However, when using sudo, you still need to enter the password after setting it. Therefore, after testing, we found that, you also need to create a user group sudo (the name may not necessarily allow common users to use the sudo permission in linux,
Type & lt; file type & gt; search for files based on the file type. Block B device c character device d Directory p Channel file f common file whereis
Find the software installation path
-B: only query binary files.
-M: only search for help
In Linux, how does one know that the file was written by that process? in the evening, a student asked: a file is being written by a process. I want to check that this process file is always increasing and cannot be found.
In the evening, Shuohai
Run puttygen.exe and select the type and length of the key. We can select SSH2 (RSA) and set the length to 1024.
Step 1: generate a keyRun puttygen.exe and select the type and length of the key. We can select SSH2 (RSA) and set the length to 1024.
You only need to create a file named ifcfg-eth0: 0 in the/etc/sysconfig/network-scripts directory,
First, use the command to modify the changes (the changes take effect immediately and the restart fails)
# Ifconfig eth0 192.168.0.1 netmask 255.255.25
# You can issue it in this way! Notice! The root directory in etc.tar.gz/is removed!
You can use tar -- help in linux to view detailed instructions.
Format: tar [option] file
-C create a new archive
-X extract files from an archive
-T list the
The following 13 commands are the most common file processing commands in Linux.
The following 13 commands are the most common file processing commands in Linux.
1) Linux file processing command: lsCommand name: lsListPath:/bin/lsExecution
Of course, this is the simplest operation demonstration. you can also use shell scripts and reverse Ct scripts based on your actual tasks, which will greatly save the intermediate process time.
Use the verify Ct script to complete ssh to perform
The last section of the Linux system security performance check notes has not been understood yet.
Note:
1. Accounts check
# Less/etc/passwd# Grep: 0:/etc/passwd
Note that new users, UID, and GID are 0.
2. Log Check
Note "entered promiscuous mode"
RPM is the abbreviation of RedHatPackageManager. it is originally intended to manage RedHat software packages. as the name suggests, Red RPM is the abbreviation of Red Hat Package Manager, which is intended to manage Red Hat software packages, as
We generally use the "date-s" command to modify the system time. For example, the command to set the system time to 20066-October 19 is as follows.
Original article address: linux system time setup author: Lazy Girl style
We generally use the "date-
First, the role of each folder in the Apache Directory is described as follows: bin: stores all the software running in Apache, including a folder named ad. e. First, the role of each folder in the Apache Directory is described as follows:
Bin:
Micro-Linux operating system on the user interface. Because of its small size, it is about 10 MB, so it runs quickly by loading the whole into RAM. Tiny Core Linux, the world's smallest desktop release, released version 4.5 today.
Tiny Core Linux
Installing and using crontab in CentOS
Install crontab in CentOS:?
1
Yuminstallcrontabs
Start or close this service:?
1234567
/Sbin/servicecrond start // start the service/sbin/servicecrond stop // close the
In traditional mode, the library function link is completed in the compiler, and all related objects are integrated into an executable file during compilation. In comparison, we can also set
In traditional mode, the library function link is
1. FTP for data sharing. generally, after linux is installed, the FTP service will be installed (if not, you can install it yourself). 1. First, check whether the FTP server is enabled.
1. FTP data sharing
Generally, the FTP service is installed
File transfer is the main form of data exchange. To ensure correct identification and transmission of files during file transfer, we need to establish a unified transfer protocol between the two computers.
File Transfer Protocol:
File transfer is
In Linux, how do I disable single-user logon? in Linux, how do I disable single-user logon?
If you are not allowed to access a single user, you must first configure the password for GRUB. you only need to modify/boot/grub. conf or/etc/grub. conf
For more information about the operations that are unfavorable to the USB flash drive in Linux, read the operations that are unfavorable to the USB flash drive in Linux.
USB flash drives have the same read/write count both in Windows and linux.
You can easily read the lxr configuration method in Gentoo of the Web source code, and read the lxr configuration method in Gentoo of the Web source code. Lxr is
Lxr is a web-based source code cross-indexing tool that is very convenient to read the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.