Or is that sudo and su?When you log in with Su, add the following-Because of this, the environment variable will become the switch user'sThis can cause unnecessary trouble if you do not use environment variables.General Sudo is not allowed for remote logins, because passwords are plaintext and are very insecureBut you can use ssh-t [email protected] sudo-l this way to log inOkay, I'm done.20161129l04-09 old boy Linux OPS training-linux system user and
Sersync pressure test in the next sectionThis section focuses on the pressure test text of the previous section to do a real stress testTest out exactly what the sersync pressure limit is.From 10 to 100 per second# Tree |wc-l #查看写了多少文件# uptime #查看负载Here is the test script#!/bin/shcount=100While TrueDoFor ((i=1;iDo/BIN/CP 10k.jpg/backup/test/$i/10k_echo $ (date) $RANDOM |md5sum |cut-c 1-8.jpgDoneSleep 1For ((i=1;iDo/BIN/CP 30k.jpg/backup/test/$i/10k_echo $ (date) $RANDOM |md5sum |cut-c 1-8.jpgDon
Press ENTER after modification6. Final interfaceAfter pressing B, the system continues to boot and enters into single-user mode.650) this.width=650; "src=" Https://s5.51cto.com/wyfs02/M02/97/DD/wKioL1k0F9DDaee5AABkJplTL5Q622.bmp "title=" 6.2. BMP "style=" Float:none; "alt=" Wkiol1k0f9ddaee5aabkjpltl5q622.bmp "/>Figure 6.1 System continues to start7, the direct input passwd can change the root password650) this.width=650; "src=" Https://s5.51cto.com/wyfs02/M00/97/DC/wKiom1k0F9Cg-e4EAAAPQO6DLL807
One, blog:Second, edit the login interface
Enter User name password
Show welcome message after successful authentication
Lock after entering three times
Three, multi-level menu
Level three Menu
Select to go to the respective sub-menu
Required Knowledge points: List, dictionary
You can exit to the previous menu at any time
Job Two:I wrote it by myself:#!/usr/bin/envpython#-*-coding=utf-8-*-#AUTHOR:d uwentaousername=[' Duwentao ', ' Liuxiaohui '] #存储
PWD Displays the current directory CD (change directory) Cd/ls view all files under the current directory Ls-l list the current directory details file information CD. Go back to the previous directory vim. Test creates a hidden file ls-lh h = Human user-friendly Display file list (including file size K) ls-a Show hidden file Ls-lha view hidden file Edit file vim filename Press I after entering insert mode after writing the file, press E SC key, then press SHIFT +: then enter the WQ key and press
Test instructionsThere are m stacks of poker on the table, and the number of cards per pile is ni (i=1 ... M);Two people take turns, each step can choose a bunch and take away any cards;The poker on the table is all taken out, then the game is over, and the last person to pick the card is the winner.ExercisesNimbo Game (Nimm game)First of all heap Nim-sum = N1 ^ N2 ^ ... NMAnd thenRes =nim-sum ^ NiIf res That is, for the rest of the situation is a must-fail state. Then this is a winning scheme.T
restart the line.Here you need to set up a few initial configuration of the system, choose Next to continue the next step:The other steps are not important directly to the next step, mainly here, the non-administrative meaning is almost the user who needs to log in when you use the basic operation:If you install the system when the error occurred, ignore it, continue to install:Finally successfully entered the operating system,Using Xshell to connect to the SSH protocol CentOS: Since the SSH pr
Give your painter software users a detailed explanation to share a tutorial on painting a sleeping boy.
Tutorial Sharing:
First look at the effect chart:
Some friends asked me for my painting process so I did a simple tutorial that I hope will help you: P Tools: Painter 6.0 Extraordinary 510 quadrochromatic will not say, anyone will draw: P is mainly introduced in the process of coloring the first part is the
This year's agile conference is not much of an event. The specific situation, the people who have participated will know, I will not say more.
But I was impressed by Ms. Linda's speech and I felt very often, so I had to share it with you.
Ms. Linda, a 50-year-old doctor who gave us a lecture at the age of 70, had to be admired for that. But what is really admirable, as she herself says, is that she proves that agility is like that.
How agile is. Instead of sharing agile methodologies with us,
Hello, I'm an old boy. Education 26-year-out class student xxx! Today I share with you is "old boy----my choice is not wrong" Here are the points I want to share:1, why do I choose the old boy?2, technology and thought which is more important?3. Is there a gap between us?4, you can be stronger than me, but I can't be worse than you1, why do I choose the old
Sockets are also commonly referred to as "sockets," which describe IP addresses and ports, and are a handle to a chain of communication, where applications usually make requests to the network through "sockets" or respond to network requests.Sockets originate from UNIX, and one of the basic philosophies of unix/linux is "Everything is file", and the file is operated with "open" "Read and Write" "Off" mode. Socket is an implementation of this pattern, the socket is a special kind of file, some of
Test instructionsNim question, ask you the first person how many kinds of plan to takeIdeas:When all is different or complete, then let the value differ or each numberIf the result is less than the current number, it means that you can take the different or this number of pebbles from the heap.Ans on + +/************************************************author:d evilcreated time:2016/5/29 11:31:46***************** ******************************* */#include#include#include#include#include#include#i
!") + - elif(Username +"\ n")inchLcont: the Print("your account has been locked! Please contact admin!") * Break $ Else:Panax NotoginsengRel_passwd_index=allname.index (username)#The index of the account in the list of users, the index of the list of users and the index of the password list is corresponding, so we also > took the account password in the password list index -Rel_passwd=allpasswd[rel_passwd_index]#ta
BEIJING, August 22, according to the "Central Society" 22nd reported that the Philippines love to take pictures, Philippine State 3 cities are listed in the "World of selfies" list of the top 10, but not long ago, 1 Filipino teenagers armed with a gun, but suspect because "button" shot hit the head, become a standard risk demonstration example.Philippine TV News reported that the incident occurred on June 18, the 15-year-old teenager a handheld phone, another hand-held 9-centimetre gun pointed t
Practical development of COCOS2D-X Project: Analysis and realization of the basic class of Kungfu boyCocos2d-x Real-time project development: basic class analysis and implementation of Kung Fu Boys-course overview
Analysis and implementation of basic tool class of game project
Analysis and implementation of heroic entity class of game project
Analysis and implementation of a monster entity class with simple AI
I. Analysis and implementation of basic tool classes
Introduction
Advanced Architect Series Video Course 6-centos7.1+openstack L Edition global latest real-world document sharing (top)Advanced Architect Series Video Course 7-centos7.1+openstack L Edition global latest real-world document sharing (next)http://blog.oldboyedu.com/openstack/Advanced Architect Series Video Course 6-centos7.1+openstack L Edition global latest video commentary (top)Advanced Architect Series Video Course 7-centos7.1+openstack L Edition global latest video tutorials (next)http://blog.o
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.