Install jdk-6u45-linux-x64.bin under Linuxredhat

1 download jdk-6u45-linux-x64bin from Oracle Download File: jdk-6u45-linux-x64bin2 copy jdk-6u45-linux-x64bin to usrjava 3 go to usrjava Directory, modify jdk-6u45-linux-x64bin executable permission chmodu & amp; 43 1. download

[Linux] startup process analysis

The first process started by Linux kernel is sbininit, and its configuration file is etcinittab. This article will analyze how Linux starts it based on the configuration file. The following is a typical example of this file:

Install apache-tomcat-7.0.47.tar.gz under redhat.

1 if the apache-tomcat-7047targz is on the redhat desktop at the beginning, place the apache-tomcat-7047targz to the usrtomcat7 directory where the cphometotoDesktopapache-tomcat-7047targzusrtomcat72 enters Upload to the/usr/tomcat7

LinuxShell script introduction-Chapter 3 name a file

31. generate a file of any size. 1. use the dd command to create a file of a specific size. the dd command will clone the specified input content, and then write an identical copy to output 2 stdin, device files, common files, and so on can be used

Regular expressions for Linux Commands

& Amp; 65279; & amp; 65279; special character ^ any one of the first $ lines at the end of the line [] contains a range of characters. add ^ to indicate the range of reverse characters, any character in this range can be matched (to restore normal

Linux study NOTE _ 6_2_Debian Software Package management

C1, search package information apt-cachesearchapt-cachesearchyum2, view package information apt-cacheshowrpm3, install software apt-getinstallrpm option: apt-get c 1. search for software package information Apt-cache search Apt-cache search yum

Chapter 1 of Linuxshell script strategy

11 Introduction 1 after the terminal is opened, a prompt will appear, usually in the form of username @ hostname $ or root @ hostname2 $ represents a common user, represents a Super User. Superuser is the permission in Linux 1.1 Introduction 1.

Linux file system basics

Bin: stores the most common executable files in the system boot: stores Linux kernel and system startup files, including Grub and lilo boot programs dev: stores all device files, including hard disk, partition, mouse, USB, ttyetc: stores all

Check the memory usage of Linux machines using Shell scripts

! Binbashexportchknum = 1echo3 & gt; procsysvmdrop_cachessyncwhile [$ chknum-ge0] doecho & quot; ------------------------------------------------------- & qu #! /Bin/bash Export chknum = 1 Echo 3>/proc/sys/vm/drop_caches Sync While [$ chknum-ge

Linux text files

1WithoutGUI11diffdiff can compare two folder syntaxes: diff [option] file1file2 description: this command tells you which lines of file1 and file2 need to be modified to make the two files consistent. If & ldquo;-& rdquo; is used to represent file1

VMware network connection settings solve the problem that Fedora cannot access the Internet in Ubuntu.

After the system is installed with VMWare, some systems cannot access the network by default, such as Fedora. some systems can access the Internet at the beginning, but suddenly fail to access the network, such as Ubuntu. This is generally because

Linux. Shell Programming Notes-regular expressions

Chapter 4 What is a regular expression? when writing a program or webpage that processes strings, regular expressions are often used to find strings that meet certain complex rules. A regular expression is a tool used to describe these rules. In

Linux _ 8_process management _ 1 _ Process Concept

I. differences between a program and a process 1. a program is a static concept. it is a long-term storage of software resources, while a process is a process of execution and a dynamic concept, there is a certain period of life, which is generated

LinuxShell script introduction-Chapter 4 let the text fly

41 regular expression entry 1 regular expression is the key to text processing technology based on style matching 2 Regular expressions are used in most text processing tools. 3 regular expressions are the basic components of regular expressions 4.1

File permissions for Linux

Linux classifies file access identities into three categories: owner, group, and others. Each of the three identities has read, write, and execute permissions. Brw-r -- 1unixguystaff64, 64Jan2705: 52 blockcr Linux classifies file access identities

Linux commands for deleting files and folders

& Amp; 65279; & amp; 65279; when using this rm-rf command to delete files in linux, be sure to & amp; 26684; when using this command, there is no Recycle bin in linux. You can simply use rm, but you need to add the parameter-f, that is, the rm-f

Unix/Linuxsudo command

The 1sudo command allows users to manage and assign reasonable & ldquo; rights & rdquo; to execute tasks that can only be completed by super users or even authorized users. However, after the user executes sudo and enters the password, the user will

Linuxvim simple color processing without Display

Method 1: Add the following TERM = xtermexportTERM to bash_profile or bashrc and then run the script sourcebashrc or sourcebash_profile. Method 2: Change the client to xterm, and other clients also have the class & 20284; option. "/> Add the

Modify the linux root Password

Since there are 6 running levels in linux, the single-user running level is-1, the running level is single-user mode. In this mode, you can change the root password. this mode has the following features: pass parameter 1 for the kernel or single can

Su for Linux Commands

& Amp; 65279; & amp; 65279; su allows a user to be another user temporarily. It uses real and valid userID, groupID, and an additional group of given users to execute a command, usually an interactive shell. Su [OPTION] & hellip; [USER [ARG] &

Total Pages: 12780 1 .... 12413 12414 12415 12416 12417 .... 12780 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.