Linux Basic Operation 6 Search under Linux system

1 which The 1 which command is a file used to find executable programs, using the which file name 2, like my home directory. Create a file name of TMP, and then I which TMP so that we can't find it 3 but if we direct which passwd, then we will

Tips for sending emails regularly under Linux operating systems

Sometimes you need to tell someone or do something for yourself, and for some people who read emails every day, it's safest to send a message. This is easy to do with the at in conjunction with Mail under Linux. The AT command can run a program at

Introduction to the meaning of file attributes in Linux operating systems

The first attribute represents the file as "directory, file or link file, and so on": When [d] is a directory, such as line 11th of the table above; When a [-] is a file, for example, line 5th of the table above; If [l] is a link file; In the

Zabbix Add monitor Host (Linux) and Chinese

The first two days of the study of the "Zabbix Server Installation" and "Zabbix Linux Client Installation", the successful addition of the monitoring host today, the process is as follows: After Web Login The default is English, just like I do.

Implementing the Echo program based on multithreading under Linux

Ready to start writing some Linux network programming and multithreading blog, starting from this simple echo program. Using multiple threads to communicate with customers on the service side of ECHO enables a server-side program to simultaneously

Introduction to likely and unlikely in Linux

The likely () and unlikely () are the two macros defined in the kernel (2.6 version should be available). Located in the/include/linux/compiler.h,The specific definition is as follows:#define LIKELY (x) __builtin_expect (!! (x), 1)#define UNLIKELY

Summary of the specified method for the search path of a dynamic library in Gnu/linux

Dynamic link time, search path order at execution time: 1. Use the dynamic library search path specified by-l when compiling the target code; 2. Environment variable LD_LIBRARY_PATH the specified dynamic library search path; 3. The dynamic

Use commands to view port occupancy in Gnu/linux

The first method: root@debian:/home/# netstat-ant Active Internet connections (servers and established) Proto recv-q send-q Local address Foreign TCP 0 0 127.0.0.1:25 0.0.0.0:* LISTEN TCP 0 0 0.0.0.0:33223 0.0.0.0:* LISTEN TCP 0 0 127.0.0.1:330

Introduction to the Linux sub-volume compression command

1. Use the TAR volume compression Format Tar Cvzf-filedir | Split-d-B 50m-filename Example: Tar Cvzf-/picture | Split-d-B 10m-picture package./picture and split into 10m packages The output file is filename00, FILENAME01, filename02 ... If

Methodology for playing Linux systems

Linus said "Just for fun", and I would say "Just for toss". To find out how I've been messing with Linux, see the screenshot below: From this screenshot I can see that I have 5 different distributions installed on my computer to "toss" the Linux

Tips for configuring PROFTP services under Linux systems

1. Configure FTP to allow root login Modify/etc/ftpusers, remove root 2, if you want to implement the root user ftp can switch to/directory The general user can only switch to their own home directory, modify the/etc/proftpd.conf file, in the

Build Yum server in Linux environment

Package Manager Yum (full name Yellow Dog Updater, Modified) is a shell front-end package manager in Fedora and Redhat as well as SuSE and CentOS. Based on the RPM package management, can automatically download the RPM package from the specified

Introduction to Linux disk quotas

What is disk quota Linux disk quota configuration One, what is disk quota Disk quotas are the amount of disk space that an administrator can use for a user, and each user can only use disk space within the maximum quota range. After you set up

How to write firewall scripts in Linux

Firewall scripting is actually a shell script, and the advantage of using shell scripts to set firewall policies is: Some necessary kernel modules can be loaded beforehand, and the environment parameters may be set up. Variables and flexible

Linux Learning Notes

1 Linux Development steps:2 3 1. Enter VI Hello.java4 2. Enter i[into insert mode]5 3. Enter esc[into command mode]6 4. Input: q!"Do not save direct exit": Wq "Exit and save"7 5. Enter LS-L "View detailed list"8 5. Compile javac Hello.java file9 6.

Linux Installation SSH Service

First check whether the SSHD service is enabledEnter the CentOS terminal input #ssh localhostIf prompted: Ssh:connect to host localhost port 22:connection refused errorNo need to worry about it, no starting sshd service for the sake ofInstall sshd

[APUE] process relationship (bottom) and apue process relationship

[APUE] process relationship (bottom) and apue process relationshipI. control terminal The dialog period and process group have some other features: A single control terminal can be provided during a conversation. Usually it is the terminal device

Centos7 network modification command

Centos7 network modification command 1. Modify the host name command # hostnamectl set-hostname localhostname 2. modify the configuration file/etc/hostname 3. IP address modification command # nm-connection-editor 4. direct command Modification

Modify centos7 firewall settings

Modify centos7 firewall settings1. configure the firewall and enable port 80 and port 3306 CentOS 7.0 uses firewall as the firewall by default. Here, it is changed to iptables firewall. 1. Disable firewall:Systemctl stop firewalld. service # stop

How to enter rescue mode in Centos6.8

How to enter rescue mode in Centos6.8 Version used: Centos6.8 What is the role of the rescue mode: ◆ You can change the root password; ◆ Recover disk and file system operations; ◆ When the system cannot be started, it can only be started in rescue

Total Pages: 5467 1 .... 5002 5003 5004 5005 5006 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.