1 which
The 1 which command is a file used to find executable programs, using the which file name
2, like my home directory. Create a file name of TMP, and then I which TMP so that we can't find it
3 but if we direct which passwd, then we will
Sometimes you need to tell someone or do something for yourself, and for some people who read emails every day, it's safest to send a message. This is easy to do with the at in conjunction with Mail under Linux.
The AT command can run a program at
The first attribute represents the file as "directory, file or link file, and so on":
When [d] is a directory, such as line 11th of the table above;
When a [-] is a file, for example, line 5th of the table above;
If [l] is a link file;
In the
The first two days of the study of the "Zabbix Server Installation" and "Zabbix Linux Client Installation", the successful addition of the monitoring host today, the process is as follows:
After Web Login The default is English, just like I do.
Ready to start writing some Linux network programming and multithreading blog, starting from this simple echo program.
Using multiple threads to communicate with customers on the service side of ECHO enables a server-side program to simultaneously
The likely () and unlikely () are the two macros defined in the kernel (2.6 version should be available). Located in the/include/linux/compiler.h,The specific definition is as follows:#define LIKELY (x) __builtin_expect (!! (x), 1)#define UNLIKELY
Dynamic link time, search path order at execution time:
1. Use the dynamic library search path specified by-l when compiling the target code;
2. Environment variable LD_LIBRARY_PATH the specified dynamic library search path;
3. The dynamic
The first method:
root@debian:/home/# netstat-ant
Active Internet connections (servers and established)
Proto recv-q send-q Local address Foreign
TCP 0 0 127.0.0.1:25 0.0.0.0:* LISTEN
TCP 0 0 0.0.0.0:33223 0.0.0.0:* LISTEN
TCP 0 0 127.0.0.1:330
1. Use the TAR volume compression
Format Tar Cvzf-filedir | Split-d-B 50m-filename
Example:
Tar Cvzf-/picture | Split-d-B 10m-picture
package./picture and split into 10m packages
The output file is filename00, FILENAME01, filename02 ...
If
Linus said "Just for fun", and I would say "Just for toss". To find out how I've been messing with Linux, see the screenshot below:
From this screenshot I can see that I have 5 different distributions installed on my computer to "toss" the Linux
1. Configure FTP to allow root login
Modify/etc/ftpusers, remove root
2, if you want to implement the root user ftp can switch to/directory
The general user can only switch to their own home directory, modify the/etc/proftpd.conf file, in the
Package Manager
Yum (full name Yellow Dog Updater, Modified) is a shell front-end package manager in Fedora and Redhat as well as SuSE and CentOS. Based on the RPM package management, can automatically download the RPM package from the specified
What is disk quota
Linux disk quota configuration
One, what is disk quota
Disk quotas are the amount of disk space that an administrator can use for a user, and each user can only use disk space within the maximum quota range. After you set up
Firewall scripting is actually a shell script, and the advantage of using shell scripts to set firewall policies is:
Some necessary kernel modules can be loaded beforehand, and the environment parameters may be set up.
Variables and flexible
1 Linux Development steps:2 3 1. Enter VI Hello.java4 2. Enter i[into insert mode]5 3. Enter esc[into command mode]6 4. Input: q!"Do not save direct exit": Wq "Exit and save"7 5. Enter LS-L "View detailed list"8 5. Compile javac Hello.java file9 6.
First check whether the SSHD service is enabledEnter the CentOS terminal input #ssh localhostIf prompted: Ssh:connect to host localhost port 22:connection refused errorNo need to worry about it, no starting sshd service for the sake ofInstall sshd
[APUE] process relationship (bottom) and apue process relationshipI. control terminal
The dialog period and process group have some other features:
A single control terminal can be provided during a conversation. Usually it is the terminal device
Modify centos7 firewall settings1. configure the firewall and enable port 80 and port 3306
CentOS 7.0 uses firewall as the firewall by default. Here, it is changed to iptables firewall.
1. Disable firewall:Systemctl stop firewalld. service # stop
How to enter rescue mode in Centos6.8
Version used: Centos6.8
What is the role of the rescue mode:
◆ You can change the root password;
◆ Recover disk and file system operations;
◆ When the system cannot be started, it can only be started in rescue
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service