When you use the-exec option of the find command to process matched files, the find command passes all matching files to exec for execution. However, some systems have limits on the length of commands that can be passed to exec. in this way, after
Recently, Textfilebusy was prompted when running commands in linux. Baidu found that the fuserxxx command was used to check which process occupied the file and then shut down the process.
Run the fuser xxx command to check which process occupies
Some colleagues asked me: when using the cp command, if the file to be overwritten (binary executable file) is running, the cp will report an error, how does the cp command know that the file is being executed? Label: Linux cp
My first thought was:
This article describes how to install vsftpd and vsftpd in linux. For more information, see VSFTP.
Step 1: Download the RPM Package of vsftpd
You can get the latest vsftpd RPM package Redhat's rpm collection or rpmfind.net from the following two
Next let's take a look at the Ubuntu command line installation Wine1.7 method. it is very simple and I hope it will be helpful to you: Ubuntu
Open the terminal and execute the command. during the installation process, you will be prompted whether
This article describes how to use the find command in linux (linux file search). For more information, see LinuxFind.
Find the file MyCProgram. c in the current directory and subdirectory# Find.-name "MyCProgram. c"
Search for files and ignore case
This article mainly introduces how to view the current shell in linux. For more information, see
1. view the shell types used in the current process in real time: recommendedCopy codeThe code is as follows:Ps | grep $ | awk '{print $4 }'(Note: $
MarkAtwood is the supervisor of HP's OpenSourceEngagement department. in a speech to students, he published HowtoGetOneofTheseAwesomeOpenSourceJobs. some of the suggestions are suitable for those who want to label Ubuntu in open-source
This article describes how to install apache using yum in rhel6.3. For more information, see RHELApache.
1. install the httpd software package:
Yum install httpd
2. start the apache service:
[Root @ redhat Desktop] #/etc/init. d/httpd start
Starting
This article mainly introduces how to install custom fonts in linux. For more information, see
1. modify the font configuration file (Root permission required) and add the font to the list.Copy codeThe code is as follows:Sudo gedit/etc/fonts. conf
Original Black key. red Flag Linux Desktop 4.0 boot hard disk from a floppy disk the most detailed installation diagram 1 preparation before installation & nbsp; 1, officially purchased or downloaded Red Flag Linux Desktop 4.0 installation CD or
This article describes how to use backup scripts, commands, and commercial software in Linux to reasonably and efficiently protect disk data security. The backup and recovery system is responsible for backup and recovery beforehand. In the current
Linux user-related commands & nbsp; passwd commands for system security considerations, in addition to the user name, each user in Linux also has its own user password. Therefore, when you use the useradd command to add a new user, you also need to
1. linux: you must enter your account. during system installation, you can create the following two types of accounts: 1. root-super user account (System Administrator), which can be used to do anything in the system. 2. common user-this account is
I have not written any articles for a long time. recently I have received many letters from my friends about the configuration optimization and some new security issues. I would like to discuss these issues with you briefly, if there is any
As a desktop operating system, Linux's man-machine interface is not flattering. However, as a network operating system, its ease of use (for NOS) and high performance are difficult to find its right. Of course, this does not mean that the operation
1. for details about lilo1. when the lil prompt appears, enter linuxsingle & nbsp; the screen displays lillinuxsingle2. press enter to go to linux command line 3. run the password command to change the password. 2. when grub1. grub screen appears,
Translated by JeramiahBowling/Huang Yongbing: 51cto, which means that the path or method is a guide or rule set for the desired result, similar to other channels, security requires a structured and systematic approach. at the same time, it should
Source: 51CTO first, no program can ensure permanent security of your network or server. security is a continuous process of continuous improvement, evaluation, and improvement. Fortunately, there are many good tools in linux that can help you in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.