Using the tar command under LinuxExtractSyntax: tar [main option + Secondary options] file or directoryWhen using this command, the main option is required, and it tells Tar what to do, auxiliary options are auxiliary and can be used.Main options:C
1, understand the OSI seven layer model, and the five layer protocol structure. 650) this.width=650; "title=" image "style=" border-top:0px; border-right:0px; Background-image:none; border-bottom:0px; padding-top:0px; padding-left:0px;
1. Using the ifconfig command to manage the network interfaceCommand: Ethtool eth0, viewing NIC information650) this.width=650; "height=" 283 "title=" image "style=" border-top:0px;border-right:0px;background-image:none;
has upgraded CENTOS6 to Kenrel 4.1.4,uname-an.Linux localhost.localdomain 4.1.4-1.el7.elrepo.x86_64 #1 SMP Wed 5 13:09:04 EDT x86_64 x86_64 x86_64 gnu/linuxUpgrade Method page:Https://linux.cn/article-5322-1.htmlNot long ago, the introduction of
Start Process Summary:POST (power-on self-test, detection of hardware device availability)-->boot Sequence (BIOSfind boot boot sequence, select should be from hard disk,Usb, network, which device in the optical drive is booting the system)--Boot
--RPM installation Package--The full RPM name is Red Hat Package manager.Syntax format: RPM Option:-I installs the package.-t test installation, not really installed-F Ignore any errors-V Displays the RMP version currently in use;-H Displays the
How to find a file in a Linux environment: find path-name ' filename ', filename does not know the full name can be used to match the * number, such as "tomcat.*". If you don't know the path, you can use "/" to find all paths.' tomcat.* '
Two accounts created locally, text and Text1Now to delete the Text1 user, do the following[[email protected]/]$ su textPassword:[email protected]/]$ suPassword:[Email protected]/]# Userdel Text1Userdel:user Text1 is currently used by process 55462An
First, Introduction One of the most common mistakes in a C + + program is memory leaks. Valgrind is a Linux-based memory debugging tool that can detect memory leaks by using a compiled binary to monitor memory usage. Valgrind usually includes the
The Vmstat command is the most common Linux/unix monitoring tool that can show the status of a server at a given time interval, including server CPU utilization, memory usage, virtual memory exchange, IO Read and write situations. This command is I
The variables in Linux are divided intoLocal variables, environment variables, local variables, positional variables, special variablesLocal variables: Valid for the current shell process only, effective immediatelyUsage: variable name =
3.4 /bin:essential user command binaries (for use by all users)The system must have user command binary execution files placed here (commands that can be used by all users) 3.4.1 Purpose/bin contains commands, May is used by both the system
Simple configuration of Virtual Machine experiment environment using shell script
After writing the shell script, you can find that this is really convenient. When you want to complete some trivial and detailed commands at one time, the script is
Configure the local DVD for CentOS 6.6 in Virtual Box as the yum software source, centosyum
Because the centos configuration in virtual box is host-only shared with win7, the configuration fails. Therefore, you can only use the Centos DVD to
Deploy Keepalive high-availability software in Centos, and centoskeepalive
KeepaliveInstallation and deployment
I.Environment Introduction
1) Centos6.4
2) keepalived-1.2.12
3) ip address of the Master/Slave Machine
Master: 172.31.100.5
Slave: 172
Linux Purify command and linuxpurify command
I. Introduction
In C/C ++ software development, there is no tool for your applications to avoid the introduction of memory problems, however, we can use tools such as Purify to check the memory problems
Build a DNS server in Linux and a dns server in linux
Linux system information:
Version: Centos 6.6
Ip address: 10.0.0.104
Hostname: extmail.com
Vim/etc/sysconfig/network
Vim/etc/hosts
Configure a high-performance HHVM environment on Ubuntu
HHVM is called HipHop Virtual Machine. It is an open-source Virtual Machine used to run applications developed by Hack (a programming language) and PHP. With the high flexibility that PHP
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service