/etc/profile: This file sets the environment information for each user of the system, and the file is executed the first time the user logs on.
and collects the shell's settings from the/ETC/PROFILE.D directory's configuration file.
/ETC/BASHRC:
1. Close sets the reference count of the descriptor down by one and closes the socket only when the count changes to 0 o'clock. and shutdown can trigger TCP's normal connection termination sequence, regardless of reference count
2. Close
By default:
Main thread + worker thread +
Contains the main thread and a worker threads, up to 255, that is, you can only generate 253 threads yourself.
It is said that you can set the number of threads:
It is said to be able to set, but I have
How do I do soft raid under Linux? Hope that the following introduction can help and inspire friends!
In the virtual machine system to add a 10g hard disk for SDB, the hard disk is divided into 5 logical disk is sdb{5,6,7,8,9}, each disk size is 1G.
1, run the command ifconfig view the current network card list, determine the name, if not in the list, may be the driver did not install good
% Ifconfig
Dc0:flags=8843 MTU 1500
inet 192.168.1.3 netmask 0xffffff00 broadcast 192.168.1.255
Ether 00:
This article briefly introduces the Kickstart and network installation features of Red Hat Linux to quickly and easily upgrade your Linux system, as in the case of a remote upgrade from Red Hat 7.2 to Red Hat 9.0. Since version 5.2, Red Hat LINUX
First, disk partition 1, if it is a new installation system, the disk partition should consider security: 1 root directory (/), User directory (/home), temporary directory (/tmp) and/var directory should be separated to different disk partitions;
2
Where do I get Linux? For easy discussion, I'll just talk about CD-ROM installation. So the first step is to get a Redhat 6.2 CD.
There are two ways to get a disc, one is to buy a CD-ROM, this is relatively simple, there are pirated discs outside,
In the process of simultaneous operation of the same file in multiple processes, it is easy to confuse the data in the file, requiring the lock operation to ensure the integrity of the data, the lock on the file described here is called "file
First, modify the/etc/profile file This method is recommended when this machine is used only as a development use, because all user's shell has the right to use these environment variables in this configuration, which may bring security problems to
Linux installation PyPy
The system you use is CentOS 7 (similar to the installation method of other Linux machines)
First download the PyPy RPM package.
Http://pkgs.org/search/?keyword=pypy
Download sequentially
pypy-libs-2.2.1-2.el7.x86_64.rpm
Os.cmd (CMD)
The OS module provides a CMD function to execute the Linux system Shell command (or to execute Windows commands). Returns the standard output string result of a cmd command. For example, executing os:cmd ("date") in a Linux system.
Generally directly packaged with the TAR command is very simple, direct use of TAR-ZCVF test.tar.gz test can be.
In many cases, we have to package a directory with dozens of subdirectories and subfolders, and we need to exclude 1, 2 directories, or
Linux commonly used in the shutdown commands are: Shutdown, halt, Poweroff, init, restart command: reboot. The following article mainly introduces some common shutdown commands and various shutdown commands between the differences and specific usage.
1, in the official website download Nodejs, choose the left.
2, select the file right click Extract here for decompression
3, into the bin directory, right click to select Properties, extract files can be placed in a system location. Copy the
My environment for FEDORA14, go has a variety of installation methods, I introduce here are two ways to install:
First, go source installation
Go uses mercurial for versioning, first you have to install mercurial before you can download it.
1.
First, Linux add users and give root permissions
1, add users, first with the AddUser command to add an ordinary user, the command is as follows:
#adduser Eric
//Add a user named Eric
#passwd eric//to modify the password
changing password
However, system administrators often fail to get information and make corrections in a timely manner, which gives hackers an opportunity to do so. More security issues are caused by improper configuration than with the vulnerabilities of these
. PROFTPD set up Hostuser/hostuser account, all users are mapped to this account.
Htdocs/hosts directory owner also for Hostuser
This allows the user to upload file properties of Hostuser (644 755) using FTP.
Locks the FTP user into its home
If there are hundreds of Web sites on the server, the names of the folders are randomly generated, which is even more depressing.
But don't be discouraged, there are ways to quickly locate the target. All we need is two Linux commands.
First, find a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service