Article Title: how to fix linux ROOT Password loss. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
When the
1. temporarily modify the host name display host name: spark @ master :~ $ Hostnamemaster modify host name: spark @ master :~ $ Sudohostnamehadoopspark @ master :~ $ HostnamehadoopPS: The above changes are only temporary changes, and the changes are
Article title: Linux network setup tips: how to implement multi-Nic bonding. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems,
Article Title: three security vulnerabilities have been detected in LinuxKernel. Linux is a technology channel of the IT lab in China. Security organization SecurityFocus, a security organization that includes desktop applications, Linux system
Because the project needs to add processing for webp format images, and webp format images must be php5.5 or later versions, you have to upgrade the server's php. The upgrade is not required, but there will be new features and new features after the
To learn how to install apache, you need to enable port 80. since firewalld is used by default in centos7 and later versions, the iptables setting method on the Internet is no longer used. I think iptable will not be used anyway, simply move to the
Article Title: how to set the session duration in apache. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
In
Xfs is the default file system type of CentOS7.0. different file system types have different creation, check, and adjustment commands. Adjust the Xfs partition size (can only increase): lvextend-L120G/dev/mapper/centos-root # increase to
First, ensure the time synchronization between the two machines and configure ssh. Method 1 install yum source: the default installation path of yum is/etc/drbd. d/# rpm -- importhttp: // Others
First, ensure the time synchronization between the two
Servers with good security protection still need to be checked regularly. The following are some simple methods to determine whether the server is intruded: 1. view the logon log/var/log/secure, check whether some abnormal login information exists.
Abstract: two methods are available for KVM virtual machine network configuration: NAT and Bridge. The configuration principles and steps of Bridge. The Bridge mode is applicable to the virtualization of server hosts. Question? After the client is
DigitalOcean has been used for a long time. a process was killed when PHP was compiled a few days ago. After I spoke with others, I found that the memory was exhausted. In fact, it was because the MySQL process at that time consumed a lot of memory,
Article title: analysis of the development trend of the operating system in the next five to ten years. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel
Article title: R-Proxy-set up using Apache. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Duncan Lo
Article title: The Vista system will surely show the limelight if it is better than Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research,
These two days just good to do PHP-FPM memory optimization, in the view of PHP-FPM memory usage found locale-archive memory 96 M, the file is language, environment, font-related index files, because many languages are useless, they are deleted to
Article title: VMware may infringe the Linux copyright. Linux is a technology channel of the IT lab in China. Some basic categories including desktop applications, Linux system management, kernel research, embedded systems and open source such as
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.