Cannot restore segment prot after reloc solution problem: solution: Permission denied occurs when you install something on linux: edit/etc/selinux/config in one of the following ways and find This section: # This file controls the state of SELinux
Linux Network Installation Introduction 1 if you have used a Linux system, it is the best choice as an application server. However, when we purchase a large number of computers, it is a headache to install the Linux system. This section describes
1. Download JDK from the official website. Download jdk-7u25-linux-x64.tar.gz 2 and create the installation directory.Sudo mkdir/usr/lib/jvm3. decompress the packageTar zxvf./jdk-7u25-linux-x64.tar.gz-C/usr/lib/jvm4. Configure the environment
Linux O & M engineer interview question 1. File file11 is available. Use shell to query the row number awk of the empty line in file1 {if ($0 ~ /^ $/) Print NR} 'fileorgrep-n ^ $ file | awk' BEGIN {FS = ": '} {print $1}' 2. Compile ShellScript to
It is interesting to count the frequency of words used in a specific file to find out the word frequency. Next, we use the associated array, awk, sed, grep and other methods to solve the problem. First, we need a text for testing. Save the content
Linux partition and mount POint DescriptionBefore introducing Linux partitions and mount points, I would like to introduce a Windows example, which is familiar to all Windows users. I will use this example to illustrate what Linux partitions and
The following two tips to enhance Bash functions: one is to improve Bash command history management, and the other is to enable Bash to have a more intelligent automatic completion feature. The implementation process is not complex. You only need to
Git config-global user. name "name" // The configuration name of the global domain is name git config -- global usre. email "name@email.com" // global domain configuration email address for name@email.com git config -- global color. ui "auto" // The
LinuxMint13 installation without a password access git the following is the step record for installing Gitolite on LinuxMint13: 1. on the server side, create a git account: sudo adduser -- system -- shell/bin/bash -- group git sudo adduser git ssh
In linux, the installation and uninstallation of Linux software has been a problem for many new users. In Windows, we can use the installation and uninstallation programs that come with the software or "Add/delete programs" in the control panel.
In CentOS, sudo is installed in CentOS by default. However, before configuration, only the root user can use sudo. Therefore, you need to make a slight modification to add the current user to the sudoers list. 1. The sudo user list is stored in
1. How to create an IP addressYou can access the default site/Modify default siteKeywords1. Create a default site2. Modify the default site3. Create a site accessed by IP AddressStarting with wdcp2.2, you can directly create the default site in the
Solution for setting apache rewrite in ubuntu one or two days later, I moved my website under Ubuntu 9.04. To create a pseudo-static page, I need to enable the Apache rewrite module. In other Linux versions, this problem seems to be easy to solve,
You can set N user access and N address access for the corresponding database in the mysql database.You can also set up to access N databases and connect to N addresses.Generally, localhost or 127.0.0.1 is used locally.For security, remote access or
Ubuntu grants sudo chmod 600 ××× (only the owner has read and write permissions) sudo chmod 644 ××× (the owner has read and write permissions, group users only have read permission) sudo chmod 700 ××× (only the owner has read, write, and execute
When bashrc and profile files are executed, add the following code to the bashrc and profile files in the/etc,/home/username directory, shell code echo 'date'>/home/zhennn/priority echo "/home/zhennn /. bashrc ">/home/zhennn/priority
Linux hard disk detection badblocks Function Description: Check the damaged blocks in the disk device. Syntax: badblocks [-svw] [-B ] [-o ] [disk device] [number of disk blocks] [start block] Supplementary description: when executing the command,
Scp commands remotely and locally copy each other. scp provides secure file copy, which is based on ssh logon. For example, to copy the current file to another remote host, you can run the following command. 1scp/home/test/test.txt root@192.168.1.5:/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service