command to edit the/etc/hosts file and change the IP address of the corresponding host name.Note: Do not directly change the IP address in the CDE environment. Exit the CDE environment and complete the modification process.
15. Monitoring of common log files
File Name Content Monitoring Method/Etc/rc. Log: how to read text files,/Var/adm/syslog. Log note the prompt information and corresponding/Var/adm/SW/
Group PolicyThe function is very powerful, and the importance of system administrators is self-evident. Similarly,Manage templatesIs an important part of group policies. They provide policy information for group policy management projects.
The management template is saved as a. adm file in the INF folder of the Windows 2003/XP/system folder. These. adm files are essentially some text files. Four template f
Linux: varlogmessagesAIX: binerrpt-a (release. out) Solaris: varadmmessagesHP-UX: varadmsyslogsyslog. logTru64: varadmmessagesWindows: saveApplicationLogandSystemLogas. TXTfilesusing
Linux:/var/log/messages AIX:/bin/errpt-a (redirect this to a file called messages. out) Solaris:/var/adm/messages HP-UX:/var/adm/syslog. log Tru64:/var/adm/messages Windows: save Ap
Solve $ last | more/var/adm/wtmpx: valuerelargefordefineddatatype # cd/var/adm #/usr/lib/acct/fwtmp lt; wtmpx gt; wtmpx. asciieditwtm uses the last reported Value too large to solve $ last | more/var/adm/wtmpx: value too large for defined data type # cd/var/adm #/usr/lib/acct/fwtmp /var/
How to enable third-party Chrome plug-in and third-party chrome
How to install a third-party Chrome plug-in, first download the file with the CRX extension to the local, remind you that you cannot directly open the installation on this website, if the installation fails, you can find this CRX file and drag it to the extension page to install it!
However, when we install a third-party Chrome plug-in locally and find that it cannot be enabled, what should we do?
The prompt is as follows (see): "
parameters in the system kernel.Let's take a look at how the xargs command is used with the find command and give some examples.The following example finds every common file in the system, and then uses the xargs command to test which files they belong.# Find.-type f-print | xargs file./. Kde/Autostart/Autorun. desktop: UTF-8 Unicode English text../. Kde/Autostart/. directory: ISO-8859 text......Search for the memory dump file (core dump) in the system and save the result to the/tmp/core. log f
, and finally arrange them in ascending order adm:x:3:4:adm:/var/adm:/sbin/nologinbin:x:1:1:bin:/bin:/ sbin/nologindaemon:x:2:2:daemon:/sbin:/sbin/nologinlp:x:4:7:lp:/var/spool/lpd:/sbin/nologinroot:x:0:0:root:/ Root:/bin/bash[[emailprotected]wang]#head-n5passwd1|sort-t:-k3 After -n//-t is the delimiter, the third row is sorted,-n pure digit sort root:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/ nolo
, write, and execute permissions for all users, and reclaim the appropriate write permissions:# ls-lDRWXRWXRWX 2 Sam adm 4096 October 20:14 File6-RWXRWXRWX 2 Sam Adm 0 October 01:01 http3.conf-RWXRWXRWX 2 Sam Adm 0 October 01:01 httpd.conf# Find. -perm-7-print | Xargs chmod o-w# ls-lDrwxrwxr-x 2 Sam adm 4096 October 20
satisfies a match after the jumpT meet jump when match is not metDisplay the contents of the third line of the file[Email protected] ~]#sed-N 3p/etc/passwd to the third row p prints outdaemon:x:2:2:d aemon:/sbin:/sbin/Nologin[[email protected]~]#sed-N'1,3p'/etc/passwd displaying 1-3 rows of contentroot:x:0:0: root:/root:/bin/bashbin:x:1:1: bin:/bin:/sbin/nologindaemon:x:2:2:d aemon:/sbin:/sbin/Nologin[[email protected]~]#sed-N'1,3!p'/etc/passwd Plus exclamation point is all but 1-3 show everyth
, and login shell resources to the new account. The account you just added is locked and cannot be used.1. Add a new user account using the Useradd command with the following syntax:useradd 选项 用户名Parameter description:Options:-C Comment Specifies an annotative description.The-D directory specifies the home directory, and if this directory does not exist, the-m option can be used to create the master directory.The-G user group specifies the user group to which the user belongs.-G user Group, user
C language Setpwent () function: Read the account data from the password file from the beginning
Header file:
#include
To define a function:
void setpwent (void);
Function Description: Setpwent () is used to refer the read-write address of getpwent () to the beginning of the password file.
Example
#include
Execution results:
Root:0:0:root:/root:/bin/bash
bin:1:1:bin:/bin
daemon:2:2:daemon:/sbin
adm:
Tag:oracledba role permissions 1. View All users: select*fromdba_users;
select*fromall_users;
select*fromuser_users;
2. View user or role system permissions (System permissions that are directly assigned to a user or role): select*fromdba_sys_privs;
select*fromuser_sys_privs;
sql>select*fromuser_sys_privs; username PRIVILEGE adm----------------------------------------------------------------------- --zdzq unlimitedtablespace no 3. View the permiss
] [-NRU] Here's N1 -T delimiter: function with the-D one meaning of cut-N: Sorting with pure numbers-R: Reverse Sort-U: To repeat-KN1,N2: Sorted by N1 interval to N2 interval, can only write-kn1, sort N1 field[Email protected] ~]# head-n5/etc/passwd |sortAdm:x:3:4:adm:/var/adm:/sbin/nologinBin:x:1:1:bin:/bin:/sbin/nologinDaemon:x:2:2:daemon:/sbin:/sbin/nologinLp:x:4:7:lp:/var/spool/lpd:/sbin/nologinRoot:x:0
Cut: Intercepting text-specific fieldsNAMECut-remove sections from all line of files-D,--delimiter=delim (Specify field delimiter, default is space)Use DELIM instead of the TAB for field delimiter-F,--fields=list (Specifies the field to display)Select only these fields; Also print any line that contains no delimiter character,Unless the-s option is specified-F 1,3-F 1-3[Email protected] ~]$ CAT/ETC/PASSWDRoot:x:0:0:root:/root:/bin/bashBin:x:1:1:bin:/bin:/sbin/nologinDaemon:x:2:2:daemon:/sbin:/sb
cut_ch.txt |cut-b 2???? [email protected] programming]$ cat Cut_ch.txt |CUT-NB 2[email protected] programming]$ cat Cut_ch.txt |CUT-NB star Stars (7) What's going on in the field? Explanation and explanation:)Why is there a "domain" extraction, because the B and C just mentioned can only extract information in a fixed-format document, and for non-fixed-format information is helpless. This is where "domain" comes in handy. If you look at the/etc/passwd file, you will find that it is not the same
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.