1. System call
The functions provided by the system call such as open, close, read, write, IOCTL, etc., need to include header file Unistd.h. Take write as an example: its function prototype is size_t write (int fd, const void *buf, size_t nbytes),
TR conversion, compression, truncation, deletion of characters
tr [OPTION].....SET1 [Set2]
Parameters:
-D,--Delete
Deletes the character in string 1 without converting.
-S,--squeeze-repeats
Compresses the recurring string into a string.
User-managed configuration files
User Information file:/etc/passwd
Password file:/etc/shadow
User group file:/etc/group
User group password file:/etc/gshadow
User profile:
/etc/login.defs
/etc/default/useradd
New user information
In Linux systems, the file compression commands we typically use are: BUNZIP2, bzip2, Cpio, Gunzip, gzip, split (cut file), Zgrep (look for matching regular expressions in compressed files), zip, unzip, tar, R Ar.
The last four are more commonly
I. Introduction to the Concept
Network programs are divided into server-side programs and client programs. The service side is the one that provides the service, and the client is the party requesting the service. But the reality is that some
The problem of Netfilter/iptables
In Linux, it is easy to use the Netfilter/iptables framework to prohibit IP addresses:
The code is as follows:
$ sudo iptables-a input-s 1.1.1.1-p tcp-j DROP
If you want to completely block an IP address segment,
Rhel/centos introduced a new set of system tuning tools Tuned/tuned-adm after version 6.3, in which tuned is a server-side program, which is used to monitor and collect data from various components of the system, and dynamically adjust the system
This article mainly introduces the Linux batch backup server configuration file and directory methods, the need for friends can refer to the next
Function:1. Only in the backup machine, the remote server only need to allow the backup machine with
Necessary:
Your openssh-server version is at least 4.8P1, because configuring permissions requires a new configuration entry Chrootdirectory added to the version.
How do I view the SSH version on my server? You can try the following command:
$
In fact, every hacker has its own unique method. The author has collected a lot of data to invade the website server, but because the actual situation is different, often causes many methods the invalidation; This shows that each site is different,
Name: crontab
Use Rights: All users
How to use:
crontab file [-u user]-replaces the current crontab with the specified files.
Crontab-[-u user]-replaces the current crontab with standard input.
crontab-1[user]-lists the user's current crontab.
First, clean up the idea first, ~ ~
First: We need to upload the file to the server.
Then: Read Excel data columns to display
Then: Let the user select the corresponding relationship of the field
Then: Submit the data, read the corresponding
In front, we introduce a way of communication between processes: Using a signal, we create a notification event and generate a response through it, but the information passed is only a signal value. Here is an introduction to another way of
This paper introduces the method of working together Linux host and Windows CE device through network. This article first uses the PPP protocol to establish a connection between a Linux host and a Windows CE device, and then runs an FTP server on a
It is often possible to use an operating system (such as Windows and Linux) because of the need for work or learning. The file systems supported by Windwos may be familiar, and the file systems supported by the Linux operating system may be
Syslog is the default log daemon under Linux. Any program that wants to generate log information can do so through a syslog interface.At the same time, almost all network devices can pass the SYSLOG protocol to the remote server by transmitting the
build lamp environment and install swoole extensions under LinuxFirst, CentOS 6.5 uses yum to quickly build the LAMP EnvironmentPreparation: Update First Yum Source Enter the following command: yum-y Update1. Installing Apache[Email protected] ~]#
File system access list:Facl:filesystem Access Control ListSave additional access control permissions with file extensionsOwner>group>otherOwern>facl,user>group>facl,group>otherSetfacl-M: SetU:uid:permG:gid:perm-X: CancelU:uidG:gid[Email protected] ~
Summary of the command for randomly generating passwords in Linux, and the command for generating passwords in linux
Sometimes it is often difficult to set a secure password that meets the complexity of the password. To tell the truth, this is a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.