First, use the--HELP parameter to see it. basename command parameters are very small and easy to master.$ basename--helpUsage examples:$ basename/usr/bin/sort Output "sort".$ basename./include/stdio.h. H Output "stdio".To specify a path for basename,
SedSED is a powerful text-processing toolYou can use regular matching, insert and delete text, and so on.When SED is processed, one row at a time, each time the current processing is stored in a temporary buffer, the output buffer content to the
(Kernel 2.4.37)OneWhen we open a file, we need to get the file descriptor (previously said is the file array subscript), usually through the function open to complete, this system call in the header file declaration definition, we look at the
whether a string is included in all files in the Linux lookup directoryFind if all files in the directory contain a stringFind. | Xargs Grep-ri "IBM"Finds all files in the directory that contain a string, and prints only the file nameFind. | Xargs
Setup Preparation 1. Install openssl to enable Apache to support SSL, you need to install OpenSSL support first. Recommended download install openssl-0.9.8k.tar.gz Download openssl:http://www.openssl.org/source/ TAR-ZXF openssl-0.9.8k.tar.gz
This chapter mainly describes how to operate and manage the Linux system files and directories, mainly including the switch between directories, the creation and deletion of directories, the creation and deletion of files , file lookup, file content
Experiment one: The VI editor mode switch 1. Experimental goal: Master VI editor Three modes of switching and its characteristics 2. Experimental procedure: Step one: Enter the VI editor, which is the command mode Enter VI or VIM in the
1.Open File#include #include#includeint Open (constchar *pathname,int flag); // Open an existing file int Open (constchar *pathname,int flags,mode_t mode); // If the file does not exist, create it first // Success Returns the file description
From one point of view, the role of a device driver is to provide a mechanism, not a policy. When writing drivers, programmers should pay particular attention to the following basic concept: When writing kernel code to access hardware, do not impose
From one point of view, the role of a device driver is to provide a mechanism, not a policy. When writing drivers, programmers should pay particular attention to the following basic concept: When writing kernel code to access hardware, do not impose
Access to the character device is performed through the device name in the file system. Those device names are simply nodes that are called file system trees, and they are typically located in the/dev directory. Device files for character device
Real-time Network traffic monitoring tool under LinuxDaquanFound in the work, often because of business reasons, need to know the traffic of a server network card, although the company also deployed cacti software, but the cacti is five minutes
first, the Linux system divides the device into 3 categories: Character device, block device, network device. Using drivers:1, character device : Refers to a byte can only one byte read and write devices, can not randomly read the device memory of a
How to thoroughly Delete WDCP logs in linux: linuxwdcp
Both apache and nginx have default switch logs. One is normal access logs and the other is error logs,Directory in/Www/wdlinux/nginx-1.0.15/logs/Www/wdlinux/httpd-2.2.22/logsThese two logs
Basic Linux Tutorial: how to modify the host name on CentOS or RHEL 7
Q: What is the correct method for modifying the host name on CentOS/RHEL 7 (either permanently or temporarily )?
In CentOS or RHEL, there are three defined host names: a, static
Combination of unofficial Google Drive and Ubuntu 14.04 LTS
Google has not released an official Linux client for accessing its drive from Ubuntu. However, the open-source community has developed unofficial software packages 'grive-tools '.
Grive is
Use the command line to set Raspberry Pi's Wi-Fi network
If you have not logged on to the Common graphic user interface, This method is suitable for setting Raspberry Pi's wifi. Especially when you do not have a screen or wired network, you only use
Security O & M: Linux system account and logon Security
1. reasonably use the Shell history Command record Function
In Linux, you can use the history command to view all the user's historical operation records, and the shell command operation
Security O & M: Use of Linux backdoor intrusion detection tools
1. Introduction to rootkit
Rootkit is the most common backdoor tool in Linux. It mainly replaces system files for intrusion and concealment. This Trojan is more dangerous and concealed
Linux Tutorial: How to enable Nux Dextop repository on CentOS or RHEL
Q: I want to install an RPM package in the Nux Dextop repository. How can I set up a Nux Dextop repository on CentOS or RHEL?
Nux Dextop is a third-party RPM repository (such as
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.