For a single command execution I think most people are clear about executing a command on a command line. What about executing multiple commands on a single line, in fact, it's very simple, just add a special command symbol between the commands, and
Purpose: Compile the executable ntpdate tool under Arm-linuxTarget not completed: Unable to generate NTPD Server tool because the entire source package is not fully compiledThe procedure is as follows:(0) Compile client ntpdate only, do not compile
The source of the operating system and my path to exploration
First contact to Linux on Android command terminal (run Ubuntu dual system)
Enter Ubuntu Pit: Installation system is about to be mounted for the fourth time (4k)
Learn Linux for
PwdFunction: Displays the current directoryNote: When a user logs on, the home directory is the default. The root user's home directory is/root, and the normal user's home directory is in/home/username.Instance:650) this.width=650; "src=" Http://s3.5
A ping is a communication protocol that is part of the IP protocol, a portion of the TCP/IP protocol. It can be used to check if the network is able to connect, so it can help us to analyze and determine the network fault. The application format is:
In Linux, the default root prompt character is #, while the general identity user's prompt character is $;This login, support language changed to English[ root@linux ~]#[root@linux ~]# [Root@linux ~]# [ Root@linux ~]#[root@linux ~]# lc_time=enShow
Qianzhiang + Original works reproduced please specify the source + "Linux kernel analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000 1. Job Directory It was only after the second week that the course was missed, so the first week
Linux File compression and archiving, linux File compression and ArchivingFile compression
Common compression Commands include gzip and bzip2.Gzip Command Format
Gzip [-acdfhlLnNrtvV19] [-S suffix] [name...]Command Parameters
-C -- stdout --
Enable a port in CentOS
For example, CentOS6.5 enables port 3306.
Enter the following command:
Vi/etc/sysconfig/iptables
Modify the content as follows:
# Firewall configuration written by system-config-firewall# Manual customization of this file is
Centos6.5 Nic settings.
1. Modify host name:
The configuration file is/etc/sysconfig/network. Use hostname to display the host name. Modifiable with Parameters
2. There are many ways to modify the ip Address: setup command, ifconfig eth0 ip
Linux Remote logon to Windows
Generally, there are two common practices: one is to install a software named VNC Server on Windows, so that Linux can log on to the Windows Server through VNC, this is a configuration on Windows.
Another method is to
How can we see whether the CentOS system is 32-bit or 64-bit?
How can we see whether the CentOS system is 32-bit or 64-bit?
32-bit system:
[root@localhost ~]# file /sbin/init/sbin/init: ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV),
Set up the smba server and use the client in Linux
I am just a beginner. I have encountered many problems in the process of configuring smba, and the online tutorials are not quite complete. Therefore, I will write a complete article here for your
User and User Groups in Linux, groupslinux
This document describes some common commands for Linux users and user groups.
Related configuration files:
/Etc/group stores all user group information in the current system
/Etc/gshadow stores
Linux IO redirection
By default, Linux commands obtain input from the standard input device (stdio) and output the result to the standard output device (stdout) for display. Generally, the standard input device is a keyboard. The standard output
SUID, SGID, and Sticky attributes of the file
SUID attributesThe SUID attribute is generally used on an executable file. When a user executes the file, the user temporarily has the permission of the owner of the executable file. When you use the "ls-
Linux find command usage Summary
The find command is one of the most common commands in Linux. Here are some common usage summaries.
1. Search by file name.Search for all files ending with txt in the current directory. The second command uses
30 things to be done after minimal RHEL/CentOS 7 installation (6)30 things to be done after minimal RHEL/CentOS 7 installation (6) 30. Password-protected GRUB
Use a password to protect your boot program so that you can obtain additional security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service