first, installation landing1. Install and turn on the serviceYum Install mariadb-server.x86_64Systemctl Start mariadb2. Security InitializationBy default, the network interface of the database opens when theClose this interface for security
This article describes some basic system optimization knowledge points, in order to adapt to batch configuration, all code is a non-interactive configuration method, can be in the CRT through the Command window to do a simple batch processing.
1.13 Single-user mode1, single-user mode is mainly used to forget the root password;Restart Device: Reboot;init6;shutdown-r nowShutdown: Init 0;poweroffReboot the device into the following States:Select the upper and lower direction keys;Press the E
The Lynis is a UNIX-system security audit and hardening tool that enables deep-seated security scans to detect potential time and advise on future system hardening. The software scans general system information, fragile packages, and potential
environment variable BackgroundLinux is a multi-user operating system, each user logged into the system, there is a dedicated operating environment, usually the default environment variables for each user is the same, users can modify their own
Under Linux, you can use Vconfig to manage VLAN virtual appliances as long as the system kernel supports it1. Check the Environment firstLsmod grep 290220 14384 1 18542 1 8021q2, Installation VconfigYum Install -y vconfig3. Configuring the VLAN
Pit bit:Hardware colleague gave me a bit, told me that Spi-contrler's interrupt number is 89, let me check whether this spi-controler can be used. After three days, the read-write function was tested, but the interruption was impossible to enter. I
Under Linux, get the 10 processes that consume the most CPU resources, using a combination of the following commands:PS Aux|head-1;ps aux|grep-v pid|sort-rn-k +3|headUnder Linux, get the 10 most memory-intensive processes, which can be combined
RAID disk array? Redundant array of Inexpensive disks–redundant Arrays of Inexpensive Disks– Through hardware/software technology, multiple small/low-speed disks are integrated into oneA large disk– Value of the array: increased I/O efficiency,
"Linux kernel Principles and Design" Tenth week work Materials 17, 19, 20 chapters study and Harvest1, in Linux and all UNIX systems, the device is divided into the following three types: Block devices (Blkdev) are addressed in blocks, accessed
(i) CentOS Linux system password cracking1. Press E to enter edit mode on the GRUB Options menu2. Edit Kernel line/init 1 (or/single)3. Press B to restart4. After entering, execute the following command[Email protected] #passwd root (set root
https://www.ibm.com/developerworks/cn/linux/l-ipc/Introduction to several main means of interprocess communication under Linux:
Pipe and well-known pipe (named pipe): Pipelines can be used for communication between affinity processes, and
23. Grep/egrep Regular Expression exercises:1) display lines in the/etc/passwd file that do not end with bash;For:# grep-v "bash$"/etc/passwd2) Locate the two-bit or three-bit integer in the result of the ifconfig command execution;For:# Ifconfig |
The zero-based Linux 19th ChapterHello~~ again to a week Update blog time ~ ~ This week 51CTO success will blog function upgrade ~ ~ To bring us a new experience ~ ~ New Interface ~ new visual Sense ~ ~ But, in the editor ~ small or accustomed to
From disk to data, from data to files, from files to directories, from directories to file systems, from file systems to operating systems. constitutes the IO read-write mechanism in the computer.The entire disk can be divided into 1 mbr (Master
1. Delete a 0-byte file0 -exec rm-rf {} \;2. View the process#按内存从大到小排列-E "%c :%p:%z:%a"|sort-k5-nr3. By CPU utilization from large to small arrangementPs-e "%c :%p:%z:%a"|sort -nr4. Print out the URL in the cacheGrep-r-a jpg/data/cache/*
Sed commands use metacharacters with regular expressions, and sed commands use regular expressions
1. IntroductionSed is a non-interactive editor. It does not modify the file unless you use shell redirection to save the results. By default, all
Linux clock synchronization and linux clock
1. Environment Introduction:
Set Time Synchronization under root User Permissions
Standard Clock Synchronization
3 devices
IP
Node
Function
192.168.128
Master Node
Ntpd server,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service