Linux Prophet: Linux history:I will not say more about this, in fact, is a very interesting story string, online to find a lot of.UNIX-like system directory structure:Ubuntu does not have the concept of a drive letter, there is only one root
First, the root permission vi/etc/ssh/sshd_config modify the SSH configurationPort 8833 * Note that changes will not take effect after the change, modify the Iptables firewall port number has been otherwise cause the port number is blocked and
10.11 Linux Network relatedIfconfig-a can display the disabled or down network card;Start the network card #ifup ens33; Disable the network card #ifdown Ens33;Nic configuration file/etc/sysconfig/network-script/ifcfg-ens33Copy Create virtual network
Delete IssueInstall Kalilinux When you use a normal user, pressing the BACKSPACE key does not implement the delete function.There are two ways to solve this problem.A change of shortcut keys:Use the Ctrl+backspace key combination to implement the
-M if the task is completed, send the message to the intended user this is the default option-m do not send mail to scheduled users-F Read command from File-t specifies execution time [CCYY]MMDDHHMM[.SS] default format is HH:MM[YYYY-MM-DD]Now there
Firewall PolicyFirewall policy is generally divided into two kinds, called "Pass" strategy, a "blocking" strategy, a strategy, the default door is closed, you must define who can enter. Blocking strategy is that the door is open, but you must have
Main profiles for Linux users and groups: /ETC/PASSWD: Users and their attribute information (name, UID, primary group ID, etc.)/etc/group: Group and its attribute information/etc/shadow: User password and its related attributes/ Etc/gshadow: group
Hybrid devices for the character device:To define a hybrid device:struct misdevice{int minor; Why is there only a secondary device number because the hybrid device is a /////////////////////////linux system with the default main device number of 10
Gzip compresses the original file and deletes the original fileThe-D decompression option is similar to Gunzip-# specifies that the compression ratio is 6 by default-C outputs the compressed content to the standard output and retains the original
To prepare the operation:1, centos7.2 RAID 5 experimental detailedAdd 4 20G hard drives to VMware2, view the hard disk (after the new disk needs to perform partprobe-to make kernel re-read the partition table)[Email protected] ~]#
1. Sudo is an ordinary user who temporarily has root privileges. The advantage is that most of the time with user-defined configurations, a few cases can be done with sudo for root privileges.Therefore, it is important to note that after you have
Network FundamentalsBonging NIC Bindings
1. Network FundamentalsIn the existing learning phase, if you test the network and the basic is through the ping command ( in the production environment in order to prevent attacks almost all of the
Relative and absolute paths of linux knowledge point Review, linux knowledge point2.6 relative and absolute paths
Each file has a file starting from the root. All files have their own paths starting from the root. They are absolute paths, no matter
Simple test record and linuxelk test record for installing elk in Linux
Version:
1. elasticsearch-5.6.4.tar.gz
2. jdk-8u131-linux-x64.rpm
3.kibana-5.2.0-linux-x86_64.tar.gz
4.logstash-5.6.3.tar.gz
Next we need to have a virtual machine, and then
Summary of basic linux vi commands and summary of linuxvi commands
This is to prevent you from forgetting and writing it, so it is not detailed.
Yum install (command) Installation command
Nano file editing
Vi
Delete file: rm
-I confirm before
Bash command method for correcting spelling errors in Linux, linuxbash
I know that you can press the up arrow to call up the command you have run, use the left/right-click to move to a misspelled word, correct the misspelled word, and press enter
Use the sed command to delete the pinyin tone
Sometimes we have the following requirements for document Filtering:
Filter or delete irregular characters in a document, such as Chinese characters.
Replace a letter with a normal letter without a
Nginx view log, nginx log
Nginx logs include access logs and error logs.
The access log records the users, pages, user browsers, ip addresses, and other access information.
The error log is used to record server error logs.
The error log format is
Install Nginx 1.12.2 in CentOS 6.4
1. Install GCCTo install nginx, you must first compile the source code downloaded from the official website. The compilation depends on the gcc environment. If there is no gcc environment, you must install
Yum
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service