A. Linux directory structure
Typically, the root file system takes up less space because most of the files do not need to be changed frequently, and a strict file and a small infrequently changing file system are not susceptible to damage.
In addition to a possible system boot image called/Vmlinuz standard, the root directory generally does not contain any files. All other files are in subdirectories of the root file system.
In the root directory of Linux, there are the following directories:
. /glibc-2.15/configure --prefix=/usr--disable-profile--enable-add-ons--with-headers=/usr/include-- With-binutils=/usr/bin Makemake InstallIf prompted to install successfully, go to the shared library where glibc is located:You can see that 2.12 of the old library files are also in the 2.15 version of the library file, and the soft link files all point to the 2.15 version.[Plain]View Plaincopy print?
-rwxr-xr-x 1 root root 1921096 02:16/lib64
.x86_64.rpm:header V3 DSA Signature:nokey, key ID 37017186Preparing ... ########################################### [100%]Package perl-5.8.8-27.el5.x86_64 is already installed[Email protected] rpm]#Mysql5.5 after the cmake to compile, cmake-2.8.12.2.tar.gz so need to download the installation: http://www.cmake.org/cmake/resources/software.htmlTar zxvf cmake-2.8.7.tar.gzCD cmake-2.8.12.2./configure--prefix=/usr/local/cmakeMake make install[Email protected] rpm]# ll/usr/local/cmake/Total 16Drwxr-
Ao you's internal network is not completely roaming (a large number of internal and external network source code can be leaked)
I was wondering if I could prove that I had access to the data of the proud game users. The Administrator found that I only had access to the bbs users.
Rsync unauthorized accessWritable
Rsync 60.28.210.24: I. mx/drwxrwxr-x 8192 19:10:44. -rw-r -- 6036 13:30:47 build.txt-rw-r -- 31 19:10:23 conf. php-rw-r -- 1406 2013/10/21 13:30:49 favicon. ico-rw-r -- 7166 2014/01/13
be written (write)x indicates that the file can be executed (if it is a program)Where: Rwx can also be replaced by numbersR------------4W-----------2X------------1-------------0Let's go:Represents the Add permission-Indicates delete permission= indicates a permission to make it uniqueWhen we all understand the above, then we often have some of the following permissions are easy to understand:-RW-------(600) Only the owner has read and write permissions-rw-r--r--(644) Only the owner has read and
Welcome to: Ruchunli's work notes, learning is a faith that allows time to test the strength of persistence.
Kafka The main shell scripts are[[Emailprotected]kafka0.8.2.1]$ll Total 80-rwxr-xr-x1hadoophadoop 9432015-02-27kafka-console-consumer.sh-rwxr-xr-x1hadoophadoop 9422015-02-27kafka-console-producer.sh-rwxr-xr-x1hadoophadoop870 2015-02-27kafka-consumer-
.
Execute Configure
[Vagrant@rs-1 mysqli]$./configure--with-php-config=/usr/local/bin/php-config--with-mysqli=/usr/bin/mysql_config
Compiling the installation
[Vagrant@rs-1 mysqli]$ sudo make sudo make install
This time you will find that the/usr/local/include/php/ext directory has more than MYSQLI modules
[Root@rs-1 ext]# LL
Total 152
Drwxr-xr-x 3 root root 4096 May 9 05:09 date
Drwxr-xr-x 2 root
Due to work needs, it took some time to study the two built-in special commands of eval and exec. Because not many are used, it is a bit obscure ..
1. Eval
This command is a built-in command in bashshell, which is a little more difficult than other commands. The content following the command is considered as a parameter, but the parameters are scanned twice. The first scan replaces the variables in the parameters, and the second scanThe second scan combines the following parameters as a shell c
Owner ID field of the process accessing the file, the process does not have permission to change the context descriptor of a file, either before or after the change.For example, a process that has a rjc:user_r:user_t descriptor can change the descriptor of a file that has a rjc:object_r:user_games_rw_t descriptor to rjc:object_r:user_games_ro_t, However, it does not have permission to change any of the properties of a file that has a john:object_r:user_games_rw_t descriptor.To view the context
deletingCommand:Rm-i *.logOutput:[email protected] test1]# LLTotal 8-rw-r--r--1 root root one 10-26 14:45 log1.log-rw-r--r--1 root root 10-26 14:45 Log2.log[Email protected] test1]# rm-i *.logRM: Do you want to delete the generic file "Log1.log"? YRM: Do you want to delete the generic file "Log2.log"? Y[email protected] test1]# LLTotal 0[[email protected] test1]#Example four: Delete all the files in the Test1 subdirectory and subdirectoriesCommand:Rm-r test1Output:[email protected] test]# LLTot
deletingCommand:Rm-i *.logOutput:[email protected] test1]# LLTotal 8-rw-r--r--1 root root one 10-26 14:45 log1.log-rw-r--r--1 root root 10-26 14:45 Log2.log[Email protected] test1]# rm-i *.logRM: Do you want to delete the generic file "Log1.log"? YRM: Do you want to delete the generic file "Log2.log"? Y[email protected] test1]# LLTotal 0[[email protected] test1]#Example four: Delete all the files in the Test1 subdirectory and subdirectoriesCommand:Rm-r test1Output:[email protected] test]# LLTot
deletingCommand:Rm-i *.logOutput:[email protected] test1]# LLTotal 8-rw-r--r--1 root root one 10-26 14:45 log1.log-rw-r--r--1 root root 10-26 14:45 Log2.log[Email protected] test1]# rm-i *.logRM: Do you want to delete the generic file "Log1.log"? YRM: Do you want to delete the generic file "Log2.log"? Y[email protected] test1]# LLTotal 0[[email protected] test1]#Example four: Delete all the files in the Test1 subdirectory and subdirectoriesCommand:Rm-r test1Output:[email protected] test]# LLTot
/.oracle/var/tmp/.oracle11gMv/var/tmp/.oracle10g/var/tmp/.oracle+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++are backed up in advance-r-xr-xr-x 1 root root 2436 Oct 6 09:47/etc/init.d/init.crs-r-xr-xr-x 1 root root 5538 Oct 6 09:47/ETC/INIT.D/INIT.CRSD-r-x
you want to take effect immediately, you can execute the following statement: "$ source. Bash_profile (This is the file name.) When the environment variable changes, it takes effect the next time the user logs on.3. Soft ConnectionIn addition, many small partners may have discovered that some files are accessed directly on Mac without setting environment variables. What is this for? The answer is to use a soft connection.3.1 Viewing the Load fileYou can use the Cat command to view the paths fil
/****************************************************************************** * BuildRoot Linux FileSystem * Statement: * In their own file system when the discovery of this buildroot, can be used to directly do file system, so * download their own compiled a bit, found that this is true, so simply try it, first see how the effect. * 2016-2-1 Shenzhen Nanshan Ping Shan village Zengjianfeng **************************************************** *************************/First, reference documents
)
0 means protocol (IP protocol)
Use Socket_desc to refer to the pipe file, which is the same as the file descriptor, and then use the system function read () and write () to read and write data from the pipe file separately.Catalog FilesThis is a special file that can contain both ordinary files and other special files, which are hierarchically organized in the Linux file system starting from the root (/) directory.List the directory files under a directory:Output Example:Drwxr-
) devpts on/dev/pts type devpts (rw,gi d=5,mode=620) Tmpfs on/dev/shm type Tmpfs (rw,rootcontext= "System_u:object_r:tmpfs_t:s0")/dev/sda1 on/boot type EXT4 ( RW)/dev/mapper/vg_magine356wj-lv_home on/home type EXT4 (rw) None On/proc/sys/fs/binfmt_misc type Binfmt_misc (rw) Sunrpc on/var/lib/nfs/rpc_pipefs type rpc_pipefs (rw)/dev/mapper/myvg-mydata on/mydata type EXT4 (rw)#新建用户mysql, and modify the relevant file corresponding to the main genus Group[[email protected] ~]# useradd-r mysql[[email p
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.