Because find has powerful functions, there are many options, and most of them are worth the time to understand. Even if the system contains a Network File System (NFS), the find command is equally valid in the file system, and you only have the
As a Linux/Unix system engineer, I have been involved in external projects over the past few years. I have worked on the architectures of many small and medium-sized websites. F5, LVS, and nginx have many contacts, I want to explain to you what
Http://hi.baidu.com/zhengshaohua1987/blog/item/c99262eefe1e04ebb2fb95ee.html
I. IntroductionGenerally, the link to the function library is completed during the compilation period (compile time. All related object files and libraries are linked to
On the Linux server, configure the WEB application logs to print to the specified file server environment, which is RedHat Linux and runs Apache + Tomcat, the container runs a small e-commerce website of our company. The log information in the
Linux Mint Xfce secure File Deletion (secure-delete) 1. As we all know, the system's deletion operation does not actually erase the real data. The resource can be used only when it is marked as deleted. As long as the actual content is not occupied,
CentOS + rar + unrar install rar unrar command details first write down the two most common rar commands to package the 21andy.com directory as andy.rar www.2cto.com # rar andy.rar. /21andy.com/decompress andy.rar to the current directory # rar x
Enable, disable, and open the specified port of the CentOS 6.2 firewall. d/iptables stop: View 114 again at www.2cto.com. 80. *. *: 8080 (ip: 8080) was successful. However, it seems that security risks are greatly increased ...... Use/etc/init.
Linux basic command grep egrep fgrep usage and regular expression 1. grep, egrep, and fgrep commands this article mainly introduces the basic parameters and usage formats of grep egrep fgrep commands and regular expressions in linux, method. (Note:
Shortcut Key for operations in Linux system 1. log on to the virtual console and press the Alt + F2 key to see the "login:" prompt. This is the second virtual console. Generally, the newly installed Linux has four virtual consoles, which can be
In linux, root users are prohibited from using ssh to log on and access control over ssh. in Linux, by default, root users can log on through ssh. However, for security reasons, this permission is inappropriate because hackers may crack your root
In linux, tcpdump is used to monitor network traffic, and exported files are obtained to wireshark in windows to analyze the command lines in linux: tcpdump-I eth1-s 0 host 10.12.129.3-w output.txt-I indicates listening on eth1. The default value is
The security of Unix operating systems is well known. However, if you want to say where the Unix system is secure, it is estimated that no one can say why.
1. Different users have different permissions for the same command.
The Date command is a
VPS Linux Centos6.3 build a VPN (pptpd) Server 1. find the software package: Run wget http://poptop.sourceforge.net/yum/stable/packages/pptpd-1.3.4-2.el6.x86_64.rpm in Centos System (it seems sourceforge.net this I can not open this campus network,
Install MRTG monitoring software on the Ubuntu Server:I. install network traffic monitoring [collection once every 5 minutes by default]Switch to Super User:Sudo-sHInstall software:Apt-get install apache2Apt-get install mrtgApt-get install snmpdEdit
Shell_05 variable name, meaning variable name meaning $ n the nth domain of the current record, number of ARGC command line parameters for all fields recorded by FS $0 in the ARGIND command line (start with 0) array of ARGV command line parameters
1.1 preparations before installation
Create db2 management users, management groups, and instance users
# Groupadd db2user
# Groupadd db2adm
# Useradd-g db2adm-G db2user-m-d/home/db2 db2
Note: The-p parameter is followed by the password, which is
VIM series: registers and copy and paste buffers can now use most of VIM's basic commands and functions to develop project code. However, during project development, we still feel that some operations are relatively inefficient. For example, we use
Install APC on RHEL/CentOS 6.3/5.6 and Fedora 17/12 Install and enable php apc on LinuxThis document describes how to perform the following operations on RHEL 6.3/6.2/6.1/6/5.8/5.6, CentOS 6.3/6.2/6.1/6/5.8/5.6, and Fedora 17,16, 15,14, on, you can
Linux Command Line and shell script programming Daquan graphic desktop Script Programming create text menu create menu layout [plain] #! /Bin/bash clear # clear screen echo-e "\ t \ tMenu" echo-e "1. \ tDisplay disk space "echo-e" 2. \ tDisplay
1InstallGanglia
1.1Installation environment
CentOS, fedora
1.2Install the standalone version
Assume that the IP address of the machine is 192.168.1.253. First install the required software.
Copy to ClipboardReference: [www.bkjia.com] rpm-Uvh
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.