FTP is currently the most commonly used to upload and download the file of the Protocol, because its communications content is not encrypted to consider its security and generated the SCP and SFPT agreements. We can also use FTPs (FTP over Ssl/tls)
"Du: View directory or File size"Du, English full name disk usage, which is used to calculate the size of a file or directory. If you do not specify any options, count the number of blocks occupied by recursively all subdirectories under the current
Generally speaking, zip is more general, whether under Windows or Linux, zip can be easily compressed and decompression.Here are two more commonly used compression commands and decompression commands.Compress
Zip Mypackge.zip-r/var/test/
A very serious security vulnerability (vulnerability reference https://access.redhat.com/security/cve/CVE-2014-6271) has been found in the Linux official built-in bash. Hackers can take advantage of this bash vulnerability to fully control the
Let's talk about the simple structure. Front end a nginx reverse proxy, backend a Nginx instance app for PHP ... is actually a discuz, before the CC attack is a warning script or take a CDN, but this time the attackers no longer hit traffic, but the
When using Mydumper, you need to enter the username and password in the command line, which is recorded in the history, which is relatively insecure.[Root@liufofu backup]# mydumper-h localhost-u root-p tiger-c-O./liufofu/-B LiufofuThere are 2 types
I use the putty, follow the operating procedures of this VPS, record these common commands
passwd: Modify Password
Cd:current Directory: access to catalogue;
Eg:cd/home into the home directory; CD/to root directory
Ls:list: Lists the current
DescriptionTheir own post Office server because of configuration problems, was brought to mass bulk spam. Now the egg hurts, send emails to Gmail or other mailboxes, will be sent back or directly in the bin. One complaint too troublesome, direct
Step One: Quick Start Linux Install SVN
The code is as follows
Copy Code
Installation: Apt-get Install Subversion (apt-get installation)Installation: Yum install Subversion (yum installation)
Whether the test
Linux logical volume snapshots and the use of SSMTheoretical part: Logical Volume Management (LVM) provides a snapshot of any logical volume in order to get a partitioned backup in a consistent state. Because during the backup process, The
rsync (remote synchronize) is a data synchronization tool that synchronizes files between local and remote hosts using the rsync algorithm.The advantage of rsync is that only two files are synchronized in different parts, the same parts are not
Depending on the options properties used in the Ifconfig command, the Ifconfig tool can be used to simply obtain network interface configuration information and modify these configurations.1. Command format:ifconfig [Network Devices] [parameters]2.
Vmstat command
Function descriptionThe Vmstat command can display the CPU usage, memory usage, and virtual memory exchange of the server including the IO read and write situation. Use the following:
Vmstat [Options] [delay
1 command format:CD [Directory name]2 command functionsToggle current directory to DirName3 Common examples3.1 Entering the system root directoryCD/3.2 Go to Parent directoryCd.. or CD. //3.3 Entering the current user home directoryThe current user
Use DNW to send programs to the Board under Linux. Includes driver code: SECBULK.C, Application code: DNW.C. Can only run on a 32-bit system and prompt for errors on 64-bit systems: DNW download Data size is too big.DNW Source code:#include #include#
Tag: Kill cal load requires Roo quote Ora loop oneWrote a monitoring load of a smallScript(Dead Cycle,TestKill the corresponding process after the end), because you need to monitor more than one server, so on a single server to
I. Check if your Linux machine has its own JDKJava-version check can be, if there is a need for the compilation of different versions, first uninstall, and then install the required version of the compilationJDK installation and configuration.(1)
CrondCrond is a daemon that is used to periodically perform certain tasks or wait for certain events under Linux, similar to Scheduled tasks under Windows, when the operating system is installed, the Service tool is installed by default and the
I. Status NoteCheck the system profile found that the "Control-alt-delete" Restart key combination is not disabled, and it is recommended to disable this key combination in the configuration file in order to prevent the computer from restarting due
DNS and BindSockets:C:Client: The program that initiated the application request;Server: A program that responds to a request (providing a service);Listen:socketTransport Layer Protocol: TCP, UDP, SCTPTcp:transmission Control
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service