Version: CentOS 6.4Framework: x86_64Update Time: updated every 5 hours1. First back up/etc/yum. repos. d/CentOS-Base.repo[Root @ localhost ~] # Mv/etc/yum. repos. d/CentOS-Base.repo/etc/yum. repos. d/CentOS-Base.repo.bak
2. Download the repo file of the corresponding version and put it in/etc/yum. repos. d/(back up the file before the operation)
CentOS5
CentOS6
CentOS6
# CentOS-Base.repo## The mirror system uses the connecting IP address of the client and# Update status of each mirror to pick mi
========================================================== ==========This article is the original khler, and the original author information and the original link of this article must be kept completely and completely reprinted.E-mail:Khler@163.comQQ: 23381103MSN:Pragmac@hotmail.com========================================================== ==========
After ubuntu9.10, APT operations are much easier. After 9.10:
1. Add PPA: mercurial
2. Add to PPA: tortoisehg3. Update Apt4. Install tortoisehg5.
. Repo file in the/etc/yum. Repos. d/path and add the following lines to create priorities:Priority = N
Corresponding to each installation source entry, n is an integer from 1 to 99.
The recommended configuration is (CentOS-Base.repo file ):[Base], [Addons], [updates], [extras]... priority = 1[Centosplus], [contrib]... priority = 2
For third-party installation sources, such as rpmforge (rpmforge. Repo file), priority = n (n is an integer greater than 10)
1.2 rpmforge
You can get a complete list
with the other repos too:# yum--enablerepo=c6-media [command]#说明: If you only want or can only use the media installation source, you must use the following command:#yum--disablerepo=\*--enablerepo=c6-media Install Perl# or for the media repo, does this:## yum--disablerepo=\*--enablerepo=c6-media [command][C6-media]name=centos-$releasever-media################## #修改的语句 #######################baseurl=file:///iso/########## #指定光盘的挂载点 #########################Gpgcheck=1Enabled=0Gpgkey=file:///etc/
ownership differs
G Group ownership differs
T MTime differs
P capabilities differ
Package Check
Verification and completeness of the legitimacy of package sourceIntegrity Verification: SHA256SOURCE legality verification: RSA
Public Key CryptographySymmetric encryption: Encrypt, decrypt using the same keyAsymmetric encryption: The key is in pairsPublic key: Private key, public ownerSecret key: Private key, cannot be exposedImport the required public key
Article Title: Detailed explanation: Implementation of local YUM source in RHEL5. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open source, and other basic classification system platforms: Red Hat Enterprise Linux Server release 5 (Tikanga)
Step 1:
1. Mount the DVD disc to/media/cdrom;
2. Copy all files in/media/cdrom to/media/yum1;
3,/etc/yum. repos. d/rhel-debuginfo.repo:
[Cluster]
CentOS is compatible with RedHat, so we can use CentOS data packets to upgrade RedHatLinux. Modify yum configuration: 1, modify/etc/yum. repos. d/rhel-debuginfo.repo to the following content [rhel-debuginfo] name = RedHatEnterpriseLinux $ releasever-$ basearch-Debugbaseurl = ftp ://
CentOS is compatible with RedHat, so we can use CentOS data packets to upgrade RedHat Linux.
Modify yum Configuration:
1, modify/etc/yum. repos. d/rhel-debuginfo.repo to the following content[Rhel-debuginfo]Name = Re
pair in this tutorial.
$ Gpg -- gen-key
During key generation, you are required to provide your name and email address, as well as the password to protect your private key. You can also choose when the key pair expires (no expiration date by default ). The key generation process may take several minutes or longer, depending on the size of the key you selected (1024-4096 bits), because it needs to collect a sufficient amount of random data, this data
Configuration instructions:1. Use Openfiler to implement iscsi shared storage2. Implement the fence Function Through VMware ESXi5 virtual fence.3. Use RedHat 5.8 vmware-fence-soap to implement the RHCS fence device function.4. In this article, we created a RHCS experiment environment to test the RHCS Oracle HA function.I. Prepare the Basic Environment1. Prepare the Network EnvironmentNode1 and node2 nodes# Cat/etc/hosts192.168.14.100 node1192.168.14.110 node22. Configure the YUM installation Sou
Encrypt emails in Linux
If you have been thinking about how to encrypt your email, it is a headache to pick it out among many email services and clients. two encryption methods can be considered: SSL or TLS encryption will protect the login name and password sent to the mail server. gunpg is a standard and powerful Linux encryption tool that can encrypt and authenticate messages. if you can manage your own GPG encryption without considering third-part
Server-side configuration1. Mount the disc imageMkdir/mnt/cdromMount/dev/sr02. Build Apache ServerYum-y Install httpdService httpd RestartChkconfig httpd on3. Copy disc image to www directoryMkdir-p/var/www/html/yum/centoscp-rp/mnt/cdrom/*/var/www/html/yum/centos4. Installing CreaterepoYum-y Install CreaterepoCreaterepo/var/www/html/yum/centosClient ConfigurationModify the Centos-base.repo filevi/etc/yum.repos.d/ Centos-base.repoThe BaseURL with enabled 1 is set to server-side IPBaseurl= Http://
hungry3, one problem is that Yum source cannot install Cloud-managerAfter the Yum source update needs to import the key value, otherwise the error is as follows, cannot install the related package.Total size:42 MDownloading Packages:Warning:rpmts_HdrFromFdno:Header V3 rsa/sha1 Signature, key ID C105b9de:nokeyRetrieving Key from File:///etc/pki/rpm-gpg/RPM-GPG-KEY-CentOS-5GPG Key retrieval failed: [Errno] C
official public key and fingerprint for verification.
As for the files to be downloaded, the publisher also provides the corresponding PGP signature.
Install GnuPG to generate a key pair
Install GnuPG on your Linux system first.
On Debian, Ubuntu, and other Debian extensions:
$ Sudo apt-get install gnupg
On Fedora, CentOS, or RHEL:
$ Sudo yum install gnupg
After the installation is complete, generate a key pair. you need to use this key pair in this tutorial.
$
-debuginfo.repoWe can follow the content in this section to add the following content:[Rhel-Server]Name = Red Hat Enterprise Linux ServerBaseurl = file: // meida/ServerEnabled = 1Gpgcheck = 1Gpgkey = file: // etc/pki/rpm-gpg/RPM-GPG-KEY-RedHat-release[Rhel-Cluster]Name = Red Hat Enterprise Linux ClusterBaseurl = file: // meida/ClusterEnabled = 1Gpgcheck = 1Gpgkey = file: // etc/pki/rpm-
is represented by X.
If you want to receive multiple types of parameters, you should use uppercase letters (for example, S) of the adjacent T to represent them in sequence. Of course, you can also use T1, T2.
Public class HashSet extends actset {...} Public class HashMap
Recommended name
1. When you want to differentiate interfaces and implementation classes, you can add "Impl" to the end of the class ".
Interface Container class ContainerImpl
2. It is recommended that the Exception class end
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.