07.linux System Management Commands

1. Graphical Interface Management:To switch from the graphical interface to the character interface input init 3If you want to switch the character interface to the graphical interface init 52. Process Management:Kill kills a processKill-9 force

Linux Wildcard characters Summary

See the bird's-brother Linux private Dish*-wildcard character, which represents random characters (0 for many)? -Wildcard, which represents a character#-Gaze/-Jump symbol to restore special characters or wildcards to a general symbol| -demarcation

Linux Add environment variable

Linux variables are divided into two categories, permanent and temporary, by life cycle.Temporary: With the Export command declaration, the variable is valid only under the current shell (bash) or its child shell (bash), fails after the shell is

Linux frees up memory

First we may use free to see the memory usage, it should be like this[Email protected] ~]# free-m total used free shared buffers cachedmem:32040          31707 332 0 498 27649-/+ buffers/cache:3559 28480swap:16087 0 16087# #实际上在一个进程结束后其内存是会被释放的, but

Linux Tomcat JDK Installation

Installing the JDK# Yum Search Java | Grep-i--color JDKYum Install JAVA-1.7.0-OPENJDK Java-1.7.0-openjdk-devel Setting environment variablesVi/etc/profileAdd to:Java_home=/usr/lib/jvm/java-1.7.0-openjdk-1.7.0.71.x86_64Jre_home=/usr/lib/jvm/java-1.7

Linux thread Mutex--Process shared properties

In multi-threading, in the properties of mutexes and read-write locks, there is an attribute called process sharing.For mutexes, the method for querying and setting this property is:Pthread_mutexattr_getpsharedPthread_mutexattr_setpsharedAt first I

Principles and handling of Linux security SYN attacks and linuxsyn attacks

Principles and handling of Linux security SYN attacks and linuxsyn attacks TCP has been developed for more than 30 years since it was invented in 1974 and has become the most important basic Internet Protocol. However, TCP also has some defects. SYN

CentOS minimal network unavailable Solution

CentOS minimal network unavailable Solution Problem description: After CentOS minimal is installed, the network is unavailable. Some Common commands report errors: Ping: unknow host xxx Yum: cocould not retrieve into list xxx error was 14: pycurl

Common Linux Network Tools: netcat for batch host service Scanning

Common Linux Network Tools: netcat for batch host service Scanning Netcat, also known as Swiss Army knife, is a common network tool used by hackers and system administrators. It was initially developed to transfer files and subsequently developed

15 things to do after installing the Ubuntu 15.04 Desktop

15 things to do after installing the Ubuntu 15.04 Desktop This tutorial applies to new users who have installed Ubuntu 15.04 "Vivid Vervet" desktop on their computers. Here we will tell you what to do after the installation, customize your system

Configure bridging network in CentOS 6 system kvm Virtual Machine

Configure bridging network in CentOS 6 system kvm Virtual MachineConfigure bridging network in CentOS 6 system kvm Virtual MachineFirst, disable and uninstall the NetworkManager tool to enable the built-in network service.Chkconfig NetworkManager

CentOS user management basics

CentOS user management basics 1) view the current user [root@moban~]#whoamiroot 2) Add a user[root@moban~]#useraddxpleafOr[root@moban~]#adduserxpleaf 3) create a password for the

Naming rules for CentOS disks and partitions

Naming rules for CentOS disks and partitions In Linux, there is no drive letter concept. The device name is used to access the device, and the device name is stored in the/dev directory. The SSD, SAS, and SATA hard disks mentioned above are all

Restore deleted rm files in centos

Restore deleted rm files in centos The system is centos 6.5 x64 bit. It is troublesome to restore the deleted rm file. You can use extundelete to restore data. The latest version is 0.2.4. Extundelete home:

CentOS7.0 installation and configuration vsftp (YUM)

CentOS7.0 installation and configuration vsftp (YUM) CentOS7.0 is used for configuration, which is similar to other versions. It is only used to make a record for you to view and share it with anyone who needs it. 1. configure the firewall and

Retrieve root Password in centos 6.5

Retrieve root Password in centos 6.5 Press any key to enter the menu interface When starting the boot, enter the boot startup interface (for example) and click "e" on the keyboard" 3. Go to the UI, as shown in. I will select the second

How to build an ftp server in Linux

How to build an ftp server in Linux Build an ftp server in Linux. Ftp will start two channels:Control Channel, Data ChannelIn the ftp protocol, the control connection is initiated by the client, and the data connection has two modes: port mode

Keepalived has over 20 virtual addresses

Keepalived has over 20 virtual addresses When I recently used lvs + keepalived in the production environment, I encountered a problem that over 20 virtual addresses were used in my keepalived configuration file, when there are more than 20

Session and Cookie details and how to achieve Session sharing

Session and Cookie details and how to achieve Session sharing First, let's talk about cookies. Cookies are actually part of the content transmitted by the Web server and the client, and the content is arbitrary, however, it must be within the

Hadoop file-based data structures and Instances

Hadoop file-based data structures and Instances File-based Data StructureTwo file formats:1. SequenceFile2. MapFile SequenceFile1. SequenceFile is a Flat File designed for Hadoop to store binary pairs ). 2. You can use SequenceFile as a container

Total Pages: 5467 1 .... 5159 5160 5161 5162 5163 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.