Basic methods of modifying IP address, gateway and DNS under Linux system

Temporarily modify IP address, gateway, host name, DNS, immediately effective, no reboot (failure after reboot) 1. Modify Host Name The code is as follows: #hostname Slyar 2. Modify IP address (eth0 is the name of the network card) The code is

On Linux use wine to install the chat version of the QQ steps to explain

Prepare Wine Environment Wine version requirements, the more new the better, I use 1.7.55, the latest is 1.8RC2. Delete or back up your ~/.wine if you've run wine before. Because it involves a small amount of configuration, try not to let the

How to make Linux servers more secure

Keep in mind that these seven points will make your Linux server more secure Figure 1: The service in operation. Services required for installation If you're going to run a server, you might think, "I Have a 40GB SSD (SSD) storage

Linux installation RPM package encountered failed dependencies

Beginners Linux, put the solution of today's problems posted out Environment: Centos 5.5 + mysql-server-5.5.24-1.linux2.6.x86_64.rpm The problems encountered: [Root@sh158-xen data] #rpm-IVH mysql-server-5.5.24-1.linux2.6.x86_64.rpm error:failed

Linux to empty user login record and command history method sharing

[Root@localhost root]# echo >/var/log/wtmp This file is turned on by default when it's garbled, and you can see IP and so on. [Root@localhost root]# Echo >/var/log/wtmp [Root@localhost root]# last The user logon information is not visible at this

Summary of Linux user and permissions-related common commands

 First, view the identity Id:display user identity. The output of this command displays the Uid,gid and the group to which the user belongs. UID is the user ID, which is assigned when the account is created. The GID is the primary group ID and

How Linux systems set command aliases

Recently engaged in a Django site, need to often enter the/var/www/site/mycitsm/directory, each time to repeat the input of this long path into the directory, it seems troublesome and time-consuming, there is no good way to "cd/var/www/site/ MYCITSM

Linux environment variable configuration file detailed

Environment variables are closely related to the shell, and the user starts a shell after logging in to the system. It's usually bash for Linux, but it can be reset or switched to another Shell. For UNIX, it may be cshelll. Environment variables are

Linux FTP Service Configuration

Øredhat/centos Install vsftp Software 1. Update Yum Source First need to update the system Yum source, convenient tool download address: http://help.aliyun.com/manual?spm=0.0.0.0.zJ3dBU&helpId=1692 2. Install Vsftp Install vsftp using the Yum

View system Resource Usage commands under Linux

One, Top command 1. Role The top command is used to display the program process in progress, with permissions being all users. 2. Format Top [-] [D delay] [Q] [C] [s] [s] [i] [n] 3. Main parameters D: Specifies the interval of the update,

Four methods of setting basic network parameters in Linux operating system

First, the introduction In the Red Hat Linux 6.0 system, when you have a Netscape browser that lets Linux access the Internet via an Ethernet card, you must configure the Linux system appropriately, such as hosts, domain names, gateways, routers,

How to implement IP forwarding on Linux systems

Hello everyone, today we learn to use Iptables to implement IP forwarding (packet forwarding) from one network interface to another on Linux. The concept of IP forwarding is to make a Linux machine like a router to send data from one network to

Use the Xkill command in a Linux system to kill an unresponsive process

How do we kill a resource/process in Linux? Obviously we'll find the PID of the resource and use the KILL command. To be more clear, we can find the PID of a resource (such as terminal): The code is as follows: $ ps-a | Grep-i Terminal 6228? 00:0

Linux firewall camouflage mechanism to help you against malicious hackers

Firewalls can be divided into several different levels of security. In Linux, because there are many different firewall software to choose from, security can be low and high, the most complex software can provide almost impermeable protection

Introduction to Linux cluster principle and installation configuration

Linux cluster principle Linux cluster system includes cluster node and cluster Manager. Cluster nodes, sometimes referred to as nodes, servers or server nodes, are the systems that provide processing resources, and they do the actual work of the

To explain the steps to upgrade the Linux kernel

The Linux kernel is the core of the system, so upgrading the kernel is a Linux system administrator's basic skills, so I shared the system operational dimension of an article, of course, I have a bit of the source file to do some content of the

Linux Bonding Configuration Detailed

One, what is bonding More than one card tied together, as a network card, to achieve load balancing and improve bandwidth, Linux dual network adapter binding an IP address, the real work is to use two network card virtual for a piece, using the

The method of using lsof to recover mistakenly deleted files under Linux

Rationale: The directory and name of the process are stored under the/proc partition of the Linux system, containing the FD (file descriptor) and the subdirectory under it (the link to the process open file), and if a file is deleted, there is also

How to compile dynamic libraries with GCC under Linux

This article mainly solves the following several questions 1 Why should I use a library? 2 Classification of libraries 3 Creating your own library Maybe you still remember party was fresh when you were a beginner of Linux. Without a better

Several common methods of password cracking in Linux system

A Linux System Password cracking 1. Enter edit mode by E in the Grub options menu 2. Edit kernel that line/init 1 (or/single) 3. Restart by B 4. After entering, execute the following command root@ #passwd root (set root password) Enter new

Total Pages: 5467 1 .... 1199 1200 1201 1202 1203 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.