V. sshd Remote Management Server Settings: In most Linux operating systems, there is an open-SSH remote management and control service software: sshd, SSH is a remote login tool. SSL encryption is adopted, which is more secure than traditional
Common FTP servers in Linux include Wu-FTP, vsftpd, proftpd, and pure-ftpd. Wu-FTP has a long history and has many security vulnerabilities. It is not recommended. As a replacement for Wu-FTP, vsftpd, proftpd, and pure-ftpd are three main FTP
Network-related configuration files2.1/etc/hostsContains a list of known hosts (in the local network. If the system IP address is not dynamically obtained, you can use it. For simple host name resolution (Dot-based representation), before requesting
Recently, the Group needs to automatically deploy a batch of machines in batches and install Linux and Its Applications in batches at a time. It is a bit difficult to clone hardware each time. Therefore, I checked the relevant information and looked
ArticleDirectory
NIC Driver
Nic configuration file
Configure Nic Information
Several Common commands
MII-tool usage
IP
Nic Load Testing Tool
In Linux, NICs are not as well supported as windows, and sometimes need to
The basic permission system of Linux is based on Ugo
U: permission of the user to which the file or folder belongs
G: Permission to group files or folders
O: permissions of other users on folders or files
Permissions include
These people have the opportunity to become Linux masters
1. Be friendly to English. It is hard to learn. Read EnglishArticleJust like reading Chinese articles. But do not say that you have passed the English level. I have met some people who
1. executableProgramCode(UNIX is called text section ).
Generally, a process also includes other resources, such as open files, pending signals, data in the kernel, processor status, address space, one or more execution threads, and of course data
Time and second conversion in Linux
The following content is excerpted from [1]
$ Date
Tue Feb 3 11:29:00 CST 2009
1. Convert the time to seconds.
$ Date + % s
1233631748
2. Convert seconds to the standard time format (method 1)
$ Date-
Because a virtual machine is a machine, you also need to use your local Nic to interact with the router. In fact, it is an independent machine. It is the same as your local Nic, but it is shared with your local Nic. Therefore, the IP address should
Linux system resource restrictions
1. Maximum number of files
View the maximum number of file handles allowed by a process: ulimit-n
View the file descriptor occupied by the process: lsof-p xxx | WC-l
Set the maximum number of file handles
Suppose we want to modify the NIC name mybridge
The implementation steps are as follows:
1. # Vim/etc/modprobe. conf
Find alias eth0 vmxnet
Change eth0 to the name of the ENI you want.
Example:
Alias mybridge vmxnet
2. modify the
In In Linux, enter or display Chinese orSecurecrtConnectionLinux, Often garbledThe key isYesSet ChineseCharacter Set, Use localeThis variable.
Locale It is the language environment when the software is running. It includes the language
Linux readIntroduction
1. Basic read
The read command receives input from standard input (keyboard) or other file descriptors. After the input is obtained, the READ command puts the data into a standard variable. The following is the simplest
I used a lot of fonts. What kind of fonts are there on the Internet that are most suitable for programming?ArticleFinally, we found that the default fixedsys font for vc6 was written.CodeSome people on the Internet say that the font c: \ windows \
Vsftpd is a Linux server, which brings us great convenience. After installing the Linux system environment lnmp, We need to install vsftpd. After installing it with Yum, we need to add users, by default, there is a WWW user. You can also set a
Vfork is used to create a new process, which aims to exec a new program. Both vfork and fork create child processes, but vfork does not completely copy the address space of the parent process to the child process, because the child process will call
A process can contain multiple threads. The thread contains information required for the process execution environment, this includes the thread ID, a set of register values, stacks, scheduling priorities and policies, signal shielding characters,
1. Basic operations
The socket child is the abstraction of the Communication endpoint. The socket descriptor is the identifier of the socket. It exists as a file. If the communication endpoint is a "person", the socket identifier is the "ID card"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service