of the difference and how to achieve.
hibernation is a more power-saving mode that stores data in memory on a hard disk and all
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service