A friend who sees the permission to have a directory is RWXRWXRWT is surprised what this t is, how is it not X or-? Search for the following discovery:
This t represents the so-called sticky bit.
Sticky bit: This bit can be understood
Statistics Folder size:Du-hx--max=1; du-sk; DU-HSCReorganize line separators to display:echo "Abc,dd,bach,dong,jing,shang,china,bejing" | Xargs-d,-n1echo "Abc,dd,bach,dong,jing,shang,china,bejing" | Xargs-d,-N2Calculate Program Run timeTime LSTime
Problem Description:The desktop is a solid-state drive installed Windows, there is a free hard disk, want to install a Linux system on the hard disk, the SSD removed from the desktop, replaced by this free hard drive, the system is installed
First, why do you want to make the program in the backgroundThe procedures we calculate are very long, usually a few hours or even one weeks. The environment we use is to connect remotely to a Japanese Linux server using Putty. So the following
Linux operation and Maintenance Phase II (11) service ManagementService Management: RPM packages are installed by Default services (standalone service, xinetd service based), source package installation Services. "Independent Service:Start: Absolute
Stat ()/fstat ()/lstat () system callFeature Get file status header file#include #include #include Function prototypesint Stat(const char*file_name, structStat *buf);intFstat (intFiledes, structStat *buf);int Lstat(const char*file_name, structStat
file backup and compression commandsIn Linux, the commonly used file compression tools are gzip, bzip2, zip. BZIP2 is the ideal compression tool that provides maximum compression. Zip compatibility is good and Windows supports it.
Manage users and commands for setting up permissions
Command
Description
Command
Description
chmod
Used to change permissions
Useradd
Used to increase the user
Su
Used
The ubuntu14.10 system comes with a unity desktop environment, but is still accustomed to the GNOME desktop environment, plus the dock is handy.Method/Step
First, press Ctrl+alt+t to bring up the terminal. In which you enter: sudo apt-get
CP"function description": The CP instruction is used to copy a file or directory, such as specifying more than two files or directories at the same time, and the final destination is an existing directory, it will copy all the previously specified
Get internal command help?Help COMMANDGet External command help?COMMAND--helpPS: According to the type command, you can tell that command is internal/externaleg: [[email protected] ~]# type historyHistory is a shell builtin #则表示history为一个shell内部命令We
Description: For learning and communication onlyObjective:(1): Configure and compile the Linux-2.6.29 kernel under the X86 platform(2): Install the compiled kernel and launch it under VMwareTools:gcc compiler, Linux-2.6.29 kernelSteps:(a): Clear
Built-in commandsThe built-in command refers to the commands contained within the Bash toolset. This is mainly due to the problem of execution efficiency-the built-in command will execute faster than external commands, and external commands often
How to download RPM package to LocalWhen setting up Yum installation, keep the RPM package.1. Edit/etc/yum.conf to set the value of Keepcache to 1;This makes it possible to keep the RPM package at Yum installation under/var/cache/yum2. Or use the
As we all know, the default search path for Linux dynamic libraries is/lib and/usr/lib. When a dynamic library is created, it is generally copied to both directories. When the program executes requires a dynamic library, and the dynamic library is
The Linux socket library was ported from the BSD Unix system developed by Berkeley University. The BSD socket interface is a widely supported TCP/IP communication interface in many UNIX systems, and the socket programming under Linux is suitable for
Generate the public key with Linux first and find its location
Open Sourcetree in Windows, click Tools-Create or import SSH key-and then click Putty Key Generator load to import the Windows PPK file,
Click on the Conversions menu of Putty Key
Rotten mud: Learn ssh without a password to log on.
This article is written by Xiuyi Lin FengProviding friendship sponsorship, first launched in the dark world
I have not written any articles in the last month, mainly new jobs. The new company's
Write the operating system by yourself (1) and write the operating system by yourself
Taking the opportunity of taking the kernel course of the operating system now, I borrowed "write the operating system by myself" from Yuanyuan in the library and
Iptraf: A Practical TCP/UDP Network Monitoring Tool
Iptraf is an ncurses-Based ip lan monitor that generates statistics including TCP information, UDP count, ICMP and OSPF information, Ethernet load information, node status information, IP checksum
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service