It's really easy.
Procedure
Modify the RedHat-release file: Red Hat Enterprise Linux 4
Modify the profile file: Add appropriate environment variables: ORACLE_HOME, oracle_sid, etc.
Create the oracle_setup directory accordingly. Set the permission to 777.
Create the ORACLE_HOME directory accordingly. Set the permission to 777.
Create a DBA User Group
ORACLE 10 Gb installation in LINUX:
First, two images are shown:
DBA is the direction of hard work. ORACLE DBAs are all-embracing. Even LINUX/UNIX cannot be used. It also makes p oracle.
Two parts:
1. red hat enterprise linux 5 Installation
Difficulties (For Me Now): 1.1YUM local source configuration; network related information, not to mention. because it
Install GCC 4.9.2 on Red Hat Enterprise Linux Server 6.5
Now many programmers are using GCC to better apply GCC. Currently, GCC can be used to compile programs in C/C ++, FORTRAN, JAVA, OBJC, ADA, and other languages. You can select the language to install. This article describes how to install GCC in Linux by taking GCC4.9.2 installation in RedHat Linux as an ex
Basic Regular Expressions (Regular expression)
match any character
\{n,\}
match previous character repeat at least n times
*
repeat 0 or more times
\{n\}
match before character repeats N times
.*
matches any number of arbitrary characters
\ (.. \)
tag match character
["
matches any single charact
System environment:
[Root@host conf]# More/etc/issue
Red Hat Enterprise Linux Server Release 5 (Tikanga)
Kernel \ r \m
Problem phenomenon:
[root@ha]# Locale
Locale:cannot set LC_CTYPE to default locale:no such file or directory
Locale:cannot set Lc_messages to default locale:no such file or directory
Locale:cannot set Lc_all to default locale:no such file
no graphical interface installedConfigure the Yum source first (Cd.repo is manually created)
# Vim/etc/yum.repos.d/cd.repo
[Rhel6.0-server]
name=rhel6.0
Baseurl=file:///media
gpgcheck=0
enabled=1
Save exit
After inserting the disc into the optical drive, run
Mount/dev/cdrom/media
Run the Yum groupinstall-y "X window System" "Desktop", and when you are finished installing, you can
If you want to boot automatically into the graphical interface, you c
1. First download the need to install the image, you can go to the official website to download, but need to register the account, more trouble, I found on the network, links as follows (for reference):Rhel-server-6.4-x86_64-dvd.isoHttp://pan.baidu.com/s/1dFfoCwxRhel-server-6.5-x86_64-dvd.isoHttp://pan.baidu.com/s/1eRKnOqeRhel-server-6.6-x86_64-dvd.isoHttp://pan.baidu.com/s/1o8KnJBkRhel-server-6.7-x86_64-dvd.isoHttp://pan.baidu.com/s/1i45UBdVRhel-server-7.0-x86_64-dvd.isoHttp://pan.baidu.com/s/1
Prospect:1. Install the x86_64 version of the CentOS 7 system (or the corresponding version of Red Hat, etc.) to the GNOME Desktop edition.2. Download and install and activate Xmanager Enterprise 5 for connection access to Linux systems, data transfer, etc.3. Download the unpacked Oracle 11g R2 for Linux package and pl
Red Hat 7 Two ways to change the root passwordMethod One:1. Restart the system and press "E"650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/7F/2B/wKiom1cVpPjD9TXYAABWpbuZXsU479.jpg "title=" 1.jpg " alt= "Wkiom1cvppjd9txyaabwpbuzxsu479.jpg"/>2. At the end of the linux16 line, add the following information and press "Ctrl+x" to start650) this.width=650;
Desktop]#
Prevent root administrator from logging in
First use the Vim text editor to open the main configuration file of the SSHD service, then remove the pound sign (#) before the 48th line #permitrootlogin Yes parameter, and change the parameter value Yes to No, so it is no longer
Allows the root administrator to log on remotely.
[root@localhost Desktop]# vim /etc/ssh/sshd_config
..................Omit some output information..................47 #LoginGraceTime 2m
48 PermitRo
Partition encryption technology in Red Hat Linux 7
1. Introduction to partition EncryptionThe International Security Organization has adopted a solution to encrypt disk content because anti-virus software cannot guarantee higher security. Therefore, we adopt proactive security solutions in areas with high confidentiality levels, while partition encryption is one
Simple setup of Varnish in Red Hat Linux 7
Host environment rhel6 selinux and iptables disabledLab host 172.25.254.2 varnish172.25.254.3 apache172.25.254.4 apacheFirst obtain the two packagesVarnish-3.0.5-1.el6.x86_64.rpm varnish-libs-3.0.5-1.el6.x86_64.rpmInstallYum install varnish-*-y### Configure a backend serverVim/etc/varnish/default. vclBackend xp1 {
. Host
Basic ACL settings for Red Hat Linux 7
1. ACL introduction:
The Access Control List (ACL) is the command List of the vro and vswitch interfaces. It is used to Control incoming and outgoing packets on the port. ACL applies to all routing protocols, such as IP, IPX, and AppleTalk.
2. How to view the permission list:
[Bkjia @ foundation2 Desktop] $ ls-l file-Rw-r --
Xinetd.serviceXINETD.SERVICE-XINETD A powerful replacement for Inetdloaded:loaded (/usr/lib/systemd/system/xinetd.service; disabled; vendor preset:enabled)Active:active (running) since Thu 2016-03-10 08:51:30 EST; 17s agoAllow TFTP traffic when the firewall is turned on, perment parameter indicates permanent, no this firewall rule fails after reboot.Firewall-cmd--add-service=tftp--permenentRestart Firewall service to take effect of the above rules[Email protected] ~]# systemctl restart Firewall
Basic features of the directory:/bin: Store commands for ordinary users/sbin: Holds commands that administrators can execute/home: Store the normal house directory as a three home directory for/home/zhangsan/root: Administrator's home directory/etc: directory where configuration files are stored/boot: Store startup-related files/usr: User-defined related programs or files/proc: Storage directory of kernel parameters and hardware parameter related files/var: file storage directory with frequently
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.