Linux Learning: Common commands

1 , Avira processA, viewPs-ef |grep name, here in Java for examplePs-ef |grep Java650) this.width=650; "src=" Https://s1.51cto.com/wyfs02/M02/8E/C1/wKiom1jKVmWz9VQIAAAQJsLapqk391.png "title=" 1111. PNG "alt=" Wkiom1jkvmwz9vqiaaaqjslapqk391.png "/>B,

Linux Fundamentals 2

Job One:1) Merge user information database files and group information database files vertically into one file/1.txt (overwrite)Cat/etc/passwd/etc/group >/1.txt2) Merge user information database files and user password database files vertically into

Linux implements disk quotas

Disk quotas are used to limit the maximum amount of space a user can use on a disk partition, or how many files are created within a partition, and are controlled based on partitions. is the control file owner (UID).To enable the disk quotas option,

Linux Basic Operations Command-Package compression

Merge user information database files and group information database files vertically into one file/1.txt (overwrite)Merge user information database files and user password database files vertically into one file/2.txt (append)Package/1.txt,/2.txt

One Linux command per day 7

Common Yum Commands1) query Yum list# for a list of all available packagesYum Search Keyword # searches all and keyword-related packages on the server2) Installing Yum-y Install package nameOptions:Install installation-Y Auto Answer Yes3) Upgrade

Using Nginx for load balancing under Linux

Using Nginx for load balancing under LinuxPrerequisites:1. Install the JDK.2. Install Tomcat and Nginx (refer to my first two articles)After satisfying the precondition, we should use Nginx to realize load balance, mainly by configuring Nginx

Linux Dual NIC Bindings

1. Create a virtual NIC as a configuration file to bind the network port/ETC/SYSCONFIG/NETWORK-SCRIPTS/IFCFG-BOND0The configuration content is as follows:#cat/etc/sysconfig/network-scripts/ifcfg-bond0Device=bond0

Multiple ways to take IP addresses from Linux

For many Linux beginners, there are many basic interview, you may encounter the need to extract the IP address of the problem, below I summed up a number of methods to take IP addresses, I hope you can learn the knowledgeFor example, I need to

Linux dynamic Lib

1 // Test1.h 2 int Ten ; 3 struct AA 4 {5 int B: 6 };AA b (5,6); 7 int Ball ();1 //Test1.cpp2# include"Test1.h"3 4 //The following line was invalid for it would not executed (if it's initialization of a VAR, it's valid)5 //a = one;6 7 intBall ()8

Linux NIC Configuration

device=Physical Device Name Ipaddr=ip Address netmask= Mask Value network= Network Addressbroadcast= Broadcast Address gateway= Gateway addressType=ethernet (Network Type)Onboot=[yes|no] (whether the device is activated at boot

Introduction to Linux instruction format

Why do I need to introduce the instruction formatIn the learning and application of Linux, it is often necessary to enter commands in command line mode. Many books directly introduce the application of various directives, and do not speak the format

The Linux command ls

LS: Displays the contents of the current directory-A: Displays all files, including "." Start of hidden files-A: Display except "." and ".." All files except the-L: Show details of a file or directory-I: Displays the index number of the file-D:

Linux Basic Command Job three

Linux Basic Command Job threeJob One:1) Merge user information database files and group information database files vertically into one file/1.txt (overwrite)2) Merge user information database files and user password database files vertically into

Centos7 uses docker to deploy the gitlab-ce-zh application, and dockergitlab-ce-zh

Centos7 uses docker to deploy the gitlab-ce-zh application, and dockergitlab-ce-zh 1. Image pulling in China is slow, so DaoCloud source is used here. # curl -sSL https://get.daocloud.io/daotools/set_mirror.sh | sh -s http://43049fd0.m.daocloud.io  

A little white's path to attack-the beginning of Linux and the beginning of linux

A little white's path to attack-the beginning of Linux and the beginning of linuxThe Penguin with his WAF half covered The first time I came into contact with Linux, I saw an article about Apple's operating system. At that time, Unix and Linux were

Summary of Common commands in Linux and summary of Common commands in linux

Summary of Common commands in Linux and summary of Common commands in linux1. The most critical command ManEcho2. directory file operation commands Ls: view the file information or file information in the directoryDir:Pwd: print the current pathCd:

Common commands for file systems and Common commands for files

Common commands for file systems and Common commands for files Common file system commands: df, du, fsck, dumpe2fs1. view the command df in the file system[User1 @ localhost ~] $ Df [Option] [mount point]Option:-A displays all file system

Configure the local yum source and centosyum source in centos

Configure the local yum source and centosyum source in centos 1: 1: attach a CD image[Root @ centos ~] # Mkdir/mnt/cdrom[Root @ centos ~] # Mount/dev/cdrom/mnt/cdrom/Mount: block device/dev/sr0 is write-protected, mounting read-only 2: cd/etc/yum.

Mongodb ~ Deployment in Linux environment, mongodblinux

Mongodb ~ Deployment in Linux environment, mongodblinux   Mongodb, a document-type non-relational database, can be said to be the most relational database. Previously, my uncle talked about how to use mongodb, rather than how to deploy and install

One Linux Command 9 every day and one Linux Command

One Linux Command 9 every day and one Linux Command Common Linux commands: Compression command: gzip unzip command: gunzip Compression command: zip decompression command: unzip Compression command: bzip2 decompression command: bunzip2 Compressed and

Total Pages: 5467 1 .... 4995 4996 4997 4998 4999 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.