Add a scheduled task in linux to regularly export data from the mysql database. 1. crontab-e # edit the scheduled task of the current user.2. edit: press I: Compile the task as follows: */1 *****/usr/local/hy_mysql/bin/mysqldump-uroot-proot --
Solution for grub rescue startup: GRUB loading www.2cto.com error: unknow filesystem grub rescue> solution: grub rescue> ls # Find the grub configuration file because the partition table is damaged, use the ls command to list partitions, which is
The tangle of installing apache in linux is that installing apache in linux is a very simple process. Three commands can be done, jxvf decompression, make compilation, make install installation is OK. I did not expect that this process is still
Mount-t vfat/dev/sda1/mnt/usb to your/mnt/usb Directory: cd/mnt/usb, you can read and write data like using other Windows partitions. When uninstalling umount/mnt/usb, sometimes, the system prompts that the device is busy. Solution: I. umout mobile
The difference between hostname and/etc/hosts many people mentioned that changing the hostname first comes up with the idea of modifying the/etc/hosts file. The hostname configuration file is/etc/hosts. Actually not. The hosts file acts as DNS and
In the virtual machine bridging environment, it is found that BT5 r3 will automatically modify its own DNSStep 1. Disable automatic DNS ModificationUse the following method to disable automatic DNS modification, retain the system's dns configuration
Redhat changes the screen resolution about Redhat changes the screen resolution experience my monitor is LCD, directly tune in X window (enter setup in the terminal ), however, after the cancellation is called out, it always looks like a Square in
(1) chkconfig
Disable the ftp service at startup level 2345: [root @ RHEL4 etc] # chkconfig -- level 2345 vsftpd off
Display the startup status of each service at different levels: [root @ RHEL4 etc] # chkconfig -- list
Script for starting,
(1) driver Loading
Driver loading, mainly the NIC Driver. First, find the NIC:
Lspci | grep net
If not found, first check whether the NIC is plugged in. Check the loaded driver again:
Pciprobe
When this command is run, several drivers are
You can use the blkid command to query the file system type used on the device. Blkid is used to query information such as the file system type, LABEL, and UUID used by system Block devices (including swap partitions. To use this command, you must
Upgrading to KDE4.1 today has completely changed. If you thought that the Linux desktop system is not satisfactory, KDE4.1 can completely change this situation.Below are a few1. Desktop
2. Below are two different styles of 3D Window switching
Whether you are an ordinary Linux Desktop user or a system administrator managing multiple servers, you are faced with the same problem: an increasing number of threats. Linux is an open system that allows you to find many ready-made programs and
Vim is used to open the vim editor. Other Editors include vi (which is not powerful than vim), nano, and emacs. It feels like vim is the most powerful, followed by vi, which is worse than others. I heard from our teacher that the graphic interface
The commands listed in this article cannot be run, even if you are curious, unless you are running on a virtual machine (you can restore the problem ), because they will actually damage your system. Therefore, it is a good habit not to execute
Ln is a very important command. Its function is to create a synchronization link for a file in another location. The most common parameter of this command is-s. Its usage is as follows:
The target file-s of the ln-s source file is symbolic.
Server configuration tools are preparations for changing servers from bare metal to a complete system. The user will soon realize that configuring multiple machines is a very time-consuming task, and the system administrator must fully understand
If you want to customize a CentOS disk of your own and find some information on the Internet, there may be incomplete or errors. In short, the product cannot be customized (or the operation may be different ), the following are the steps for
OpenSSH (Open Secure Shell) implements encrypted communication over the computer network using SSH. It is an open source code solution that replaces the commercial version provided by SSH Communications Security. Currently, OpenSSH is a sub-plan of
1. dd if =/dev/zero of = test bs = 64 k count = 16 k
This is not accurate because the data is not actually written to the disk at the end of the command.
2. dd if =/dev/zero of = test bs = 64 k count = 16 k conv = fsync
This is fairly accurate.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service