LINUX--MARIADB Database

first, installation landing1. Install and turn on the serviceYum Install mariadb-server.x86_64Systemctl Start mariadb2. Security InitializationBy default, the network interface of the database opens when theClose this interface for security

Basic optimization and security Essentials for Linux Systems Summary

This article describes some basic system optimization knowledge points, in order to adapt to batch configuration, all code is a non-interactive configuration method, can be in the CRT through the Command window to do a simple batch processing.

1.13 Single-user mode 1.14 Rescue mode 1.15 clone virtual machine 1.16 Linux machines log in to each other

1.13 Single-user mode1, single-user mode is mainly used to forget the root password;Restart Device: Reboot;init6;shutdown-r nowShutdown: Init 0;poweroffReboot the device into the following States:Select the upper and lower direction keys;Press the E

Linux Vulnerability Scan Tool "Lynis"

The Lynis is a UNIX-system security audit and hardening tool that enables deep-seated security scans to detect potential time and advise on future system hardening. The software scans general system information, fragile packages, and potential

Linux Setting Environment variables

environment variable BackgroundLinux is a multi-user operating system, each user logged into the system, there is a dedicated operating environment, usually the default environment variables for each user is the same, users can modify their own

Configuring VLAN environments with Vconfig under "VLAN" Linux

Under Linux, you can use Vconfig to manage VLAN virtual appliances as long as the system kernel supports it1. Check the Environment firstLsmod grep 290220 14384 1 18542 1 8021q2, Installation VconfigYum Install -y vconfig3. Configuring the VLAN

The problem of interrupt number in REQUST_IRQ function parameter in Linux

Pit bit:Hardware colleague gave me a bit, told me that Spi-contrler's interrupt number is 89, let me check whether this spi-controler can be used. After three days, the read-write function was tested, but the interruption was impossible to enter. I

How to see which processes consume the most CPU memory resources under Linux

Under Linux, get the 10 processes that consume the most CPU resources, using a combination of the following commands:PS Aux|head-1;ps aux|grep-v pid|sort-rn-k +3|headUnder Linux, get the 10 most memory-intensive processes, which can be combined

Linux System Learning 14th Day-<< Engineer Technology >>

RAID disk array? Redundant array of Inexpensive disks–redundant Arrays of Inexpensive Disks– Through hardware/software technology, multiple small/low-speed disks are integrated into oneA large disk– Value of the array: increased I/O efficiency,

Linux uses JMeter for distributed stress testing

1. Download JMeter tgz file http://jmeter.apache.org/download_jmeter.cgi2. Log in to the Linux server, create jmeter directory, RZ upload JMeter3. Tar xvf + jmeter tgz file name4. Add jmeter environment variable Vi/etc/profileAdded:

2017-2018-1 20179205 "Linux kernel Principles and Design" Tenth week assignment

"Linux kernel Principles and Design" Tenth week work Materials 17, 19, 20 chapters study and Harvest1, in Linux and all UNIX systems, the device is divided into the following three types: Block devices (Blkdev) are addressed in blocks, accessed

Linux System Password hack

(i) CentOS Linux system password cracking1. Press E to enter edit mode on the GRUB Options menu2. Edit Kernel line/init 1 (or/single)3. Press B to restart4. After entering, execute the following command[Email protected] #passwd root (set root

Deep understanding of inter-process communication between Linux (IPC)

https://www.ibm.com/developerworks/cn/linux/l-ipc/Introduction to several main means of interprocess communication under Linux: Pipe and well-known pipe (named pipe): Pipelines can be used for communication between affinity processes, and

Linux-practice (23-24)

23. Grep/egrep Regular Expression exercises:1) display lines in the/etc/passwd file that do not end with bash;For:# grep-v "bash$"/etc/passwd2) Locate the two-bit or three-bit integer in the result of the ifconfig command execution;For:# Ifconfig |

Zero-based Linux 19th chapter (MV command details)

The zero-based Linux 19th ChapterHello~~ again to a week Update blog time ~ ~ This week 51CTO success will blog function upgrade ~ ~ To bring us a new experience ~ ~ New Interface ~ new visual Sense ~ ~ But, in the editor ~ small or accustomed to

Linux file system---User interface to the kernel

From disk to data, from data to files, from files to directories, from directories to file systems, from file systems to operating systems. constitutes the IO read-write mechanism in the computer.The entire disk can be divided into 1 mbr (Master

Linux Transport Koriyuki Analysis system load and operation status

1. Delete a 0-byte file0 -exec rm-rf {} \;2. View the process#按内存从大到小排列-E "%c :%p:%z:%a"|sort-k5-nr3. By CPU utilization from large to small arrangementPs-e "%c :%p:%z:%a"|sort -nr4. Print out the URL in the cacheGrep-r-a jpg/data/cache/*

Monitor Linux system resources and the CPU memory consumption of custom processes.

1 #Coding=utf82 Import Time3 ImportPsutil4 fromPprintImportPprint5 6 fromLogger_untilImportLoggeruntil7Logger = Loggeruntil (name="Monitor"). Getlog (logfilename='Monitor.log', loglevel=2, Add_streamhandler=1)8 9Need_monitor_procces_names = [Ten

Sed commands use metacharacters with regular expressions, and sed commands use regular expressions

Sed commands use metacharacters with regular expressions, and sed commands use regular expressions 1. IntroductionSed is a non-interactive editor. It does not modify the file unless you use shell redirection to save the results. By default, all

Linux clock synchronization and linux clock

Linux clock synchronization and linux clock 1. Environment Introduction: Set Time Synchronization under root User Permissions Standard Clock Synchronization 3 devices IP Node Function 192.168.128 Master Node Ntpd server,

Total Pages: 5467 1 .... 1184 1185 1186 1187 1188 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.