Linux Basic notes--[020]--"Ext4 Quota"

First, close SELinux[[Email protected]6 home]# sestatus-vselinux Status: Disabled Example: temporary shutdown [[email protected]6 0 Example: permanently closed [[email protected]6vi /etc/selinux/configselinux= DisabledSecond, add

About Linux Soft Connect

I used to be confused about Linux soft connect with what only know is a shortcut similar to Linuxsudo ln-s/home/hadoop/bigdata/jdk1.7.0_79//usr/local/jdk (how to create a soft connection)This statement creates

Linux installation Coreseek

 Coreseek is a Chinese thesaurus plus a combination of sphinx.1. Download CoreseekDownload to the/USR/LOCAL/SRC directory filewget http://www.coreseek.cn/uploads/csft/4.0/coreseek-4.1-beta.tar.gz//download from Coreseek official websiteUnzip after

Linux deletes files before the specified date

Two methods:1. Keep files in a directory for the last three months, files deleted three months ago automatically. Find/email/v2_bak-mtime +92-type f-name *.mail[12]-exec rm-rf {} \; /email/v1_bak--Set the directory to find; -mtime +92-

Tomcat starts normally under Linux, but cannot be accessed by external browsers

This situation is usually caused by the system firewall Setup problem, this time encountered the system is CentOS 7.2, the firewall changed from iptables to firewall, so the command to stop the firewall should be:Systemctl Disable

Using the NMCLI command to create a network group on Linux

Network group: is a method of aggregating multiple network cards together to achieve redundancy and increase throughputNetwork group differs from legacy bonding technology for better performance and scalabilityThe network group is implemented by the

Linux Time Synchronization Service

1. Synchronize network time to System time ntpdate command[[Email protected] test1]# DateTue SEP 6 07:12:03 CST 2016[Email protected] test1]# ntpdate cn.pool.ntp.org6 Sep 09:18:23 ntpdate[13047]: Step time server 120.25.108.11 offset 7566.199829 sec[

Linux Learning Assignments-fifth week

1. Display the default shell of root, fedora or User1 user on the current system;#!/bin/bash#program#input username, then print USERBASH#2016/08/30 V0.0.1 Rex Frist #注明程序使用的shell, action, date, version Read-p " Please input your username.then,

Linux 5th Week Job

1. Display the default shell of root, fedora or User1 user on the current system;Grep-e "^root\>|^fedora\>|^user1\>"/etc/passwd | Cut-d:-f1,72. Find the line with a set of parentheses after a word in the/etc/rc.d/init.d/functions file, such as:

Linux off SELinux

First, view the current SELinux statusCommand line execution Getenforce 650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M02/86/E9/wKioL1fOjADCUozgAAAI5l9Eejw709.png "Styl E= "Float:none;" title= "9~6s485 ' 60wbu[zvm8_cbse.png" alt=

Protostar Series Linux PWN Exercises

From exploit-exercises.comThe difficulty is lower, mainly is the debugging and programming in the skilled Linux environment.Stack01#include 2#include 3#include 4 5 intMainintargcChar**argv)6 {7 volatile intmodified;8 Charbuffer[ -];9 TenModified

Linux Scheduled Tasks

1. System "Delay task" initiating command[[email protected] mnt]# at 11:03At> touch/mnt/file{1..10} # #要执行的命令At> # #任务发起Job 2 at Sat Nov 7 11:03:00 2015[Email protected] mnt]# At-l # #查看任务列表2 Sat Nov 7 11:03:00 a root[Email protected] mnt]# ATRM 2 #

Full exploration of Docker container Testing

Full exploration of Docker container TestingGuideAfter building a Docker image and combining multiple containers into an application, we established a continuous delivery channel and learned how to incorporate the newly created image into the

Why should Oracle abandon the non-profitable Java?

Why should Oracle abandon the non-profitable Java?GuideYou may have heard of similar news. Oracle quietly removed the funding and Developer support of a community technology, many consumers and business partners have invested a lot of time in this

Linux wget vulnerability: Can you pay attention to it.

Linux wget vulnerability: Can you pay attention to it.GuideRecently, foreign security researcher Dawid Golunski and SecuriTeam exposed GNU wget Vulnerability (CVE-2016-4971), June 9 GNU wget Project released File Download package New Version 1.18

Windows 10 in Chinese eyes

Windows 10 in Chinese eyesGuideI have to say that in the promotion of Windows 10, the free upgrade policy launched by Microsoft is truly remarkable. The new system has been officially released for more than a year, and its installation volume has

Become secure? Google uses the Linux kernel to improve Android immunity

Become secure? Google uses the Linux kernel to improve Android immunityGuideAndroid Security relies heavily on the Linux kernel. With the continuous improvement of the Linux kernel security mechanism, Android will be more resistant to security

The most suitable and unsuitable Linux distributions for beginners

The most suitable and unsuitable Linux distributions for beginnersGuideMost well-known Linux distributions are classified as "Easy to use. Some observers may refute this point of view, but in fact, when IT comes to Linux, most people who are not

Tomcat starts normally in linux, but cannot be accessed by external browsers.

Tomcat starts normally in linux, but cannot be accessed by external browsers. This situation is generally caused by system firewall settings. The system encountered this time was centos 7.2, and the firewall was changed from iptables to firewall.

Centos 7.5 network configuration, centos7.5 Configuration

Centos 7.5 network configuration, centos7.5 Configuration 1. The ifconfig command cannot be found. Solution: install the net-tools.x86_64 toolkit yum install net-tools.x86_64 2. iptables cannot be used. Solution: yum install

Total Pages: 5467 1 .... 5039 5040 5041 5042 5043 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.