-------------------------------------------------------------------------Yang + Original works reproduced please specify the source"Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000-----------------------------------
Experiment content: File operation and user operation experimentLab equipment (Environment): PC, Vmware WorkStationExperimental steps:First, create a new user BobPurpose: Practice Useradd commandsSecond, set the password for new user BobPurpose:
Detailed explanation of user management commands under Linux1.useradd, add user commandFormat: useradd [options] User nameOption:-U indicates UIDExample Description: useradd-u 888 user11-G denotes GIDExample description: useradd-g mysql user12-G
Seventh airplanes loading of the execution programGuo Hao Original works reproduced please specify the source "Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000I. Preprocessing, compiling, linking and target file
Using SSH services in a Linux system 1, SSH Service Application scenario① can be used to upload and download files.② for remote management of Linux2. Installing the SSH server
Service: sshd
Location: Disc 2
Software: openssh-server-3.9p1-8
Linux related Instructions 1, find file search functionFind [directory list] [match parameter] [match standard]-name: Search by file name-group: Search by group to which the file belongs-user: Search by file OwnerExample 1: Searching with-name as
Get process information through the PS command:1. Get all process informationCommand: PS aux2. Get a process with a name called TomcatCommand: PS aux |grep TomcatTo add permissions to a folder:1. Add Admin user to/tmp/test folder: Chown
There are 2 ways to install RPM packages
With Yum install-y installation, this installation needs to create the RPM warehouse, add the following information below the *.repo file under the directory/ETC/YUM.REPOS.D directory: Different
"Linux kernel Analysis" Seventh Week study summary--Loading of executable programsName: Wang Wei No.: 20135116A summary of the theoretical part(i) Loading of executable programs1. Preprocessing, compiling, linking, and format of the target fileThe C
Now just learn the basic operation, do not delve into the meaning of each parameterGeneral Operations Directory, there is a-R for the recursive operation of all the contents of the directoryCompress a directory test to Test.zipZip-r Test
I install JDK1 Download jdk*.bin/jdk*. rpm file 2 Copy the installation package to the installation directory CP JDK*.bin/www/java 3 installation JDK if it is a. bin file, execute it directly in the copy's current directory. /jdk*-ivh jdk*-xvf jdk*/
Commands for simple and common file viewing/processing/sorting/statistics under Linux
Cat command: View File commandOption:-N: Show line numbers
-e: Show each line terminator $650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/7
Method One: The WinSCP tool under WindowsPrerequisites: Windows can ping the Linux;linux to shut down the firewall,/etc/init.d/iptables stopUnder Windows Run WINSCP Program, protocol Select SFTP can, fill in the Linux host IP address, user name,
Linux Virtual File System (VFS)
Linux creates an abstraction layer on top of different file systems, making concepts such as files, directories, and read/write access an abstraction layer. This abstraction layer is called a Virtual File System (VFS )
Meanings of various numbers in the Linux Free command and differences between Buffer and CacheDemonstration of the number meaning commands of the Free command
[root@vm1 ~]# free total used free shared buffers
Install dotnet core and centosdotnet in CentOS 7.1
. Net core official (http://dotnet.github.io/getting-started/) only provides Windows, Ubuntu14.04, and Docker (also based on Ubuntu14.04 Image ). however, since Microsoft has used RedHat as a
Use Gnupg to encrypt files in Linux
Guide
GnuPG (GNU Privacy Guard or GPG) is an open source code for encryption or signature released with the GNU General Public License, which can be used to replace PGP. Most gpg software only
Deployment and testing of AAA functions-Part 2 of the open-source bastion host function of Qilin
The AAA Server is mainly used for server and network device authentication in terms of network management. For example, in our common cisco acs system,
Linux O & M automation tool Cobbler
Introduction:
For the automation of operating system installation, we used Kickstart launched by RedHat to install the operating system in batches. In recent years, RedHat has released a Cobbler.
Cobbler is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service