Time Management for Linux systems1 Viewing system time and date: date[Email protected] desktop]# date Tue June 2 05:25:05 EDT 20152 View hardware time: Hwclock--show | -R[Email protected] desktop]# hwclock Tue 05:40:30 AM EDT-0.272377 seconds3
Chattr-i/etc/hosts #hosts文件去掉禁止随意更改的功能, try a few more times. Then VI go in to modify the file.Similarly, chattr +i/etc/hosts #为hosts文件添加防止修改的权限-------------------------------------------------------------Chattr (change attribute)Feature Description:
There is an issue today that you want to delete files other than the specified file (folder). The way it was found on the Internet.You need to do this in the current folder:Rm-rf! (keep) #删除keep文件之外的所有文件Rm-rf! (KEEP1|KEEP2)
Linux systems use environment variables to identify themselves in programs and scripts. This provides an easy way for your program to obtain system information. The question is how to set these variables.When your Linux system launches a bash shell,
Asynchronous programming in Linux driversAThe wait queue and polling programming described earlier provide a better mechanism for device access, but these mechanisms areis initiated by the application and requires the application to proactively
95 Tips for Linuxby Web full stack engineer on March 27, 2012Here's a summary of some of the tips for using Linux1. Automatic disk repair for Redhat abnormal shutdownLog in to the server first, and then add a file autofsck in the/etc/sysconfig, as
System is ubuntu14.04, the system installed by default Openssh-client, but did not install openssh-server, need to manually installTerminal input: sudo apt-get install openssh-server Download Openssh-serverHowever, the following prompt
First, using the Memcache top script memcache-top is a Perl-written command-line gadget for real-time access to memcached cache server details, such as cache hit ratio. To the official website to download the script, put in the user directory,
??? How to limit password length in the Linux system at the same time to manage the complexity of the password, recently found that someone's password conforms to the length of the rules, but it is very simple and easy to guess, check the relevant
old boy Linux operation and maintenance high salary employment guidance ultra-fine explaining 15 expert experience, novice access to new and advanced courseshttp://edu.51cto.com/course/course_id-3708.htmlThis course was released May 27, 2015, the
Last week my friend brought me an evidence file duplicated from a Linux server, which distribution is CentOS 5.0 and the I 18n is ZH-TW. She wanna know whether there is any malware on this Linux server or not. Ok. Let's get to work. I Add this
DUP () and dup2 () are two very useful system calls that are used to copy the descriptor of a file so that the new file descriptor also identifies the file identified by the old file descriptor.This process is similar to the real life of the key,
First step: Create a partition root# fdisk/dev/had à enter into the newly added hard drive
The number of cylinders for this disk was set to 10402.There is nothing wrong with the, but the is larger than 1024x768,And could in certain
A), the three major text processing of Linux grep:grep (Global search REgular expression and print out of the line, fully search for regular expressions and print them out): After giving a list of files or standard output, grep searches for text
Linux Command ip, linux Command ip
Ip command syntax
ip [OPTIONS] OBJECT {COMMAND | help}OPTIONS is an option for modifying ip behavior or changing its output.
-V: print the ip version and exit-s: output more detailed information. If this option
Copy and paste in LIinux terminal and Vim
In the GUI, we can copy and paste it freely. But in the character interface, we have to select with the mouse, then click the right key, select copy, and then go elsewhere to Ctrl-v. In addition, for those
Installing the crontab service in CentOSToday, when I configured crontab on the test machine, I found that it was not installed, so I had to install one quickly.CentOS version: 5.7Procedure1. Check whether crontab is installed:Execute the crontab
Reset Centos 7 Root Password
You can reset the Root password of Centos 7 in a different way than Centos 6. Let me show you how it works.
1-In the Enable grub menu, select Edit option to start
2-Press the keyboard key e to enter the editing page
How to Use Samba shared folders on Fedora or CentOS
Nowadays, sharing folders between different computers at home or in the office is nothing new. Under this trend, modern operating systems use network file systems to make data exchange between
Install, configure, and start SVN in Linux (CentOS 6.5)
Install, configure, and start SVN in Linux (CentOS 6.5)
Preparations: yum1. Check whether the installation is complete.
Code highlighting produced by Actipro CodeHighlighter
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service