Configuring environment variables under Linux system

Introduction of environment variable fileTransferred from: variables in Linux include system-level and user-level, system-level environment variables are system variables to be read by

Linux command: Grub file in detail and grub repair, system common failure repair

First simulate grub corruption, DD If=/dev/zero OF=/DEV/SDA count=1 bs=400Grub boot corruption, but does not restart at this time, you can reinstall grub directly to restore GRUB:The first method: 1. First enter grub into GRUB command line[[email

One day a linux Base command Directory Management Class command CD

CD Switch Directory command1. command formatCD [option] [ directory name ]2. Command functionSwitch working directory3. Common examplesExample 1:CD ~Description:~ default is the home directory of the root, if the ~ after the user name, you can enter

One day a linux Base command Directory Management Class command CD

CD Switch Directory command1. Command formatCD [option] [directory name]2. Command functionSwitch working directory3. Common examplesExample 1:CD ~Description: ~ default is the home directory of the root, if the ~ after the user name, you can enter

Linux driver Development Common header files

There are a total of 32. h header files in the header file directory. There are 13 in the main directory, 4 in the ASM subdirectory, 10 in the Linux subdirectory, and 5 in the SYS subdirectory. The respective functions of these header files are as

Learning linux-Basic Three (man help)

One, man is divided into 9 chaptersMan 1 commands or executable files that a user can execute in a shell environmentMan 2 system kernel callable functions and toolsMan 3 Some common functions and function libraries (library), most of which are C's

Describe the difference between soft links and hard links under Linux (2 minutes)

In a Linux system, there are two types of links : One called hard link, and the other is called symbolic link or soft link (symbolic link). 1) by default, theln command creates a hard link without parameters. 2) The hard link file is the same

Linux Virtual machine installation configuration manual (version: 7.3)


First, prepare①, installing VMwareThe installation steps are omitted. The version I use here is as follows:②, Linux system image file:It is recommended to use the latest version of the Linux system. Some components require a higher version of the

What are some of the most common Linux commands used in testing or operation?

In the process of testing, you may encounter the need to go to the server to modify some of the configuration files, for example, a field value is 1 associated with the old version, is 0 associated with the new version, you may need to take the

Linux 15th week

1. Summarize the detailed usage of SED and awk;Sedsed is essentially an editor, but it is non-interactive, and it is a character stream oriented, and the input character stream is output after sed processing. SED itself is a pipeline command, can be

The logger of Linux commands

Logger is used to write logs to the system, he provides a shell command interface to the Syslog system module, and can write a line of information directly to the system log file from the command line, and the default log is saved


1. To get the package, you can use wget, Ubuntu can use apt-get source to get the codewget is a simple and powerful free software that downloads on the web and supports the HTTP,HTTPS,FTP protocol.# command Format wget [Options] [URL]features :

Linux kernel configuration, compilation, and Makefile overview

Hi, hello, everyone! I'm crazycatjack. Recently learning the Linux kernel configuration, compiling and makefile files. Today to summarize the results of learning, share to everyone ^_^1. Decompression PatchingThe first is to decompress the Linux

How Linux servers set read and write permissions for files and folders

Ways to modify a file's read-write propertiesFor example: Modify the index.htm file to a writable, readable executable:chmod 777 index.htmTo modify all the file properties under the directory writable readable executable:chmod 777 * *You can use *

Linux system memory consumption more than 90%?

Problem:[[email protected] zx_epp_db]# free-m Total used free shared buffers cachedmem: 15953 14706 1246 0 12687-/+ buffers/cache: 1979 13973Swap: 8015 27 7988--

Linux Basic article -19,w who whoami last Lastb lastlog basename

W who whoami last Lastb lastlog basename sleep hostname mail################################################W.H.O.WhoAmILast: Displays the/var/log/wtmp file, showing the user login history and System restart historyLastb:/var/log/btmp file that

Linux Basic Learning (16) DNS server-related configuration

DNS CacheWhat is a DNS cache?The dns  server can cache  DNS  records received from other  DNS  servers.   can also use caching in  DNS  customer service as a way to cache information cached by the  DNS  client during the most recent query.   Overall

Writing the Linux/unix daemon

Original: daemon is widely used in the Linux/unix system. Sometimes, developers also want to turn their programs into daemons. When creating a daemon, you are exposed to a number

Linux Syslog Learning

Most of the things that have been related to watching lighttpd facgi. See the following sample code on the LIGHTTPD website.#include #include #include #include #include #define Listensock_fileno 0#define listensock_flags 0int Main (int argc,

RPM: Linux Disk expansion

from: to increase the size of a Linux LVM by expanding the virtual machine diskPosted by Jarrod on December, + Leave a comment (181) Go to

Total Pages: 5469 1 .... 323 324 325 326 327 .... 5469 Go to: GO

Alibaba Cloud 10 Year Anniversary

With You, We are Shaping a Digital World, 2009-2019

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.