Assigning user rights to a database on Linux

To give the database a user can only manipulate this database, two sentences will be OK.Grant all on the corresponding database. * to ' username ' to be created ' @ ' IP ' identified by ' password ' with GRANT option;The corresponding database. *:

Linux Soft and Hard links

1.Linux Link ConceptThere are two types of Linux links, one called hard links, and the other called Symbolic links (symbolic link). By default, the LN command produces a hard link."Hard Connect"A hard connection is a connection that is made through

Get Linux performance data

Import reImport OSImport SysImport JSONImport socketFrom Urllib import Request,parseImport UrllibFrom subprocess Import Pipe,popenClass SendData:def __init__ (self,ipaddr,serverhost,serverport=8000):""""""self.result={"System": "Linux", "Ip": ipaddr}

Some common operation commands under Linux

bz2

1, two server SSH free of authorization:Ssh-keygen-t RSA always return to the endSsh-copy-id-i/root/.ssh/id_rsa.pub Remote IP and enter the remote IP passwordYou don't have to verify your password for future visits.2. Compression and Decompression

Linux Server Setup related tutorials link collation

Linux:Linux Tutorials | Beginner's TutorialHow to add a user under Linux and give the user root access-!canfly-Blog ParkGit:Build a Git server under Linux-Huang-dee-Blog ParkGit Server gitosis Erection Guide-King_sundi's column-Blog

Linux Basic Knowledge day-7

NFS Services1) The NFS (Network File system) is a networked filesystem that allows sharing of resources across TCP/IP networks among computers in the network. NFS relies on the RPC protocol during file transfer or information transfer. RPC, remote

Get communication IP under Linux

#!/bin/SH# filename:get_net.SHDefault_route=$ (IP route show) Default_interface=$(Echo$default _route |sed-E's/^.*dev \ ([^]*\). *$/\1/'|Head-N1) Address=$ (IP addr Show label $default _interface Scope Global |awk '$ = = "Inet" {print $2,$4}') #ip

Linux Commands 12

Properties of the processProcess ID (PID): is the only numeric value used to differentiate processesParent process ID of the parent process (PPID)The user ID (UID) of the initiating process and the group to which it belongs (GID)Process state: State

Linux-sudo usage

SudoWhich hosts a user can perform with what other user's identityUseraddJerryUseradd AdminEnter Password: Jerry passwordsudo configuration file/etc/sudoersA sudo entry:Who which_hosts= (runas)

Linux Source command:

SOURCE command:The source command, also known as a Point command, is a dot symbol (.). The source command is typically used to re-execute the initialization file you just modified to take effect immediately without having to log off and log back

Linux basic four----Sanba&&nginx

A Samba1 Environment configuration:A. Ensure that the Linux firewall shuts down than or open shared directory permissions iptables-fB. Ensure setlinux shutdown:setenforce 0C. Configure IP2 installation package: Yum Install samba-y3 Modifying the

Linux Samba ing

I. Deployment of SAMBADeploy the environment to shut down the firewallConfigure IPInstall packagesStart the serviceEach user has its own directory, can browse content, or can deleteAll users share a directory, can only browse content, cannot

linux-Login Tool-(xshel,securecrt8.0)

Hello everyone, in the work, we manage the server and network equipment, are remote through telnet or SSH login. But Telnet security is too bad, so. Most companies use SSH to log on to their devices. But SSH is just a protocol. Working mode C/s

Linux Command Collation

1. TAILF Trace log fileCommon parametersFormat:Tailf-n logfileThe dynamic trace log file logfile, initially prints the last 10 lines of the file.InstanceTo view the log information from the countdown number of lines2. Tail trace log File/dynamic

Linux installation memcached

[Email protected] ~]# tar zxvf libevent-2.1.8-stable.tar.gz[Email protected] ~]# CD libevent-2.1.8-stable[Email protected] libevent-2.1.8-stable]# mkdir/home/libevent[Email protected] libevent-2.1.8-stable]#/configure--prefix=/home/libevent/[[email

Linux Operating System Basics (v)

Linux Network and RPM-installed Yum Source Configuration 1.Linux Network1. Use the Ifconfig command to maintain the network (see Linux System Management P422)1) function of the Fconfig command: Displays the details of all the network cards being

Linux common commands-jdk and tomcat

I. Installation and configuration of the JDK1. Download the JDK fileGo to the official website to download Linux 64-bit jdk-8u131-linux-x64.tar.gz2. Upload to/usr/local using the FTP tool.Use the command: TAR-ZXVF jdk-8u131-linux-x64.tar.gz for

Linux network Programming (3)-multi-process, multi-threaded

In my inside has introduced the Linux the following C's process, the thread interface, here does not do too much elaboration.Multi-processMany processes here use traditional multi-process models. Whenever a connection is made to a client, a process

After Centos7 is installed, the network cannot be connected. After centos7 is installed

After Centos7 is installed, you cannot connect to the Internet (switch to). After centos7 is installed   Centos 7 is successfully installed on the vmwarevm .. The vigorous routine yum update found that the centos system seems to have not been

Linux ~ THE Sh script is a summary of its own, and the linuxsh script

Linux ~ THE Sh script is a summary of its own, and the linuxsh script From. from the perspective of the netCore open-source project, eShopOnContainers is deployed across platforms. It can be deployed on linux, docker, and linux. It can also write

Total Pages: 5467 1 .... 4979 4980 4981 4982 4983 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.