A Installation and configuration of the DB2 database: 1. After the installation is complete, you need to add three operating system groups and three operating system users, as follows: Groupadd-g 999 db2iadm1 # (Group managing instances) Groupadd-g
Add by Zhj: The main difference is that source is executing the script in the current shell, while SH, bash,./is executing the script in the child shell of the current shellOriginal: http://www.cnblogs.com/pcat/p/5467188.htmlIn Linux, source, SH,
Su:swith User switch users, switch to root userCat:concatenate SeriesUname:unix Name Name SystemDf:disk free HDDDu:disk Usage HDD UsageChown:change owner Change OwnersChgrp:change Group change user groupsPs:process Status Process stateTar:tape
Linux servers start with a number of system services that provide local and network users with a system-functional interface for Linux that is directly targeted to applications and users. The programs that provide these services are executed by
When dealing with various failures in the Linux system, the symptoms of the failure are the first to be discovered, and the cause of the failure is the key to eventual troubleshooting. Familiar with the Linux system log management, understand the
Our life, such as games, everyone plays a different role, there are ordinary players, NPCs, Common wild Monsters, the ultimate boss, there are different levels of points, we are in the technical aspect is not it, most of us are common wild strange,
1. Lsof Command IntroductionLsof (list open files) is a tool that lists open files for the current system. In a Linux environment, everything is in the form of files, with files that not only access regular data, but also access to network
Find any -2016+ any file under/home named Core+, and the time limit is between 2016 year round:find/home/-name ' core*-2016* '-newermt ' 2016-01-01 '! -NEWERMT ' 2016-12-31 '-----Find any -2016+ Any file named core+ under/home, time is limited to 201
Purpose of writing: The process of configuration is still a bit complicated for beginners, and it is recorded as a share for easy reading.Prerequisites: The virtual machine system is already installed VMWare Tools.How to use: Customize Nat Mode (or
The importance of permissions to files
R (Read): Can read the actual contents of this file, such as reading the text file content, etc.;
Because there is no permission to W, so come in and have readonly message.
W (write)
Original: Linux (x86) Exploit development Series
Online reading
PDF format
epub format
Mobi format
Github
Translator
Chapters
Translator
A typical stack-based buffer overflow
The/ect/services file lists the system's detailed servicesRed font for common servicesAcpidThe ACPI (full name Advanced Configuration and Power Interface) service is the power management interface. It is recommended that all notebook users open it.
Modify/etc/resolv. conf and restore it to the original state, etcresolv. conf
Ping: unknown host www.baidu.com ???
Modify/etc/resolv. conf. After the network adapter is restarted,/etc/resolv. conf is restored to the original state.
You
Upload a local project to github. Upload a project to github.1. Create a local project, such as the/d/text folder. 2. Create a local repository and first enter the text folder.
Cd/d/textInitialize the execution command:
Git initAdd all files to
Linux grep and regular expression, grep Regular ExpressionGrep Introduction
Grep is a powerful text search tool that uses regular expressions to search for text and print matching rows. Generally, grep has three versions: grep, egrep (equivalent to
Redis/zookeeper/ActiveMQ installation configuration on Mac, rediszookeeper
Redis, zookeeper, and activemq are required in the framework. Currently, the development environment is set up on Mac, and brew installation is a simple and quick method:
$
Summary of commonly used linux commands in ubuntu, and customized tulinux commands
I have been in the lab for nearly a month and barely touched windows. I have been developing it in ubuntu. I would like to summarize the commonly used linux commands.
How to Implement the active registration function of Zabbix to implement zabbix
Active Agent Auto-Registration. As the name suggests, you do not need to manually add host information on Zabbix Web to monitor hosts.
It is automatically registered
Centos7, Windows 7 grub2 dual-system boot, centos7grub2
Because the original Windows 7 and centos6.3 are installed on a notebook. Because centos6.3 does not recognize wireless NICs, you can find them online and want to upgrade the kernel to 3.2
Spotlight monitors Linux servers and spotlight monitors linux
1. Install Spotlight on Unix
: Http://worlddownloads.quest.com.edgesuite.net/Repository/www.quest.com/latest_versions/SpotlightonUnix_70.exe
Installation By dummies
2. Configure spotlight
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.