1. Graphical Interface Management:To switch from the graphical interface to the character interface input init 3If you want to switch the character interface to the graphical interface init 52. Process Management:Kill kills a processKill-9 force
See the bird's-brother Linux private Dish*-wildcard character, which represents random characters (0 for many)? -Wildcard, which represents a character#-Gaze/-Jump symbol to restore special characters or wildcards to a general symbol| -demarcation
Linux variables are divided into two categories, permanent and temporary, by life cycle.Temporary: With the Export command declaration, the variable is valid only under the current shell (bash) or its child shell (bash), fails after the shell is
First we may use free to see the memory usage, it should be like this[Email protected] ~]# free-m total used free shared buffers cachedmem:32040 31707 332 0 498 27649-/+ buffers/cache:3559 28480swap:16087 0 16087# #实际上在一个进程结束后其内存是会被释放的, but
In multi-threading, in the properties of mutexes and read-write locks, there is an attribute called process sharing.For mutexes, the method for querying and setting this property is:Pthread_mutexattr_getpsharedPthread_mutexattr_setpsharedAt first I
Principles and handling of Linux security SYN attacks and linuxsyn attacks
TCP has been developed for more than 30 years since it was invented in 1974 and has become the most important basic Internet Protocol. However, TCP also has some defects.
SYN
CentOS minimal network unavailable Solution
Problem description:
After CentOS minimal is installed, the network is unavailable. Some Common commands report errors:
Ping: unknow host xxx
Yum: cocould not retrieve into list xxx error was 14: pycurl
Common Linux Network Tools: netcat for batch host service Scanning
Netcat, also known as Swiss Army knife, is a common network tool used by hackers and system administrators. It was initially developed to transfer files and subsequently developed
15 things to do after installing the Ubuntu 15.04 Desktop
This tutorial applies to new users who have installed Ubuntu 15.04 "Vivid Vervet" desktop on their computers. Here we will tell you what to do after the installation, customize your system
Configure bridging network in CentOS 6 system kvm Virtual MachineConfigure bridging network in CentOS 6 system kvm Virtual MachineFirst, disable and uninstall the NetworkManager tool to enable the built-in network service.Chkconfig NetworkManager
CentOS user management basics
1) view the current user
[root@moban~]#whoamiroot
2) Add a user[root@moban~]#useraddxpleafOr[root@moban~]#adduserxpleaf
3) create a password for the
Naming rules for CentOS disks and partitions
In Linux, there is no drive letter concept. The device name is used to access the device, and the device name is stored in the/dev directory.
The SSD, SAS, and SATA hard disks mentioned above are all
Restore deleted rm files in centos
The system is centos 6.5 x64 bit.
It is troublesome to restore the deleted rm file.
You can use extundelete to restore data.
The latest version is 0.2.4.
Extundelete home:
CentOS7.0 installation and configuration vsftp (YUM)
CentOS7.0 is used for configuration, which is similar to other versions. It is only used to make a record for you to view and share it with anyone who needs it.
1. configure the firewall and
Retrieve root Password in centos 6.5
Press any key to enter the menu interface
When starting the boot, enter the boot startup interface (for example) and click "e" on the keyboard"
3. Go to the UI, as shown in. I will select the second
How to build an ftp server in Linux
Build an ftp server in Linux.
Ftp will start two channels:Control Channel, Data ChannelIn the ftp protocol, the control connection is initiated by the client, and the data connection has two modes: port mode
Keepalived has over 20 virtual addresses
When I recently used lvs + keepalived in the production environment, I encountered a problem that over 20 virtual addresses were used in my keepalived configuration file, when there are more than 20
Session and Cookie details and how to achieve Session sharing
First, let's talk about cookies. Cookies are actually part of the content transmitted by the Web server and the client, and the content is arbitrary, however, it must be within the
Hadoop file-based data structures and Instances
File-based Data StructureTwo file formats:1. SequenceFile2. MapFile
SequenceFile1. SequenceFile is a Flat File designed for Hadoop to store binary pairs ).
2. You can use SequenceFile as a container
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service