Temporarily modify IP address, gateway, host name, DNS, immediately effective, no reboot (failure after reboot)
1. Modify Host Name
The code is as follows:
#hostname Slyar
2. Modify IP address (eth0 is the name of the network card)
The code is
Prepare Wine Environment
Wine version requirements, the more new the better, I use 1.7.55, the latest is 1.8RC2.
Delete or back up your ~/.wine if you've run wine before. Because it involves a small amount of configuration, try not to let the
Keep in mind that these seven points will make your Linux server more secure
Figure 1: The service in operation.
Services required for installation
If you're going to run a server, you might think, "I Have a 40GB SSD (SSD) storage
Beginners Linux, put the solution of today's problems posted out
Environment: Centos 5.5 + mysql-server-5.5.24-1.linux2.6.x86_64.rpm
The problems encountered:
[Root@sh158-xen data] #rpm-IVH mysql-server-5.5.24-1.linux2.6.x86_64.rpm
error:failed
[Root@localhost root]# echo >/var/log/wtmp This file is turned on by default when it's garbled, and you can see IP and so on.
[Root@localhost root]# Echo >/var/log/wtmp
[Root@localhost root]# last
The user logon information is not visible at this
First, view the identity
Id:display user identity.
The output of this command displays the Uid,gid and the group to which the user belongs.
UID is the user ID, which is assigned when the account is created.
The GID is the primary group ID and
Recently engaged in a Django site, need to often enter the/var/www/site/mycitsm/directory, each time to repeat the input of this long path into the directory, it seems troublesome and time-consuming, there is no good way to "cd/var/www/site/ MYCITSM
Environment variables are closely related to the shell, and the user starts a shell after logging in to the system. It's usually bash for Linux, but it can be reset or switched to another Shell. For UNIX, it may be cshelll. Environment variables are
Øredhat/centos Install vsftp Software
1. Update Yum Source
First need to update the system Yum source, convenient tool download address: http://help.aliyun.com/manual?spm=0.0.0.0.zJ3dBU&helpId=1692
2. Install Vsftp
Install vsftp using the Yum
One, Top command
1. Role
The top command is used to display the program process in progress, with permissions being all users.
2. Format
Top [-] [D delay] [Q] [C] [s] [s] [i] [n]
3. Main parameters
D: Specifies the interval of the update,
First, the introduction
In the Red Hat Linux 6.0 system, when you have a Netscape browser that lets Linux access the Internet via an Ethernet card, you must configure the Linux system appropriately, such as hosts, domain names, gateways, routers,
Hello everyone, today we learn to use Iptables to implement IP forwarding (packet forwarding) from one network interface to another on Linux. The concept of IP forwarding is to make a Linux machine like a router to send data from one network to
How do we kill a resource/process in Linux? Obviously we'll find the PID of the resource and use the KILL command.
To be more clear, we can find the PID of a resource (such as terminal):
The code is as follows:
$ ps-a | Grep-i Terminal
6228? 00:0
Firewalls can be divided into several different levels of security. In Linux, because there are many different firewall software to choose from, security can be low and high, the most complex software can provide almost impermeable protection
Linux cluster principle
Linux cluster system includes cluster node and cluster Manager. Cluster nodes, sometimes referred to as nodes, servers or server nodes, are the systems that provide processing resources, and they do the actual work of the
The Linux kernel is the core of the system, so upgrading the kernel is a Linux system administrator's basic skills, so I shared the system operational dimension of an article, of course, I have a bit of the source file to do some content of the
One, what is bonding
More than one card tied together, as a network card, to achieve load balancing and improve bandwidth, Linux dual network adapter binding an IP address, the real work is to use two network card virtual for a piece, using the
Rationale: The directory and name of the process are stored under the/proc partition of the Linux system, containing the FD (file descriptor) and the subdirectory under it (the link to the process open file), and if a file is deleted, there is also
This article mainly solves the following several questions
1 Why should I use a library?
2 Classification of libraries
3 Creating your own library
Maybe you still remember party was fresh when you were a beginner of Linux. Without a better
A Linux System Password cracking
1. Enter edit mode by E in the Grub options menu
2. Edit kernel that line/init 1 (or/single)
3. Restart by B
4. After entering, execute the following command
root@ #passwd root (set root password)
Enter new
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service