Directory/File
Use
Source
/
/At the top of the Linux file system tree structure, it is the gateway to the Linux file system, all directories, files, devices are under/.
-
/bin
This directory holds the most
SHIFT Command declaration format: shift [n]The shift command is used to move the position argument list of the script to the left by the specified number of digits (n), and to move the argument list to the left one bit if there is no argument for
First, the installation of Mutt
1 yum-y Install SendMail
2 #需要安装sendmail并开启防火墙的25端口, if you need mail, 110 ports are open.
3 Yum-y Install Mutt
Second, configuration information
About the configuration information, there is a point to explain,
In systems such as Rhel,centos,fedora, the installation system uses the program named Anaconda, which belongs to the Fedoraproject, developed by Python and can provide graphics or text interfaces for system installation. The Anaconda Installer has
Linux can only have one source file for a compressed command, which means that all of the files that are compressed must be packaged into a single package before compression, and then the package will be compressed to complete the compression of
First, how to install KVM
Here I am using VMware workstaion to install a Linux virtual machine on a Windows system for KVM installation operations.First, we need to know if the CPU on our installed Linux system supports KVM virtualization
Under Windows WinRAR almost unified compression software market share, WinRAR is only a RAR in the Windows environment of the graphical interface, the core function or RAR, then how to install RAR in Linux?
1. Download rar
Download Address: http://
Within the server{} of the configuration file, add one sentence:
The code is as follows
Copy Code
Location ~. * * *. (CSS|JS) $ {Add_header Cache-control ' No-store ';}
Add the following code to the HTTP block
After verification, we know
The reason for the error on my side is that the iptables rule does not open 1723 ports
Solution:
The code is as follows
Copy Code
Chkconfig iptables offService Iptables
VI Delete blank line
: g/^s*$/d
Find the file in the directory that contains the specified string
Find./-name ' *.conf ' | Xargs grep-in "baidu.com.demo.upall.cn"# Note: ' baidu.com.demo.upall.cn ' is the string to look for# This command is used
Linux mail to send another method--sendemail use:
Download SendEmail
wget http://caspian.dotconf.net/menu/Software/SendEmail/sendEmail-v1.55.tar.gz
The code is as follows
Copy Code
TAR–ZXVF sendemail-v1.55.tar.gzCD
chgrp: Changes the user group to which the file belongs. chown: Change the owner of the file. chmod: Changes the properties of the file, suid, and so on. To change the owning user group, CHGRP The user group that changes the file is simple, just
Under Linux, when we need to crawl network packet analysis, it is usually to use tcpdump Crawl network raw data packets to a file, and then download to the local use of Wireshark interface network analysis tools for network packet analysis.Recently
Yum-y Install package name (Support *): automatic selection of y, automaticYum Install package name (support *): Manually select Y or nYum Remove Package name (* not supported)RPM-IVH Package Name (support *): Install RPM PackageRPM-E Package name
Linux shutdown
Shutdown Command shutdown
such as Shutdown-h now is the command to shut down immediately, but Linux sometimes does not turn off when running such a command on a terminal
Shutdown command:1, halt immediately shut down the machine2,
Nowadays, with the rapid development of mobile interconnection, desktop application environment seems to have become the former technology, and gradually replaced by mobile devices. However, it is a state that is not known to Linux desktop
Useradd can be used to create a user account. After the account is created, use passwd to set the password of the account, and use userdel to delete the account. The account created using the useradd command is actually saved in the/etc/passwd text
Minicom is a very popular PPP dialing line program.SyntaxMinicom [-8 lmmoti] [-a ] [-c ] [-C ] [-d ][-P ] [-S ] [configuration file]Parameter description: -Do not modify any 8-bit characters in 8. -A sets terminal attributes. -C sets the
Windows can also implement soft links and hard links in linux, which can be implemented through junction and mklink.JunctionSoft links can also be called symbolic links, similar to ln-s in unix.In fact, windows also has this function, but windows
As the number of machines monitored increases over time, the amount of data stored in the database will also increase. When the amount of data reaches a certain level, the response speed will be slow. Therefore, we need to clear some historical data.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service