Daily Linux Management and Maintenance & mdash; software management I. introduction based on our operating system experience, we use the operating system to actually use the application software running on the operating system, and use the software
The chmod command to modify the file and folder permissions is attached with the instance syntax: in the chmod [who] [+ |-|] [mode] file name command, each option is defined as a user, that is, the owner of a file or directory. G indicates the same
Linux file archive management-tar1.1tar introduction the tar command is a common method for compressing and decompressing files in Unix/Linux systems. it can work in almost any environment and has the permission of all users. ------------------------
The link and link options of the dynamic library-L,-rpath-link,-rpath link how the program uses the shared library during connection, you must be able to find the location of the shared library during running. In linux, the executable program
Ubuntu has no display. The vnc login resolution settings encountered a problem during the test: The VNC was not started successfully, the interface was lost, and the desktop system crashed. Then, execute the following three commands in sequence, and
In Solaris, how to configure FCHBA to an Ethernet card, IPFC, can easily set an FCHBA card to an Ethernet card, which is of great significance in reality. In some work sites, if you need to copy a large amount of data through the network, it is
Hpux operating system tape backup and recovery I. scan the tape drive (note: Clean the drive regularly) ioscan-fnCtapeClassIH/WPathDriverS/WStateH/WTypeDescription... hpux operating system tape backup and recovery I. scan the tape drive (note:
The application and production method of Patch in Linux is introduced because during the u-boot porting process, there are several common files to be modified. it is too troublesome to manually modify each time. Patch creation can solve this problem.
Three different methods (fork, exec, source) fork (/directory/script. sh) fork is the most common, that is, directly using/directory/script in the script. sh to call the script. sh script. run a sub-sh... three different methods (fork, exec, source)
I. ARM-LinuxARM-Linux-2.6.173GUSBModem: huaweiE220 (WCDMA), huaweiEC156 (EVDO) arm-linux at least need to support USB host, USB storage, usb fs, USB serial II. linux driver option. option in clinux. c is. ARM-Linux
ARM-Linux-2.6.17
3g usb Modem:
CentOS is a system that is highly recommended for building servers in linux. it is generated by RedHatEnterpriseLinux according to Open-source regulations to remove non-open-source software, it can be said that it is a good choice for stability and
I recently learned the operating mechanism of the device model and trained on books and online materials. my appearance & amp; 20284; has changed my network permission.
I recently learned the operating mechanism of the device model and trained books
I had a hard time installing the deep player and deep audio and video for one day yesterday. this error is always caused by dependency failure. There are many solutions on the Internet, but none of them can.
I had a hard time installing the deep
For Apache, you only need to modify the apache configuration file.
For Apache, you only need to modify the apache configuration file/etc/httpd/conf/httpd. conf.
There is an example file in it. you only need to configure it.
#
# ServerAdmin
Computer CMOS records various hardware parameters and is embedded in the memory on the main board. BIOS is the first program executed by the computer. Introduction to multiple Linux operating systems
Computer CMOS records various hardware parameters
A. add A file to an existing backup file.-c: create A backup file.-d: compare the differences between the backup file and the files in the current directory. when-k unlocks the backup file,
Other common tools
1.bzip2
Note: bzip2is the compression
That is to say, it will reject receiving too short passwords, passwords similar to previous passwords, words in the dictionary as passwords, or passwords that are too easy to guess.
Format
Passwd [user]
If you want to change your password, you
Modify selinux = disabled in the/etc/SELINUX/config file, and then restart the server.
Disable SELinux in Linux
1) it takes effect permanently after restart:
Modify selinux = disabled in the/etc/SELINUX/config file, and then restart the server.
2
Linux dual-Nic intranet/Internet settings (Raspberry Pi) Raspberry Pi dual-Nic internet/intranet settings, there are the following methods. 1) use a wired network to connect a PC to a gateway. 2) the other is wired to the intranet and wireless to
Vim copy and paste explores Vim as one of the best text editors. Using vim to compile documents is really cool to write code. Every time you learn a new feature of vim, it will greatly improve productivity. Some people have been using vim for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.