Fundamentals of the ten-year OPS series-LinuxZeng LinContact: [Email protected]Website: www.jplatformx.comCopyright: Please do not reprint the article without permission
First, IntroductionHere we discuss a cool feature of the command line in
The newly installed Linux system does not have the root user password set, the below describes how to set the root user's passwordFirst step: sudo passwdStep Two: Enter the passwordStep Three: Confirm passwordSo after three steps, the root user's
First, the Linux memory management model1, virtual address and Physical address mapping2. Distribution of physical addressesSecond, the virtual address and physical address mapping1. Virtual address space distributionThe 32-bit processor has 32
In Linux shell programming, scripts are written to one by one or more parameters that can be looped through $* or [email protected]. If the user asks the shell to handle the arguments one after another without knowing the number of variables, that
sometimes we need to lock users, there are usually three more common methods:(1) Prohibit individual users from logging inFor example, prohibit Qian this user, we only need to use Passwd-l qian.If we want to unlock qian This user, we only need to
Sed is a good file processing tool, itself is a pipe command, mainly in the behavior of the unit processing, you can replace the data rows, delete, add, select and other specific work, the following first understand the use of SEDThe SED command
For people who often use the Linux system, the need to upload local files to the server or download files from the server to the local, the Rz/sz command is very convenient to help us achieve this function, but many Linux systems initially do not
1. Let's look at a previous process of Linux boot: When you press the power button, the computer hardware will actively read the BIOS to load hardware information and hardware system self-test, then the system will actively read the first boot
Reasons for configuring Yum Local sourceYum is a popular online rpm (package installation mechanism under the Redhat System) package management tool in Linux, which is mainly used to solve the dependency problem between RPM packages.If your machine
for Linux systems, the entire boot process of the system is divided into six parts, which we introduce as follows:First part: BIOSThe so-called BIOS, the basic input ouput system, can be referred to as the basic inputs and outputs, which are
Source: http://jingyan.baidu.com/article/2fb0ba40541a5900f2ec5f07.htmlIn daily work or learning we often need to use both Windows and Linux on a single computer (here in Ubuntu for example) two systems, which we usually do:A two-system installation (
With the stack unwinding feature, the. NET program to obtain call stack information in order to display the call stack information on an exception. This feature was only implemented on Windows, the implementation of LINUX/MAC has just been added
Linux basic operations on file content (study note 7), linux Study NotesI. cat1.1. view the File Content
Format: cat file name
[root@model /]# cat /etc/resolv.conf # Generated by NetworkManagernameserver 10.198.1.1nameserver 8.8.8.8[root@model /]#
Linux file archiving and compression (learning notes 8), file archiving learning notesI. Archiving and Compression
Compression command tool: gzip, bzip2
Archive command tool: tar
Ii. Compression
2.1. gzip
Gzip is a standard and widely used
Linux users, group accounts and permissions (study note 9), and linux Study NotesI. User Classification
Super User: root
Common users: created by super users and administrators. Generally, they only have full permissions in their directories.
Tail command
Original article: http://www.cnblogs.com/peida/archive/2012/11/07/2758084.html
The ail command writes the file to the standard output from the specified point. you can use the-f option of the tail command to conveniently check the
[Linux] install Chrome in CentOS
Install Chrome in CentOS 6.x. First, create the google-chrome.repo file in the/etc/yum. repos. d directory, which writes the following content:
[Google-chrome] name = google-chromebaseurl = chrome
After
CentOS/LinuxRedis cluster Installation
In this article, only the installation steps of the redis cluster are described. For detailed procedures, see the following articles:
Redis cluster _ 1. Install redis
Redis cluster _ 2. redis master-slave
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service