1. Introduction
When using VI, something needs to replace the string
The basic substitution: s/vivian/sky/replaces current line first Vivian for Sky: S/vivian/sky/g replaces current line all Vivian for Sky: N, $s/vivian/sky/replaces the first n
How to generate Linux shadow Password/linux generate Shadow Password (CentOS 5 test pass)
Root information in/etc/shadow: Root:$1$nnxlnqur$eqqtkzex/xp2yvvdyb6jo.:15225:0:99999:7:: Where, "$1$nnxlnqur$eqqtkzex/ Xp2yvvdyb6jo. "Is the encrypted root
1. Introduction
Skipfish is an automated web security scanner released by Google to reduce users ' online security threats. The project address is in http://code.google.com/p/skipfish/.
2, installation
1) Installation of the required software
which
Whereis
Linux Common Command complete
Http://linux.chinaitlab.com/special/linuxcom/Index.html
VI Command one LAN table
http://www.21ds.net/article/23/308
Pwd
View current Path
Find/-name Profile
Search for the specified name.
Linux
1. Introduction
For system security, it is sometimes necessary to modify the SSH default port. The modification method is as follows:
Vim/etc/ssh/sshd_configAdd two port
# $OpenBSD: sshd_config,v 1.69 2004/05/23 23:59:53 dtucker EXP $# This is the
A. Linux directory structure
Typically, the root file system takes up less space because most of the files do not need to be changed frequently, and a strict file and a small infrequently changing file system are not susceptible to damage.
In
1. Introduction
Killall the process used to kill the specified name
2. Parameter
killall [-Z,--context pattern] [e-,--exact] [-G,--Process-group][-I,--Interactive] [-O,--Older-than time] [Q,--Quiet] [-R,--RegExp][-s,--signal signal] [-u,--User User]
1. Introduction
Readelf is used to display information about one or more object files in the elf format, and you can control which information is displayed by its options.
2. Parameter
-A--all displays all information, equivalent to-h-l-s-s-r-d-v-a-
Paging mechanismThe role of the paging mechanismThe paging mechanism is done after the segment mechanism, which further converts the linear address to the physical address.80386 uses a 4K byte size page, and the starting address of each page is
Linux curl is a file transfer tool that uses URL rules to work at the command line. It supports the uploading and downloading of files, so it is a comprehensive transmission tool, but traditionally, the URL is used as the download tool.
One, Curl
General Linux Software startup commands are in the current project Bin directory
(script commands cannot be performed correctly refer to ZK notes--windows Environment run ZK modify startup script parameters)
ZK Server command:
1, start ZK sh
I found that the IT staff after learning Linux chose to develop more quickly than the system application salary, and it was easier to break the threshold of 5000, 8000, or 10000, but it was more difficult and more boring, requiring perseverance and
Threads in Linux are lightweight threads, and thread scheduling in Linux is done by the kernel scheduler, each with its own ID number. They consume less system resources, create faster, and communicate with each other more easily than processes.
Http://blog.chinaunix.net/u/26011/showart_332604.html
The connection number of Apache is checked frequently, also can find a lot of useless time_wait connection. Some people say this is normal, because a request interrupted midway caused, others
(1), ifconfig query, set network card and IP network domain and other related parameters;
Eth0: That's the code for the network card.
HWADDR 00:16:d3:fc:9b:be//mac Address
inet addr:192.168.18.40//IP Address
BCAST:192.168.255.255//Broadcast
Found three ways to Redhat 9 standard error output redirection. If there is a Y file in the current directory, there is no X
$cat x y >& C1
$cat x y &> C2
$cat XY >c3 2>&1
C1 C2 C3 content is the same, including error output.
Time is to
Background: The newly installed CENTOS5 release, knock on the command: Svnserve--version: Svnserve, Version 1.4.2 (r22196) It appears that the system has been pre-installed for me subversion, I do not have to install the following start
AWho: Query the current online users and sources;Groups: Query the group to which the user belongs, groups query the group to which the current user belongs, and groups the user name to inquire about the group to which the user belongs;ID: Query The
One. Concept of a full installation kit (distribution)Linux is actually a kernel (system call interface, thread, memory, file, device), a complete operating system should be composed of some software kits and Knernel,As a result, some companies load
1. Introduction
Find Path-option [-print] [-exec-ok command] {} \;#-print to output the found file to standard output#-exec command {} \; -– will find the file to execute command operation, {} and \; There are spaces between#-ok and-exec are the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service