Article title: Linux tutorial-online help. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The TurboLinux
Article title: Penguin encounters the worm Lupper variant and is targeted at Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded
The system of the company's server is CentOS6.4. you often need to use the Crontab command to execute a series of application scripts and encounter various problems, some problems encountered during the use of the Crontab command are summarized as
Article title: RedHatLinux released the latest Beta version. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Article title: Linux Network Administrator Manual (3 ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
Article Title: Use a Linux cluster for uninterrupted authentication. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
Ntp server in Linux 1. what is ntp? NetworkTimeProtocol (Network Time Protocol) is a protocol used to synchronize the computer's time. it can synchronize the computer's server or clock source, it provides high-precision time correction. 2.
Linux Memory management-free command
1. free memory management
As a linux system administrator, it is very important to monitor the memory usage status. it helps you to understand the memory usage status, such as whether the memory usage is normal
: Linux File attributes: the default linux permission is in. we can see that the figure is divided into seven columns. what each column represents? I will explain in detail below. in, we can see the default permissions of the test1 file and the test2
Run the $: toptop command to view the memory usage of ubuntu resources, and run the $: top command to view the resources occupied by Ubuntu by the cpu and process.
Top command to view memory, cpu, and process
Top:
Main parameters
D: specify the
To open a webpage file using the command line, follow these steps:
1.ctrl+alt‑tcan be used to enable shell, f11can be displayed in full screen, input the command to enable js17.html, and specify a browser, such as specifying chrome,Copy codeThe
The ls command is one of the most common commands in linux. the dir commands in ls and dos are used to list files in directories. let's take a look at the usage of ls.
Full name: List indicates the meaning of a List. when we learn something, we need
The watch command can help you monitor the running results of a command, saving you the need to manually run it over and over again. In Linux, watch periodically runs the next program and displays the execution result in full screen.
Watch is a very
Openvz is still recommended to use the package from the official debian6 source. Compatibility labels: debian recently launched a machine. We want to build a host that supports both openvz and kvm virtualization technologies. In principle, I think
I once saw an article on the Internet that introduced a method for direct access to the intranet. In fact, we only need to use the port ing tool to easily penetrate the intranet. Port ER is a tool like this. it is even more worth mentioning that it
BY: rayh4c.cn 1. first found the attack on the Internet news report http://www.2cto.com/200803/24504.htmlhttp://www.nsfocus.net/news/6697http://hi.baidu.com/secway/blog/item/e80d8efa4bf73ddab48f31a
BY: rayh4c.cn
I. I first found the news and reports
Migration to Linux is a pleasure for many people. For others, this is a nightmare. Especially for some administrators who have just entered the Linux management gate, if some common errors are not avoided, it is easy to bring security risks to the
1. install Mysql1 and create the msyql User Group [root @ localhost ~] # Grepmysql/etc/group # check whether the mysql User group exists in the query system. If no user group exists, add it. [Root @ localhost ~] # Groupaddmysql # Add a user group
System security record file the record file inside the operating system is an important clue to detect network intrusion. If your system is directly connected to the Internet, you find that many people try to Telnet/FTP login to your system, you can
In traditional UNIX systems, DAC protection measures include file access mode and access control list, while MAC provides process control and firewall. The TrustedBSD program combines the core FreeBSD release with trusted security components that
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.