Redhat has two major Linux product lines, the first is the free Fedora Core series mainly for desktop version, providing more new features of support. Another product line is the enterprise series of charges, this series is divided into: as/es/ws
Linux under Find command instance
$find ~-name "*.txt"-print #在 $HOME to check the. txt file and display the
$find. -name "*.txt"-print
$find. -name "[a-z]*"-PRI26NBSP; #对匹配的文件使用cpio命令, back them up to the
tape device-prune #忽略某个目录
$find. -
Introduction of Sysv-rc-conf
Sysv-rc-conf is a powerful service management program.
Second, background knowledge
Ubuntu Run level
The Linux system runs at a specified run level at all times, and different running levels of programs and services
The CP command copies the source file or directory to the destination file or directory. If the source file is a normal file, the command copies it to the specified destination file, and if it is a directory, you need to use the "-r" option to copy
Today, open source firewalls are a vast number. This article will cover 10 of the most practical open source firewalls that fit your business needs.
1. Iptables
Iptables/netfilter is the most popular command line based on firewalls. It is the safe
Download a nginx tar.gz version from the official website.
Installation using Make installation
The first step: decompression
TAR-ZXVF nginx-1.7.4.tar.gz
Step Two: Enter nginx-1.7.4, execute./configure command
-----------------------------------
System
# uname-a # View kernel/operating system/CPU information
# head-n 1/etc/issue # View operating system version
# cat/proc/cpuinfo # View CPU Information
# hostname # View computer name
# LSPCI-TV # list all PCI devices
# LSUSB-TV # list
I. Account security
1.1 Lock the redundant self-built account in the system
Check method:
Execute command
#cat/etc/passwd
#cat/etc/shadow
Check the account, password file, and the system administrator to confirm the unnecessary account. For
1. As long as the essence of understanding, the name is not important!
Many of the network masters using Linux in the face of Cisco administrators such as management distance, routing metrics, and other vocabulary, there is no PK on the conscious
This is just a function of the monitoring side of the overall script installserver ()
The specific script is as follows:
#!/bin/bash #this is Nagios server or client install Shell #at 2012/10/29 path= ' pwd ' Httppath=/usr/lo Cal/apache2
In order to achieve the Linux environment FTP server configuration, the vast majority of Linux distribution suite is the use of Washington University FTP (WU-FTPD), which is a good performance of the server software, because it has a number of
Today we'll look at how to put a Web server on a Linux system.
Linux systems are common: CERN, NCSA, Apache three ways, the most commonly used method is to use Apache. This approach features obvious, concise configuration, with the greatest system
Install Jira under Linux
First step: Install JDK
1. Download the JDK installation package from the website
2. Upload the JDK installation package to the virtual machine or server: SCP filename (jdk-7u17-linux-x64.tar.gz) root@ a virtual machine
Reprint please indicate source: http://blog.csdn.net/cywosp/article/details/389652391. OverviewIn the Linux system, everything can be considered as a file, and the file can be divided into: Ordinary files, folder files, linked files and device files.
1, Agent Server squid IntroductionSquid cache (squid) is a popular free software (GNU General Public License) proxy server and Web cache server. Squid has a wide range of uses, from caching related requests as Web server cache servers to increasing
The diff command is a very important tool on Linux to compare the contents of a file, especially to compare two different versions of files to find the changes. Diff prints each line's changes on the command line. The latest version of diff also
For every system administrator or network administrator, it is very difficult to monitor and debug Linux system performance issues every day. I've had 5 years of experience working with Linux administrators and know how to monitor the system to keep
The Trap command is used to specify the action to be taken after the signal is received;The parameters of the Trap command are divided into two parts, the first part is the action to be taken when the specified signal is received, and the latter
On this year's Build 2016, Microsoft introduced the world to the Linux subsystem under Beta Windows Subsystem for Linux (WSL), which allows developers to use Ba in Windows 10 The SH shell runs the native Ubuntu user-state binary program. If you're
Linux Command user management commands, linux Command user management
Groupadd
[Function description]
Create user group
[Syntax format]
Groupadd [-f] [-r] [-g ] [group name]
[Option parameters]
Parameters
Description
-F
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.