Linux Base command (CHGRP command)

In a LUnix system, the authority of a file or directory is managed by the owner and the group in which it is sued. You can use the CHGRP instruction to change the file to the group that the directory belongs to, either by group name or group

Linux Basic command (%) Linux file properties detailed

The properties of a Linux file or directory include: the node of the file or directory, the type, the permission mode, the number of links, the user and group of users to which they belong, the time of the last visit or modification, and so on. The

Linux termination supports 386 processors

Linux kernel author Linus Torvalds a patch in Linux 3.8 that incorporates Ingo Molnar, formally terminating support for i386 processors. After merging the patch, the 386 DX33 ancient system from 1991 years will not start under modern Linux kernel.

Linux kernel MD Source code Interpretation 10 RAID5 Data flow synchronization data flows

The previous section describes the synchronization functions in RAID5 sync_request potato chips are made by handle_stripe. From the initial creation of the array, to the application of various resources, to build the personality of each array,

How to deploy disk quotas under Linux (quota)

1, first we want to understand the role of disk quotas, and what is quota. Disk quotas can be simply understood as the meaning of how many limits we know that the Linux system is a multiplayer environment, so it is easy to appear when more than one

Automatic backup on Linux: Easy autonomous, secure, distributed network backup

The loss of important data can mean fatal damage. Still, countless professionals are ignoring the backup of their data. Although the reasons may vary, one of the most common explanations is that performing routine backups is really cumbersome.

Linux and Windows CVS Server configuration and usage

The first part of the CVS server configuration (version 1.10) 1, CVS overview and the installation of CVS server: CVS is currently a popular and excellent version management and Control tool that is popular with most developers and systems

Configure JDK and Tomcat via SSH on SuSE Linux, located behind F5

Installation of JDK Download JDK: Pre-found JDK download locations are copied to the Clipboard, putty via SSH to the server, find a suitable location to download the JDK installation files, such as "/usr/java", and then enter in this directory:

Firewall technology and its application in Linux operating system

Overview In many network firewall products, the Linux operating system firewall software features significant. Like Linux, they have powerful features, mostly open software, not only for free use but also for source code disclosure. These

Use Linux system IP camouflage to defend against attack

Firewalls can be divided into several different levels of security. In Linux, because there are many different firewall software to choose from, security can be low and high, the most complex software can provide almost impermeable protection

Fast deployment Projects under Linux

Linux and Java as open source, so now on the deployment of the server is basically the Linux platform as a server, and then deploy the project! In the process of development projects, most of the program ape or use the most classic Windows operating

How to adjust screen brightness in Mint Linux

I use the Mint Linux adjust the brightness of the interface program settings after the brightness does not change, it is only fun to have "depth", directly modify the value of the configuration file OK, directly modify the management brightness of

Unix/linux System Automation Management: Process Management Chapter

Introduction: This is a unix/linux system Management Automation series, mainly about how to achieve automated monitoring process status and performance and timely notify the system administrator. Process monitoring is a very important part of

Linux Server Configuration DNS: using bind

As we all know, Linux does not catch up with Windows popularity and ease of use on desktop applications, but it is precisely because of its seemingly troublesome command-line operations that make it more secure than Windows, which uses a graphical

Ubuntu Linux Distribution Novice Application guide [i]

The Ubuntu system is a Linux based system, and all of his software updates are installed by command: Apt-get install. First, the implementation of Chinese input This command is to complete the GCC compiler, the Ubuntu is a variant of Debian, Debian

RedHat Linux Firewall configuration entry must be learned

RedHat Linux provides firewall protection for increased system security. Firewalls exist between your computer and your network to determine which remote users on your network have access to the resources on your computer. A properly configured

How to install Domino Server on a Linux system

Objective Installing Domino server on a Linux system is a small challenge, in fact, not everyone think of the complex, since it is commercial software, OEM has been for us to solve the difficulty of installation, there is to choose their own

Common Linux Monitoring scripts

Recently, some friends of the internet have asked me about the server monitoring problems, ask the common server monitoring in addition to using open source software, such as: Cacti,nagios monitoring can write their own shell script it? According to

Linux crontab Command Syntax detailed

The purpose of the crontab command is to submit, edit, list, or drop a cron job. 1. Grammar crontab [E [UserName] |-l [USERNAME] |-r [UserName] |-v [USERNAME] | File] 2. Description The crontab command submits, edits, lists, or drops cron jobs.

RedHat 7.2 Linux operating system in the extreme speed of the Chinese

RedHat Linux 7.2 Research and development code-named "Enigma", has been officially released on October 22. It contains the following features that are exciting: Adopt 2.4.7-10 kernel, better network configuration, user management, hardware

Total Pages: 5467 1 .... 1091 1092 1093 1094 1095 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.