Linux Configuration SSH Mutual trustThe basic idea of public key authentication:The encryption and decryption of information using different keys, the key is called private key and public key, where public key is stored on the server to log on, and
Environment variables
1. System-Level
/etc/profile: This file is the first file that is used by the operating system to customize the user environment when the user logs on, and applies to every user who logs on to the system.
Tag: Format color boot automatically mount style linu mkfs operation swap partition MkswapLinux Disk partitioning command steps:FDISK command:(Note: The swap partition does not need to be mounted, DF–LH view the partition mount, free and swapon-s to
Combine the alias and read usage methods. The ability to save some scripts that will be deferred, or bare data (strings not extended) into a variable. For later use.$ alias begin= ' read-d "" $ ls-la> end$ eval $block 1total 10drwxr-xr-x 1
1.ip Basic Knowledge1.ipv42- in -place ----- decimal System172.25.0.10/255.255.255.0172.25.0.10:IP address255.255.255.0: Subnet maskThe IP bit corresponding to the subnet mask 255 bit is the network bitSubnet Mask 0 corresponds to the IP bit master
The concept of Linux librariesA library is a software-building technique that encapsulates data and functions that are made available to user program calls. Using the library can make the program modularization, improve the speed of compiling,
Before learning Linux, teaching learning is the basis of computerBetween CPU and storageOperating system (kernel: Kernel is responsible for managing hardware resources, and virtual hardware resources into other, provided to the top of the
Linux Symbolic Summary simple and easy to use and efficient; Delimiter for multiple commands/root or Road strength separator> Standard output redirection (data flow in the direction of the arrow), overwriting the original file>> Chase Emphasis (data
This time chose to use virtual box to build CentOS as a server, the host is Mac OSAfter the first step after the installation of network 1, virtual function ping outside the network, can ping host 2, the host can ping the virtual machineFirst set
One, view the Linux kernel version command (two methods):1, Cat/proc/version
[Email protected] ~]# cat/proc/versionLinux version 2.6.18-194.8.1.el5.centos.plus ([email protected]) (GCC version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP We D
#!/bin/sh#send hosts to all nodeIplist= (10.130.2.2110.130.2.2210.130.2.4010.130.2.4110.130.2.4210.130.2.4310.130.2.4410.130.2.4510.130.2.4910.130.2.5010.130.2.5110.130.2.5310.130.2.5410.130.2.5510.130.2.5610.130.2.5710.130.2.5810.130.2.5910.130.2.60
Linux often uses a command, such as make && do install, which can also be used here; Make install, then execute the command in Linux; What's the difference between &&?Multiple commands are executed at the same time, and we deal with them by multiple
**du (disk usage), as the name implies, view the size of the directory/file footprint * *1. View the size of all directories and subdirectories in the current directoryDu-hDu-ah#-h: Using the human form of K, M and G to display#-a: Displaying
Temporarily modify IPEnter the command in Linux: ifconfig eth0 192.168.1.1 netmask 255.255.255.0 EnterHere the 192.168.1.1 is the temporary ip,netmask is the subnet mask, this temporary IP will be changed after you restart the network card to the
Recursive document capturing technique for wget instruction learning and wget Recursion
When reading documents online, do you want to crawl the documents to a local machine for reading when there is no network?
Run the following command first:
$
My experience in Linux after I graduated from collegeI have been graduating for almost half a year with my fingers tied. I 've been wandering around the outsourcing circle for some reason in the past six months. I'm lucky enough to leave early to do
Six file-related instances in LinuxGuideThe FILE command is used to identify the FILE type and identify the encoding format of some files. It obtains the file type by viewing the file header information, rather than determining the file type through
In the production environment, nginx implements both web services and reverse proxy, and nginxweb
I. My thoughts on the first entry into the blog Park
As we all know, nginx is a high-performance HTTP and reverse proxy server. In previous work,
How to build a yum warehouse and a customized rpm package to build a yum warehouse rpm
When we deploy clusters in auto-renewal mode and want to install all services quickly, we need to first build a yum repository and customize the rpm package.
Precautions for linux delete commands (not to mention)
When doing a soft connection, I think of a problem. If I delete the soft connection, will I delete the source file.
If the delete operation is true, you will regret it if the operation is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service