unix and linux system administration handbook

Alibabacloud.com offers a wide variety of articles about unix and linux system administration handbook, easily find your unix and linux system administration handbook information here online.

Unix/linux System Management Technical Manual (1)----scripts and shells

pipelines are generally linear, but it is often helpful to insert a copy of the data stream from the middle into a file, or send it to a terminal window. This can be done with the tee command, which sends its standard input both to the standard output and to a file specified on the command line. You can think of it as a tee on a pipe.For example, the following command sends the output value of date to the standard output and redirects the output to the Date.txt file:Date tee ./Date:notoginseng:

Unix/linux System Management Technical Manual study notes--shell

Date Created: 2016/02/29Update on: 2016/02/29 Shell variables cannot be left blank on both sides of the equals sign, otherwise the shell will mistake the variable name for the command name Variables enclosed in double quotes can be replaced with * and? The file name matches the meta-character extension) and the variable extension, and the single quotation marks do not handle the variable. The left quotation mark ', which handles a mechanism similar to a double quote, is able to execu

MD5 as the file name. The machine's unique code has the CPU information of the computer and the MAC address, both of which need to be obtained under the Linux or Unix system.

You can use the machine (computer) unique code + upload IP + current timestamp + GUID (+ random number), and then MD5 as the file name. The machine's unique code has the CPU information of the computer and the MAC address, both of which need to be obtained under the Linux or Unix system.Get CPU information from your computerfunction Onlyu () {$a = ";$b = Array ();if (function_exists (' exec ')) {if (mailto:

System invoke action File--"Unix/linux Programming Practice Tutorial" reading notes

1. The WHO command reads the contents of the system log to display the user who is currently logged in.2, Unix system to keep the data in the file, you can call the operation file through the following system:Open (filename, how) creat (filename, mode) read (FD, buffer, AMT) write (FD, buffer, AMT) Lseek (FD, distance, base) Close (FD)3, the process of the file r

"Linux&unix--exec and Fock system calls"

relatively long-term.(5) A program can act as a running program for multiple processes, and a process can run multiple programs.(6) The process has the ability to create other processes, and the program does not. EXEC and Fock briefThe exec system calls the process to reinitialize from the specified program, although the process is still in progress, but the program has changed . The Fock system call creat

Linux/Unix system Connection Library usage (zz)

use GCC (1) because the LD (1) interface may change. 3. Shared Library is loaded when the program starts. When an application loads a shared library, other applications can still load the same shared library. Based on the usage of Linux, the shared library also has other flexible and exquisite features: Updating the library does not affect the use of the old, non-backward compatible version of the application; when executing a specific program, it

Use a PHP script to modify the password of a Linux or Unix system _ PHP Tutorial

Use a PHP script to modify the password of a Linux or Unix system. Required Tools and installation: you must install the following tools and software: Shell script for password modification; Sudo access; ApacheorLighttpdweb server; PHP server program. Step 1: install the required tools and installation: You must install the following tools and software: -Shel

Practical: Use PHP script to modify Linux or Unix system passwords

This article describes how to use a PHP script to modify a Linux or Unix system password. Required Tools and Installation: You must install the following tools and software: – The shell script that modifies the password; –sudo access rights; –apache or LIGHTTPD Web server; –php Service-side program. Step 1: Install shell scripts that can modify user passwords Thi

Accurately obtain the system time in Linux/Unix

In the analysis of live555CodeOccasional acquisition: If (fisfirstpacket) {// record the fact that we're starting to play now: gettimeofday ( fnextsendtime, null );} UNIX and Linux time systems start from epoch, in seconds. Epoch is the Greenwich Mean Time (Greenwich Mean Time) specified at 00:00:00, January 1, January 1, 1970. At present, most Unix systems

View the CPU count, memory size, and system Count of Unix/Linux

From: http://hi.baidu.com/rocsky/item/9376ef4d002397ea1e19bcd8 I. Aix 1. view the number of CPUs: (1) Since aix5.3, smtctl introduces the SMT (simultaneousmulti-threading) function for power5 machines. It allows two processing threads to run on the same processor, for an operating system, a physical processor logically becomes two processing units (logical processor ). SMT function enabled: the number of logical CPUs is twice the number of physical C

Linux system hardware information of UNIX toolbox annotation 1

This series of articles provides some personal notes on the Unix toolbox.System Running kernel and system information: # Uname-#Obtain the kernel version (and BSD Version) # Lsb_release-#Display any LSB release version information # Cat/etc/Suse-release # Get SuSEVersion # Cat/etc/debian_version # Get Debian version Use/etc/distr-release, where distr (release code) = LSB (UBUNTU), RedHat, Gentoo, Mandrake,

Unix/Linux system process resource limit parameters

The following list contains the single-process resource parameter limits for Unix/Linux systems. The rlimit_core parameter is much used in server development (when core dump is required ). Code snippet: memset(limit, 0, sizeof(limit)); limit.rlim_cur = RLIM_INFINITY; limit.rlim_max = RLIM_INFINITY; if(setrlimit(RLIMIT_CORE, limit)) {spd_log(LOG_WARNING, " unable to disable core size res li

Linux/unix System Programming Manual source code compilation

My operation, I download the book source code on the official website, after the Windows decompression FTP tool to the Linux virtual machineThen make finds an error such as:No rule to make target '. /libtlpi.a ', needed byDepressed for a long time!Scenario: The Source code compression package FTP to the virtual machine in the decompression, make is successful!Attention, habits: always unzip in LinuxLinux/unix

Unix Linux | File system

.cut[option] [parameter] is used to display the specified part of the row, deleting the specified field in the file. Cut is often used to display the contents of a file, similar to the following type command. (http://man.linuxde.net/cut) -B: Displays only the contents of the direct range specified in the row; -C: Displays only the characters of the specified range in the row; -D: Specifies the delimiter for the field, and the default field delimiter is "tab";

Bastille: a classic Linux and Unix System Security Program

at this list of dangerous TCP/IP ports. You need to determine whether to open ports for certain services in the firewall, such as SSH, DNS, or Web servers. Bastille can accept the port number or service name based on the/etc/services file. This page lists ICMP types. You can refer to them when you want to monitor them or know what they are. You cannot block all ICMP messages. Otherwise, basic network functions may be confused. The default setting of Bastille is quite good. This link is a good g

Unix/linux System Programming

you modify a file, you need to hand over the three commands again. With makefile, just a simple make command is all done.Makefile Write as followsTEST:PROG.O CODE.O gcc prog.o code.o-o testprog.o:prog.c code.h gcc -C prog.c-o prog.ocode.o:code.c Co De.h gcc -C code.c-o code.oclean :rm -F *.O TestMore advanced, you can also add macros to avoid "hard-coded" occurrences in makefile.OBJS =gcc=-Wall Test: $ (BOJS) -o test $ (CFLAGS) prog.o:prog.c code.h -C

Unix/linux System Management Technical Manual Read (12)

common options, but check the mans page for others.cut: Dividing the rows into fieldsThe cut command selects a number of parts from its input lines and prints them out. The common use of this command is to extract a number of fields that are qualified, as shown in the 32-page example, but it can also return several extents bounded by the column boundaries. The default qualifier is Refer to the contents of the UNIP command section below for an example of cut usage, as described belowSort: Sortin

Unix/linux System Management Technical Manual Read (vii)

2016.8.22 9:00-9:40The keywords database can become out of date. If You add additional mans pages to your system, the need to rebuild this file with Mandb (Ubuntu, SUSE), Makewhatis (R Ed Hat), or catman-w (Solaris, HP-UX, AIX).keyword refers to a library that may have expired. If you want to add a man manual page to your system, you need to construct the library file, use the MANDB command on Ubuntu, SUSE,

Linux/Unix Command: make the new disk partition take effect without restarting the partprobe System

version. Name Partprobe-inform the OS of Partition Table changes Synopsis Partprobe[-D] [-S] [Devices...] Description This manual page documents brieflyPartprobeCommand. PartprobeIs a program that informs the operating system kernel ofpartition table changes, by requesting that the operating system re-readthe partition table. Options This program uses short

Unix/linux System Management Technical manual read (b)

monitor system resources such as disk space availability All of this work is likely to automate a variety of out-of-the-box monitoring systems to help system administrators accomplish this task. WordsInstallations System Facility EquipmentRequire need to ask for ordersVigilant vigilant watchful attention of the vigilance of theSupervision supervision and managem

Total Pages: 5 1 2 3 4 5 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.