Use linux ps to query the start time of a process

Use linux ps to query the start time of a process ps command common usage (for easy viewing of system processes) 1) ps a displays all programs under the current terminal, including programs of other users. 2) ps-A displays all processes. 3) when

Linux (4)-details on user management

User Management-there are a lot of things to learn about user information and password configuration file user management. Of course, there will be no simple introduction of two User Creation commands. There are too many such articles.Let's take a

Set up ftp service under linux mint

Install vsftpdsudo apt-get install vsftpd on the ftp service in linux mint. After vsftpd is installed, edit the link file vsftpd. conf: sudo vi/etc/vsftpd. conf www.2cto.com # specifies whether to allow anonymous logon to the FTP server. The default

Shutdown of linux system commands

In linux, shutdown is a multi-user, multi-task system. If the system is disabled or restarted incorrectly, user data may be lost. It is possible that the user is executing a key operation or operation. If the system is disabled without prompt, the

Linux memory stress test-memtester tool Analysis

Recently, I want to test the overall performance of a machine. I searched google and found this tool, which can be used to test the memory pressure, memtester is mainly used to capture memory errors and bad bits that are always at a very high or low

Linux samba service and VISTA

Adjust the linux samba service to communicate with VISTA beforehand: The file directories shared by Samba on linux servers cannot be viewed after VISTA is installed. This is because Samba Server only supports NTLM authentication, however, Vista

Solve the Problem of AES decryption failure in Linux

Description:In windows, encryption and decryption are normal, while in linux, the following exception occurs: javax. crypto. badPaddingException: Given final block not properly padded at com. sun. crypto. provider. sunJCE_f. B (DashoA13 *..) at com.

16 Linux Server monitoring commands you need to know

You Need To Know 16 Linux Server monitoring commands. If you want to know what your server is doing, you need to know some basic commands. Once you are proficient in these commands, you are a professional Linux system administrator. Some Linux

Install and use a peanut shell (linux)

Installation and Use of peanut shells (linux) I. Installation instructions (take CentOS 5 as an example) 1. install necessary Development Kits [root @ localhost ~] # Yum install gcc-c ++ autoconf automake 2gz download phddns-2.0.20.556.tar.gz to a

How to switch to the root user mode in ubuntu

How can I switch to the root user mode in ubuntu? After installing ubuntu, I wonder if I have such doubts. How can I switch to the root user. The problem is that after the system is installed, the default root user is not activated. to switch to the

Ubuntu backup and recovery

Before using ubuntu for backup and recovery, I believe many people have experienced using Windows. If you have backed up a Windows system, you must remember: First, you need to find a backup tool (usually private software), and then restart your

Function Analysis of commands before and after xargs connection

Analysis of the functions of xargs commands before and after xargs connection: # find/-type f-name "*. log "-print | xargs ls-l # The output is generated after the command is executed for a period of time. That is, after the find operation is

CentOS SVN Server Installation configuration note

CentOS SVN Server installation and configuration note recently worked with a friend to realize that the merge file after source code editing is a super head-scratching problem, I thought of a good version control tool. To cultivate my own good

Maximum number of opened file descriptors in Linux

Linux Maximum number of open file descriptors 1. maximum number of opened file descriptors in the system:/proc/sys/fs/file-maxa. view $ cat/proc/sys/fs/file-max1864052. set. temporary # echo 1000000>/proc/sys/fs/file-max2. permanent: in/etc/sysctl.

Efficient linux Command Line operations

Linux Command Line efficient Operation Method Introduction: it is very difficult for beginners to operate the linux system on the text interface. However, if you have mastered some methods, the linux operation efficiency in the command line is much

Red Flag Linux Desktop 4.0 installation diagram (3)

Click "Next" in the lower-right corner of the screen to prompt you to format the two partitions. Click "yes" and then 15 In this step, configure the boot program, select the Boot Record installation location, and select the default boot system

Multiple methods to guide linux

Source: evil baboons Add Linux to the Windows NT/2000 Startup Menu 1. The first method is to use the Virtual Disk Boot Tool under win.Create a linux boot disk as an image file and add a bootOption (this method is applicable to the partitions where

Security Defense: Anti-DDOS in Linux

Squid is a port ing function that can be used to convert port 80. In fact, common DDOS attacks can be used to modify the parameters in/proc/sys/net/ipv4/tcp_max_syn_backlog, the default parameters are usually very small and set to more than 8000.

How to check for Memory leakage in Linux

Source: CCID 1. Call void mtrace (void) (IN mcheck. h? (Declared). mtrace installs hooks for functions such as malloc to record memory allocation information. void muntrace (void) is called at the end of the Code that requires memory leak check

Install and set Gufw-ufw GUI firewall in Ubuntu 8.10

Gufw-ufw graphic interface firewall, customized for Ubuntu, deb installation package is easy, in addition, it can be automatically started with the Ubuntu 8.10 system, the full Chinese interface, and convenient settings of allow/block IP addresses

Total Pages: 5467 1 .... 3355 3356 3357 3358 3359 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.