wildcard characters are typically used for the user's command-line Bash environment, while Linux regular expressions are used in Grep/sed/awk scenarios. * --wildcard characters (0 to more )? --wildcard character, representing any 1 characters;
Files that need to be operated more frequently under 1.linux:Nic profile/etc/sysconfig/network-scripts/ifcfg-ethx Note: Different brands of servers or different system versions may have different NIC names and need to be aware of when configuring
No matter which operating system, there are too many files in the same level directory is a terrible thing, whether it is read or delete time.What if this unfortunate thing happens to you and can't completely erase the entire directory?You can use
Originally intended to practice a simple model, the main focus on the main model, first with UNIX I/O fooled, but not encapsulated read and write used to be really tired, or directly with the predecessors have achieved a good advanced version of
Some Linux programs do not provide programs, seemingly just provide a lot of source code, such as. c,.cpp file a large number of files, but often in the directory has a makefile file, or the makefile file is customary to hide in the build folder. is
Linux installation NginxBlog Category:
Server
1) Download NginxJava code
wget http://nginx.org/download/nginx-0.8.54.tar.gz
The default is downloaded to the current directory, which is the PWD directory2) UnzipJava code
Unzip the kernel
Make Mrproper
Copy the/boot/confgxxx to the current directory and rename the. config
Make Menuconfig, in this step you can trim the kernel
Make-j4 && make-j4 Modules && make Modules_install && make install
The approximate process for system startup is as follows:1. Load the hardware information of the Bois and perform post power-on self-test, and obtain the first bootable device according to the configuration;2. Read and run the bootloader (i.e. grub,
MBR (Master Boot Record): Used to install the boot loader, such as GRUB, Size 446 bytes
Partition table (partion table): Log partition information for the entire disk, size 64 bytes
Linux: 1-4 for the primary or extended partition,
/ETC/PASSWD file Structure1. Account Name:It's an account! Used to correspond to the UID. For example, root UID corresponds to 0 (third field);2. Password:The password for the early Unix system is placed on this field! But because this file is
Trickle is a very small and practical Linux command Flow limiting toolTrickle can limit Linux upload and download traffic for command-line tools. Useful when transferring or backing up files across geographies, because the bandwidth of the external
Use the Setup--system service to remove any unused services in front of you.Chkconfig inside to see what service ports open, can also off, and finally with Nmap to see which ports are open, do not need to/etc/services inside the corresponding port
The PS command is one of the most basic commands for viewing processes running on the systemFirst, the grammarThe PS command has 2 different styles, namely BSD and UNIX. These two grammars can also be applied together, but they are generally
In school, in high schools, the most horrible thing is not to operate according to the standard command, resulting in the use of the wrong command to cause serious consequences. Some of the commonly used shutdown/Restart commands under Linux are
The multithreading under Linux is implemented by Pthread, here is a simple example.#include #include#includevoid*Thr_fn () {printf ("This is a thread, Tid =%d\n", Pthread_self ()); printf ("Thread return\n"); return(void*)0;}intMain () {printf
1, set the file to enjoy, for local reading Windows fileIn the VMware Virtual machine Settings shared folder, then in the shared file, you can2. Then open the virtual machine, use root to enter the account, then, in the folder/mnt/hgfs/shared files3,
Linux soft connection and hard link
Soft link
In Linux, soft links are like shortcuts in windows.
Create soft link format: full path of ln-s source file full path of Soft link
Operation Demonstration:
Hard Link
Unlike a soft connection, a
Use rfkill to enable Bluetooth and wireless functions in Linux
Many computer systems include radio transmission, including Wi-Fi, Bluetooth, and 3G devices. These devices consume power and are a waste of energy when they are not used.
RFKill is a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service