Delete and clear eaccelerator cache and set

The eaccelerator itself has the automatic clearing function. the specific setting options are as follows: eaccelerator. shm_ttl & quot; 600 & quot; when the eAccelerator fails to obtain the shared memory size of the new script, it will delete all

Some compression and archiving commands in linux

Some compression and archiving commands in linux I. Common compression and decompression tools compressuncomprss suffix: zgzipgunzip suffix: gzbzip2bunzip2 suffix: bz2zip some compression and archiving commands in linux I. Common

Meaning of the shell status Test expression

Linuxshell status Test expression meaning file Test-d Directory-s file length is greater than 0, non-empty-f regular file-w writable-L symbol connection-u file suid bit settings-r readable -x executable-nt test file1 compare to linux shell status

UbuntuServer12.04NFS file sharing settings

NFS file sharing can solve the problem of file sharing in the cluster environment, such as fragments and attachments. Now we assume there are two machines, 192168110 and 192168111. We use 192168110 as the server and 192168111 as the client. I.

Usage of $ {} in shell

In shell, the $ {} truncation function $ {file *}: removes the first string and its left string: dir1dir2dir3myfiletxt $ {file *}: removes the last string and its left string: myfiletxt $ {file *}: remove $ {} in the first and left shells.

Ubuntuindicator location adjustment

After adding the network upload/download traffic display to the ubuntuindicator location adjustment, as the number size changes, many icons before the indicator keep changing, and it looks quite uncomfortable. the solution after askubuntu is as

Yum usage summary

Yum usage summary the basic operations of yum include software installation (local, network), upgrade (local, network), uninstall, and some query functions. Yuminstalllrzsz-yyuminstallvim-yyuminstalltcpdump-yyuminstallsysstat-y yum usage

IT is in its infancy-deploying PPTPVPN servers in CentOS6.4

Before introducing pptpVPN, let's take a look at the tunneling technology. The basic process of tunnel technology is to encapsulate data (data link layer or network layer data in the ISO 7-layer model) at the interface of the source Lan and the

[Centos6, 7] network principle and network configuration

Part 1: Network principle: 1. network addressing (mainly using IP address addressing) 1. IP address addressing is a two-layer addressing solution. an IP address identifies a host (or a Nic interface) 2. Currently, IPv4 addressing is the most widely

Network programming in embedded linux (4) -- UDPServer programming

Network programming in embedded linux (4) -- UDPServer programming the design of TCP-based communication programs is introduced earlier. the TCP protocol implements the connection, reliability, and transmission control protocol for transmitting data

Troubleshooting of command line: Suggestions for linux beginners)

From 1991 to now, linux has been born for more than 20 years. although he is only one year younger than me, he has gone a long way. Moreover, he is more reliable and stable than before. However, linux is still faulty. I believe you can judge and fix

Linux command alias-alias

Alias is a shortcut that saves the trouble of inputting a long string of commands. It can also unify differences between Windows, Linux, and Unix commands to meet users' input habits. $ Alias is a shortcut that saves the trouble of inputting a long

Linux kernel analysis-memory management mechanism

Linux Memory Management-differences between virtual addresses, logical addresses, linear addresses, and physical addresses (I) linux Memory Management-physical addresses, linear addresses, and virtual addresses Linux Memory Management-differences

Svn server construction and common commands

Server setup steps: 1 installation package $ sudoapt-getinstallsubversion2 add svn Management user and su Server setup steps: 1. installation package$ Sudo apt-get install subversion 2. add svn management users and subversion groups$ Sudo adduser

Linux kernel analysis-interrupt classification

Preface: This article provides a broad description of interruptions, including the definition of interruptions, the classification of interruptions, the process of hardware interruptions in the computer, and Preface: This article provides a broad

Ubuntu12.04 create and delete users

Ubuntu has been used for a long time by using the account used to install the system. I have never added it myself. I want to add an account today. I searched the internet and saw this article htt. Ubuntu, which has been used for a long time, uses

Standard I/O library for Linux/UNIX

When a stream is opened in the standard IO Library, the standard IO function fopen returns a pointer to the FILE object. This object is usually a structure that contains the standard I standard IO Library When a stream is opened, the standard I/O

Linux command to view the memory usage and system resources of processes

Use & 039; top-I & 039; to check how many processes are Running. the system may have memory or IO bottlenecks. Use 'top-I 'to check how many processes are Running. the system may have memory or I/O bottlenecks. use free to check whether the system

Linux Miscellaneous (16): Enterprise Application-level ftp configuration (3)

This time, we will explain the blacklist, whitelist, and different ftp access settings on the intranet and internet. 1. sometimes we don't want some local users to log on to the blacklist. this time we will explain the blacklist, whitelist, and

Linux Miscellaneous (17): iscsi storage separation technology

1iscsi introduction ?? ISCSI uses the port860 and 3260 of the TCPIP as the communication channel. Benefits between two computers 1. iscsi introduction ? ? ISCSI uses port 860 and port 3260 of TCP/IP as the communication channel. The iSCSI protocol

Total Pages: 2732 1 .... 398 399 400 401 402 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.