Nic network configuration basics in Linux-Linux Enterprise Application-Linux server application information. For more information, see the following section. By: nest of xwg999
The ifconfig command allows the LINUX core to know some network interfaces such as software deliv
, using awk to fetch the passwd file, the third column of line three to redirect to/tmp/oldboy/ In the Test.txt file. 5, on the basis of the title 3, the request to delete the file with the command RM prompts the following to prohibit the use of RM , and make the effect permanent effect. [Email protected] oldboy]# rm-f passwdDo not use RM command.6, on the basis of the title 3 , delete /tmp/oldboy/ under passwd other than the file. 7, on the basis of the title 3 , please print the/etc/passwd fil
occupied by the information in the kernel. However, if the parent process is older than the child process end, the child process becomes an orphan (Orphand) process. The orphan process is passed on to the Init process, and the Init process becomes the parent process of the process. The INIT process calls the wait function when the child process is terminated.Of course, a bad program can also completely cause the exit information of the child process to remain in the kernel (the parent process d
User and Rights Management in LinuxUnlike window's single-user system, the Linux operating system is designed to follow a multi-user, multi-tasking philosophy. In this case, the security issue is very important, different users, different user groups between the privacy protection, security management is very necessary. For this problem, Linux has a different user, different groups for the file has the perm
boot method for the Apache of the RPM installation package is
/ETC/RC.D/INIT.D/HTTPD start: Starting in absolute path
service httpd start: Managing with service commands
Service Network Restart,reahat specific commands
Service: Is fixed to the default path of the system to find, does not search the local path
So only the RPM package can be managed
2) The source package can only use the absolute path for service management:
/user/local/apac
1, Shell 1.1, IntroductionThe shell is meant to mean "shell", a "shell" program that surrounds the Linux kernel, and all the tasks that the user completes on the operating system are implemented through the interaction of the shell with the Linux system kernel.In addition to the default Bourne again Shell (bash) under Linux, there are many other shells, such as C
, generally everyone's computers are more than four partitions, because in the extended partition, you can also divide the logical partition. Similar to a tree structure.(3) Logical partitioningis to expand the partition division.Next is the legend for several sets of partitions:(1) Installing Linux with unpartitioned space(2) Use a space that is not in useAfter you have formatted the original partition, install the system(3) The disk space of the ope
Linux Basics Help Document View-2014.2.11---common commandsFirst man: Related commands Whatis1, man manual find formatInput? Keys, looking forward, such as-H, will search for rows containing "-H"-Input/Key, backward lookup, such as/-k, will search backwards for "-K" rowsPress N or N (next) to view the previous next related match.2, where the man handbook is storedYou can view the location of manpage by Manp
1. Summary of the directory structure of the system/File System entry, highest level directoryThe command required by the/bin base system is the command required by the smallest system, such as Ls,cp,mkdir. The files in this directory are executable and can be used by the average user/sbin most of the commands involved in system Management, is the super-user root executable command storage, ordinary users do not have permission to execute this directory command, this directory and the followingT
application of commonly used formatting commands:Mkfs. File system TypeFor example, the command to format a partition/dev/sdb1 as a EXT4 file system is:Mkfs.ext4/dev/sdb16. Set the label (partition name) for a partition (see Linux System Management P405)1) Master the function of the E2label command: Set or view the label name of a device.2) Flexible Application E2label Command set Label:A) For example: The command to view the label of the/DEV/SDB1 pa
Introduction to Linux Basics
Linux Basic Operations
There are two ways to operate a Linux system, one is to use the mouse keyboard and other input devices directly on the graphical Interface X window operation, the other is through the input text command to operate on the console. The various
that stores data that is often changed;Cache Application Cache DataLib Variable state informationLocal Variable Data for/usr/localLock lock filesLog log files and directoriesOpt Variable Data for/optRun Data relevant to running processesSpool Application Spool DataTMP temporary files preserved between system reboots/proc:基于内存的虚拟文件系统,用于为内核及进程存储其相关信息;它们多为内核参数,例如net.ipv4.ip_forward, 虚拟为net/ipv4/ip_forward, 存储于/proc/sys/, 因此其完整路径为/proc/sys/net/ipv4/ip_forward; /sys:sysfs虚拟文件系统提供了一种比proc更为理想的访问内核
Linux Log Basics
First, we will describe the basic knowledge about what Linux logs are, where to find them, and how they are created. If you already know this, skip to the next section.
Linux system logs
Many valuable log files are automatically created for you by Linux. You
Linux notes _ KERNEL basics and console-general Linux technology-Linux programming and kernel information. For details, see the following. Author: the past
1. linux Structure
Kernel space:. kernel modles
User space: lib appliction shell Xwindow
The kernel is fixe
Basics of connecting OCI to Oracle in Linux ---- configuring Instant Client to connect to oracle Database
Some time ago, a brother posted a post on my blog about how to use OCI to link oracle Database Configuration methods, A lot of things in that article have not been clearly explained. I can understand that people seem to be in the fog. Oracle's reputation was not covered, and the old man was so anxious t
Verification ProcessThe user enters the account number and the password, the Linux takes the account which you enter to obtain the salt (in order to solve the same password to generate the different password encryption result, mixes the salt to differentiate), then uses the salt+ you entered the password to carry on the cryptographic algorithm operation, obtains the result and the system is consistent, if consistent, The validation passes.For example
1. The correspondence between the hardware device and the file nameIn the Linux system, each device is treated by a file.
Equipment
The file name of the device within Linux
IDE Hard disk
/DEV/HD[A-D]
SCSI HDD
/DEV/SD[A-P]
U disk
/dev/sd[a-p] (with SCSI hard disk. Sample)
CDROM
/dev/sro
2. Structur
Chapter III host planning on disk partitioningIDE HDD/dev/hd[a-d]SCSI/SATA/USB/DEV/SD[A-P]USB Flash Disc/dev/sd[a-p] (same as SATA)Floppy disk drive/dev/fd[0-1]Printer 25-pin:/dev/lp[0-2]USB:/DEV/USB/LP[0-15]Mouse Usb:/dev/usb/mouse[0-15]Ps2:/dev/psauxCurrent Cdrom/dvdrom/dev/cdromThe current mouse/dev/mouseTape drive IDE:/dev/ht0SCSI:/dev/st0Fourth Chapter 4th, installing CentOS 5.x and multi-boot tipsFile system typeEX2/EX3: Is the type of file system that
application on Linux:二进制程序:/bin,/sbin,/usr/bin,/usr/sbin,/usr/local/bin,/usr/local/sbin库文件:/lib,/lib64,/usr/lib,/usr/lib64,/usr/local/lib,/usr/local/lib64配置文件:/etc,/etc/DIRCTORY,/usr/local/etc帮助文件:/usr/share/man,/usr/share/doc,/usr/local/share/man,/usr/local/share/docFile types under Linux:-(f): Ordinary documentsD: Catalog fileB: Block deviceC: Character deviceL: Symbolic Link file (soft link)P: Pipeline
password.Types of usersLinux users fall into three categories:
Normal User
Root user
System users
Normal UserOrdinary users are the real users of the system, such as Old Mo's user is cclove. Ordinary users usually use /bin/bash as the login shell and the /home/user name as the home directory.In general, ordinary users only have the right to create files in their own home directory and temporary directory, the average user ID number is usually greater than or equal to 1000.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.