Linuxfree command details and use instances (view memory usage)

The free command can display idle and used physical memory, swap memory, and buffer used by the kernel in Linux. Among the Linux system monitoring tools, the free command is one of the most frequently used commands. 1. command format: Free

Detailed explanation of ss commands in linux commands (obtain socket statistics)

The ss command can be used to obtain socket statistics. it can display content similar to netstat. The following are detailed instructions and examples. Ss is short for Socket Statistics. As the name suggests, the ss command can be used to obtain

Dedicated path: Remote LAN Access in Linux

This article introduces a method to build a dial-up server using two serial ports of a Linux server. remote users can connect to the LAN through dialing to facilitate information transfer and resource sharing. The configuration environment of the

Introduction to the learning direction and methods for Linux beginners

As I am training for Linux, I have a lot of contact with users who are new to Linux, and have a deep understanding of the problems encountered during Linux beginners, some of the following comments are not thoughtful. I hope that my friends who want

FAQs for Linux beginners

I. how to create multiple users remind everyone not to use root users all the time, because root users have the highest power in the system and may damage the system accidentally. For example, if we want to delete the files in the/temp directory but

Entry to firewall configuration in RedHatLinux

RedHatLinux provides firewall protection to increase system security. A firewall exists between your computer and the network to determine which resources on your computer are accessible to remote users on the network. A correctly configured

Linux operating system optimization and security operations

I have seen many good articles on linux optimization on the Internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences. The systems mentioned in this article, if not specifically stated, all

Use of Linux on low-configuration computers

1. this is an article for beginners to install, so I will not recommend debian and other releases. using redhat, turbo, and other releases will save you a lot of time, at the same time as your interest in Linux, I do not recommend redhat8.0 or later

Linux system password attacks and Hacker Intrusion Prevention

I can't help but claim a topic that everyone is so enthusiastic about. If you can find it, let's briefly talk about the Linux system password attack and prevention. In early Linux systems, the/etc/passwd file contains information of each user in the

In Ubuntu? ClamAV? Say no? Parts

Its ?? On Linux ?? Say no? ? K no ?? Inux OS? Why ??? Taxation? N case ??? Toe? Indows virus? Too many? Only ?? Indows score? ^? When was 0 then bClamAV: $ sudoapt-getinstallclamav update ClamAV virus? Expected? Why? Sudofreshclam uses TLS Its ??

Prevent apache php extension parsing vulnerability

Vitter@sefechina.nethttp: // blog.securitycn.net today saw ecshop background take webshell article, think of a long time many versions of apache php extension parsing vulnerability, the main problem is: no matter what the last suffix of the file, as

Introduction to emergency response tools in UNIX systems

IncidentResponseToolsForUnix, PartOne: SystemToolsbyHoltSorensonlastupdatedMarch27, 2003 Source: http://www.securityfocus.com/infocus/16792003-10-20 Original article: Incident Response Tools For Unix, Part One: System ToolsBy Holt SorensonLast

Summary of the sar tool commands in linux

Sar was originally an internal tool. Sar was originally an internal tool, which can be downloaded at http://pagesperso-orange.fr/sebastien.godard/download.html. 1 installation Tar zxvf xxx.tar.gz ./Configure Make Make install 2. use Pidstat 2 5 //

Install Sensors host temperature monitoring program on CentOS

& Nbsp; download the lm_sensors and sensors-applet programs first. Here, lm_sensors found the rpm Package File: lm_sensors-3.0.1-5.fc9.i386.rpm can be seen is forfc9 rpm package, because fc and centos are redhat series, so it should be able to

Configure CVS in Linux to integrate cvstrac

& Nbsp; 1. log on with the root account and create the cvsroot account; create the mkdircvsroot3. change the cvsroot permission and the owner chmod770./cvsrootchowncvsroot: cvsroot./cvsroot4  1. log in with the root account and create the cvsroot

Use GTK and socket in Linux to implement simple chat rooms

& Nbsp; when you use GTK and socket to implement a simple chat room, a "segment error" occurs ". Where is the problem ?? Please check out my program. I will use the GTK graphic interface as a simple chat room to implement communication on two

Use Screen, a powerful tool in Linux

& Nbsp; when using telnet or SSH to remotely log on to linux, if the connection is interrupted abnormally, the system will initiate a new session and cannot restore the original session. The screen command can solve this problem. The Screen tool is

Modify SSH port and disable Root remote login in Linux

& Nbsp; In Linux, modify the ssh Port 22vi/etc/ssh/ssh_configvi/etc/ssh/sshd_config and change it to port8888. use putty as root servicesshdrestart (redhatas3, in Port 8888Linux, the default SSH port is 22. to ensure security, modify  Modify ssh

The former president of OLPC negotiated with Intel to push the Linux operating system

The OLPC organization's efforts to promote cheap laptops have been accepted by more and more companies. WalterBender, former president of OLPC, is negotiating with four notebook manufacturers, including Intel, to promote Linux systems. The

Windows replacement ZorinOS3.0RC released

ZorinOS is a Ubuntu-based Linux release, especially designed for new Linux users. It has a graphical user interface similar to Windows and many applications similar to Windows. ZorinOS also comes with programs that allow users to run a lot of

Total Pages: 2732 1 .... 682 683 684 685 686 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.