Linux touch &> the touch command has two functions: 1. refresh the last modification time and access time of the file or directory to the current time (the existing file or directory) www.2cto.com 2. create File touch [-option] File touch/tmp/test-a
In Linux, the application of the bind9 advanced view is well known that the access speed between China Netcom and China Telecom is very slow, however, a large network company like Sina, no matter where you access the network, the access speed is
Linux-based vsftpd linux ftp software vsftpdwindow and linux-based sharing with sambaunix-type Operating System File Sharing nfsunix-type Operating System File Sharing ssh www.2cto.com-the ftp software commonly used in linux wu-ftp oldest
Linux shell implements multiple random number methods. What methods do we use to obtain a random number in shell scripts? 1. Obtain a random number (date) through time, which is also frequently used. It can be said that time is unique and will not
Linux root password retrieval"I forgot my CentOS (Linux) root password. What should I do? You can change the root password in single-user mode. "Sometimes, when we forget the Linux system administrator password, we can reset the root password
Disk Partition: fdisk disk partition: fdisk root @ cnws-PC :~ # Fdisk [-l] device name selection without parameters:-l: output all the partition content following the partition device. If there is only fdisk-l, the system will list the partition
Two linux servers can be mounted between two linux servers: SERVER: 1. First, you need to set the directory on the host (1) to be mounted. Modify/etc/exports, add a shared directory. Here, the host refers to the server (the directory to be
Shell Variable Function (1) Shell variable function: the so-called variable is to replace a complicated and easy-to-change data with a simple thing. The so-called environment variable is that when we log on to a user name correctly, the system gives
In Linux, the graphic mode and text mode are switched to text mode. In the text mode, enter telinit 5 to switch to the graphic interface. In the graphic interface, open a new terminal and enter telinit 3 to enter the text mode. You can
How to Use ctags to implement variable or function tracing in the vim editor I believe that when you read a long and long code, you will often encounter the following situation: When you see a variable or function declaration or call, I don't know
If selinux is not disabled, httpd cannot use non-80 or other default ports. In this case, the httpd port is changed to 9080, and the following prompt is displayed: [root @ haifeng ~] # Service httpd startStarting httpd: (13) Permission denied:
Ubuntu: Modify user name and computer name 1. modify the User name: Switch to root and open the following two configuration files: vi/etc/passwd. Change the user name "xxx" to "cyrec, save and exit vi/etc/shadow and change "xxx" to "cyrec". After
How to Use utorrent on ubuntu is very easy to download utorrent for linux from the Internet. However, if you are using ubuntu12.X, you will be notified of an error, check the library is the reference to the following content can solve [html]
Linux learning path: Linux Shell learning Notes 1. bash regards [[$ a-lt $ B] as a separate element and returns an exit code. Exit code 0 is true, non-zero is false for example: a = 1b = c [[$ a-lt $ B] echo $? #0 a less than B is true [[$ B-lt $ a]
Use the source command in Linux. The source command is also called the "dot command", which is also a dot symbol (.). The source command is usually used to re-execute the modified initialization file to make it take effect immediately without
Linux Shell script programming-Detailed description of the curl command purpose curl command is a powerful network tool that can download files through http, ftp, and other methods, but also upload files. In fact, curl is far more than the functions
How to modify the PATH of the system environment variable in Linux: PATH is a string variable. When a command is input, LINUX searches for the PATH recorded in the PATH. For example, you can enter the ls command in the root directory/or in the/usr
The netstat command and log analysis command are used as the Computer Administrator. We all need to know about the netstat command. It is a tool used to check the network connection status. This tool is also available in windows by default. The
Ssize_t and size_t-linuxSsize_t: signed size_t [Note: signed] size_t: defined in the Standard C library, should be unsigned int [Note: unsigned] I. size_t enhanced Portability: [Note: size_t may be defined differently on different systems, and it is
In shell, the read parameter read command-n (no line feed)-p (prompt statement)-n (number of characters)-t (wait time)-s (no echo) 1. read the read command to receive standard input (keyboard) or input of other file descriptors ). After the input is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service