The free command can display idle and used physical memory, swap memory, and buffer used by the kernel in Linux. Among the Linux system monitoring tools, the free command is one of the most frequently used commands.
1. command format:
Free
The ss command can be used to obtain socket statistics. it can display content similar to netstat. The following are detailed instructions and examples.
Ss is short for Socket Statistics. As the name suggests, the ss command can be used to obtain
This article introduces a method to build a dial-up server using two serial ports of a Linux server. remote users can connect to the LAN through dialing to facilitate information transfer and resource sharing. The configuration environment of the
As I am training for Linux, I have a lot of contact with users who are new to Linux, and have a deep understanding of the problems encountered during Linux beginners, some of the following comments are not thoughtful. I hope that my friends who want
I. how to create multiple users remind everyone not to use root users all the time, because root users have the highest power in the system and may damage the system accidentally. For example, if we want to delete the files in the/temp directory but
RedHatLinux provides firewall protection to increase system security. A firewall exists between your computer and the network to determine which resources on your computer are accessible to remote users on the network. A correctly configured
I have seen many good articles on linux optimization on the Internet, and I will not repeat these articles here. I just want to talk about these issues from my own experiences. The systems mentioned in this article, if not specifically stated, all
1. this is an article for beginners to install, so I will not recommend debian and other releases. using redhat, turbo, and other releases will save you a lot of time, at the same time as your interest in Linux, I do not recommend redhat8.0 or later
I can't help but claim a topic that everyone is so enthusiastic about. If you can find it, let's briefly talk about the Linux system password attack and prevention. In early Linux systems, the/etc/passwd file contains information of each user in the
Its ?? On Linux ?? Say no? ? K no ?? Inux OS? Why ??? Taxation? N case ??? Toe? Indows virus? Too many? Only ?? Indows score? ^? When was 0 then bClamAV: $ sudoapt-getinstallclamav update ClamAV virus? Expected? Why? Sudofreshclam uses TLS
Its ??
Vitter@sefechina.nethttp: // blog.securitycn.net today saw ecshop background take webshell article, think of a long time many versions of apache php extension parsing vulnerability, the main problem is: no matter what the last suffix of the file, as
IncidentResponseToolsForUnix, PartOne: SystemToolsbyHoltSorensonlastupdatedMarch27, 2003 Source: http://www.securityfocus.com/infocus/16792003-10-20
Original article: Incident Response Tools For Unix, Part One: System ToolsBy Holt SorensonLast
Sar was originally an internal tool.
Sar was originally an internal tool, which can be downloaded at http://pagesperso-orange.fr/sebastien.godard/download.html.
1 installation
Tar zxvf xxx.tar.gz
./Configure
Make
Make install
2. use
Pidstat 2 5
//
& Nbsp; download the lm_sensors and sensors-applet programs first. Here, lm_sensors found the rpm Package File: lm_sensors-3.0.1-5.fc9.i386.rpm can be seen is forfc9 rpm package, because fc and centos are redhat series, so it should be able to
& Nbsp; 1. log on with the root account and create the cvsroot account; create the mkdircvsroot3. change the cvsroot permission and the owner chmod770./cvsrootchowncvsroot: cvsroot./cvsroot4
1. log in with the root account and create the cvsroot
& Nbsp; when you use GTK and socket to implement a simple chat room, a "segment error" occurs ". Where is the problem ?? Please check out my program. I will use the GTK graphic interface as a simple chat room to implement communication on two
& Nbsp; when using telnet or SSH to remotely log on to linux, if the connection is interrupted abnormally, the system will initiate a new session and cannot restore the original session. The screen command can solve this problem. The Screen tool is
& Nbsp; In Linux, modify the ssh Port 22vi/etc/ssh/ssh_configvi/etc/ssh/sshd_config and change it to port8888. use putty as root servicesshdrestart (redhatas3, in Port 8888Linux, the default SSH port is 22. to ensure security, modify
Modify ssh
The OLPC organization's efforts to promote cheap laptops have been accepted by more and more companies. WalterBender, former president of OLPC, is negotiating with four notebook manufacturers, including Intel, to promote Linux systems. The
ZorinOS is a Ubuntu-based Linux release, especially designed for new Linux users. It has a graphical user interface similar to Windows and many applications similar to Windows. ZorinOS also comes with programs that allow users to run a lot of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.