(1) The difference between exit () and _ exit (): _ exit () directly stops the process, clears the memory space used by the Eliminator, and destroys various data structures in the kernel.
Before calling the exit system, the exit () function should
The introduction below in Windows seems to be much more, but note that you need to modify Catalina. Sh in Linux, instead of the Catalina. batAdd the following section to remotely connect to port 5888 of the server.
Catalina_opts =
Linux restart command
---- Linux restart command ----
1. Shutdown2. poweroff3. init4. Reboot5. Halt
* --- Description ---
ShutdownRebootIn Linux, some common shutdown/restart Commands include shutdown, halt, reboot, and init, which can be used to
User Access authorization in LinuxSince today, the platform has been transferred to Linux, and a new beginning has finally been made. Although it is a little late, I am still very happy, the transfer of the platform is a great wish for me to enter
Document directory
Java SE Development Kit 7u1
Java SE Development Kit 7 downloads
Thank you for downloading this release of the javatm platform, Standard Edition Development Kit (jdktm). The JDK is a development environment for building
Disk Quota
The default system kernel supports quota.
Mount-O usrquota, maid/dev/sdb1/mnt/d1 or
Mount-O remount, usrquota, kgquota/
# Init 1 (entering the single-user environment)
# Quotacheck-cvuga or quotacheck-cvag/dev/sdb1
# Quotaon-A
SambaUse of software packages
Packages provided by Fedora Core/RedHat Linux
Samba Server Software Package
Samba-client samba client Tool
Samba-common tools and libraries
Install the rpmdb-fedora/rpmdb-RedHat package (usually on the third
How to disableSELinux
/Usr/sbin/setenforce 0 close
/Usr/sbin/setenforce 1 Enabled
Or change it in/etc/SELinux/config.
Selinuxtype = permissive disabled, or disabled
SambaConfiguration File
/Etc/samba/smb. conf
[Global]
Workgroup =
SambaSecurity level
[Global]
Security =
1. Share
A Windows user can access the shared list without authentication.
2. User
For a Windows client, you must enter a user to access the shared name list, and create a user account on the server.
3.
Application Cases
Requirements:
1. All employees can work in the company, But no matter which computer they work on, they must save their file data on the Samba file server.
2. Both the marketing department and the technical department have their
Secure Dynamic Disk Policy
The Linux kernel can simulate raid controllers to manage hard disks, but only supports levels 0, 1, 4, and 5.
Raid0, also known as striping
Distribute continuous data access to multiple disks to improve storage
LinuxUseUDisk
# Ls/dev confirm that the device has been recognized
# Mount-O iocharset = gb2312/dev/sda1
Press Ctrl + F to flip (or space) Ctrl + B (roll up)
Ls-A: Show Hidden Files (Files starting)
File Permission RWS s indicates the user who
User Control
# Add VI/etc/vsftpd. conf
Userlist_enable = Yes Enable User List
Userlist_file =/etc/ftpusers
Userlist_deny = yes: the user who rejects the list
= No: Only List users are allowed to log on
# Vi/etc/ftpusers
Edit the user list,
ProFTPD
# Tar jxvf ProFTPD-
1.2.9
.Tar.gz 2
# Cd ProFTPD-
1.2.9
#./Configure generate system-related configuration files
# Make compilation compile the source program into a binary file
# Make
Linux-PamAuthentication Module
Pluggable Authentication Modules for Linux Pluggable Authentication Module
When the user accesses the server, the service program sends the request to the PAM module. The PAM module is in/etc/PAM according to the
Look at the name and you will know what to transplant ...... Key Club games in the later stages of clannadsuch as little Buster can be transplanted.Supports reallive engine games!However, the post is in Japanese (according to the statement, the
Application of pam_limits.so
1. view the Help file and confirm its configuration file location and parameter mode.
# Less/usr/share/doc/pam-0.99.3.0/TXT/readme. pam_limits
User Name or group name
soft restrictions
Hard hard limit (not
Implementation of Digital Signature names that do not need to be kept confidential in the original text
1. Sender A performs hash operations on the original text to obtain the digital digest MD
2. Sender A encrypts the MD with its own private key
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service