Learning resources from: www.magedu.comMistakes are unavoidable in the learning process, and if found, they are also pointed out by the great gods.Some of the sample operations are related to historical operations, and if the previous example
Tips for encrypting Linux Command-line textI learned this method when I was learning Shell raiders, and it was simple and interesting, so I'm going to put it together and share it with you.ROT13 Text Encoding IntroductionROT13 (Rotary 13-bit,
Linux Common Command 002 Search command Locate, Whereis, which, find, grep-20150811Common Search Commands-------File Search command------------>locate command-faster than findLocate file nameSearch by file name in the background database, search
Linux commands change document permissions and owner
CHGRP: Change the group that the file belongs to
Chown: Changing the file owner
chmod: Features that change file permissions, SUID, SGID, Sbit, and so on
CHGRP Description
Today continue to look at building Linux Embedded Systems, into the fourth chapter, there are some practical operations, which after introducing a good organizational structure (folder), it is recommended that a script can be different development
Tar-zcvf/home/xahot.tar.gz/xahotTAR-ZCVF the directory to be packaged when the file name full path is generated after packagingExample: Package the/xahot folder into a/home/xahot.tar.gz file.Zip compression method:Compresses the current folder Zip-r.
PS: Capture the process run at a point in time[[Email protected] ~]# PS aux : Effective user (effective user)-related process; X : Typically used with the A parameter to list more complete information. Output format planning: L : A longer, more
Under Linux How to modify iptables open 80 port recently in the environment of the local server, found that the site localhost can access the normal, with IP access can not access, often using CentOS friends, you may encounter the same problems
Random numbers in Linux can be generated from two special files, one/dev/urandom. The other is/dev/random. The principle of generating random numbers is to use the current system's entropy pool to calculate a fixed number of random bits, and then
Configuration and management of DNS servers****************The first thing to know is the following files related to domain name resolution/etc/hosts-Early (DNS) method for resolving host names, typically consists of three fields: IP, host full
One[ROOT@LINUXZGF ~] #getconf long_bit[ROOT@LINUXZGF ~] #getconf word_bit(the int and long types in a 32-bit system are generally 4 bytes, and the int type in the 64-bit system is still 4 bytes, but LONG has become a 8-byte inux "getconf word_bit"
User and file Rights Management experiment Introduction1, the creation of Linux, delete users, and user groups and other operations. 2, the file permissions in Linux settings.First, Linux user managementLinux is a multi-user login operating system,
Original Address www.cnblogs.com/wwang/archive/2011/01/27/1944406.htmlWork for several years, has been engaged in the development of Linux kernel drive. From the touch of Linux to now, read a lot of Linux books, now think very good part of the list
File Lookup:1.locate: Non-real-time, fuzzy search, search is based on the system-wide file database;Fast speedThe file database is automatically updated before each shutdownUpdateDB: Used to manually generate a file database2.find:RealtimeExact
The Linux permissions are divided into rwx three types:R:read the Read permission.W:write permission to writePermissions performed by X:execute1. Permissions for filesThere is nothing special about the read and write permissions of the file.So what
1. Query whether the graphical interface is installedYum Grouplist |moreIn the "Installed Groups:" section of the output of grouplist, if you can find "X Window System" and gnome desktop or KDE or XFCE-4.4, it proves that you have installed the
Screen & tmux tips: linux background programsGeneral introduction:
Simple screen application:
Screen myprogram // start a program through screen, or screen-L myprogram: turns on logging ~ /Screenlogtailctr + a and then press d // to run the program
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service