Common user management commands under Linux are: Useradd, Userdel, Usermod, passwd, Chsh, finger, id, chage1. Add Users:Command: UseraddSyntax: useradd [Options] LOGINOptions:-C: Add comment information-D: Specify the user's home directory-G:
The cache is cache, which is the buffer between CPU and memory. Because the CPU is much faster than the main memory, it usually takes a while for the CPU to get the data from it. The cache holds some data that the CPU has just used or is recycled,
Project Content : Using Network Installation technology , combined Kickstart Program Scripts , Implementing Unattended Installations Linux Operating SystemPurpose of the project : Through this technology , complete unattended installations of
1. Load the BIOS2. Read MBR3.Boot Loader (boot loader)4. Loading the kernel5. Set the operating level according to the Inittab file0: Turn off the machine1: Single-user mode2: Multi-user mode with no network support3: Multi-user mode with network
Under Redhat, the network configuration is as followsHow to configure a static IP file
123456789101112131415
vim /etc/sysconfig/network-scripts/ifcfg-eth0DEVICE=eth0 ONBOOT=yes BOOTPROTO=static HWADDR=64:27:37:D3:B5:F7 IPADDR=192
Tail Command writes the file to standard output starting at the specified point. Using the-f option of the tail command makes it easy to see the log files that are being changed, TAIL-F filename will display the most up-to-date contents of the
RPM version of the JDK is good to install, directly run a command can be resolved, the following is the package version of the JDK installation1. First check to see if Linux has a JDK installed and uninstall it first.Rpm-qa | grep jdkjava-version
First, the environment1. Operating system: Redhat Linux 5.52, libevent:libevent-2.0.21-stable.tar.gzMemcached:memcached-1.4.21.tar.gzSecond, installation1, because memcached relies on libevent, it is necessary to install Libevent first.2, the source
Linux packet capture summary and linux packet capture SummaryI. Port Information
Method: Use netstat to learn the listening port of the process you are concerned about, or the usage of a port.
[Root @ imsv-test mpf] # netstat-pan | grep csmtcp 0 0 0
LinuxNetstat command details
NetstatA program that accesses networks and related information in the kernel. It provides reports on TCP connections, TCP and UDP listeners, and process memory management.
Command: Netstat [-a] [-e] [-n] [-o] [-p
Shell Scripts get web page snapshots and generate thumbnails. shell web page snapshots
You can take two steps to obtain a web snapshot and generate a thumbnail:
1. Get web snapshots
2. Generate a thumbnailGet web Snapshot
Here we use phantomjs. For
Linux automatically mounts the second hard disk partition
Modify the/etc/fstab file. If it is mounted to the/data directory, add
/Dev/sdb1/data ext4 defaults 1 1The final result is as follows:
#/Etc/fstab # Created by anaconda on Thu Sep 11 04:12:
Current Situation and Future Prospects of Linux O & M
As the number of Enterprise Servers increases, after hundreds and thousands of servers are reached, the daily management of servers is also complicated. If you frequently update, deploy, and
Linux script automatically enters the password
Programmers using Linux must be familiar with password input. in Linux, they have strict permission restrictions on users. If they do a lot of things, they must enter the password, for example, you can
Deep understanding of Linux memory management1. Memory Address
Taking Intel's central processor as an example, in a 32-bit Linux system, the basic unit of physical memory is Byte, and one Byte has eight binary digits. Each memory address points to
Install JDK 8 and configure environment variables in Linux
1. Download jdk
Address: http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html
2. decompress the downloaded file to the/usr/lib/jvm folder. If this folder does
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service