1. What is the grep commandgrep full Name Global search regular expression and print out of the line, fully search regular expressions and print out the linesis a powerful text search tool.2. Common usage1) Search for files, print lines containing
DHCP service (one Linux for Windows):The experimental premise is to configure the Linux IP address to install the Yum sourceTwo machine Linux servers with Windows client:1. Experimental steps:DHCP server (Linux): IP 192.168.10.1/24 VMnet2Client
Important Start-up service1.sshd connecting a Linux server is a service program that needs to be usedA mechanism for 2.rsyslog operation logsSystem log:/var/log/messageHardware log: DMESG3.network system startup, if you want to activate/deactivate
Reference Document http://www.cnblogs.com/ivictor/p/6099807.htmlMaking RAID5 http://blog.51cto.com/11134648/2103384RAID0also known as stripe or striping, it represents the highest storage performance in all RAID levels. RAID 0 improves storage
SELinux (security-enhanced Linux) is the United States National Security Agency (NSA) implementation of mandatory access control, is the most outstanding new security subsystem in the history of Linux.Turn off SELinuxTemporary entry into force:Order
1. Turn off SELinux (security-enhanced Linux): Mandatory access control2. Set RunLevel Run level3.Linux system boot process before booting to login4. Important Start-up service5. Common ways to set up server self-starting services6.
In order to drag and drop files between the Linux system and the host, and to automatically change the resolution, you need to install Vmtools to select the installation under the Virtual Machine menu bar VmtoolsSelect the. gz file in the drive,
Here is an example of a two-way circular link list. A generally defined list structure, such as a linked list of integers, uses the following structure:struct List_int { int n; struct list_int* next; struct list_int* prev;};Then there is an
IfconfigConfiguring and displaying network parameters for Linux system NICsAdditional InformationThe ifconfig command is used to configure and display network parameters for network interfaces in the Linux kernel. The NIC information configured with
The system is centOS6.5
SOURCE Package Download
, https://nodejs.org/en/download/
Download version, NODE-V8.11.3-LINUX-X86.TAR.XZ, to be able to run after extracting the version with. XZ End
Unzip the source package
Concurrent access: When multiple kernel paths access and manipulate data simultaneously, it is possible to overwrite shared data with each other, resulting in inconsistencies in the data being accessed.Critical section: Access and manipulate code
This blog installed Elk version of the current version of the latest 6.3.0, because Elasticsearch is based on Java development, so the JDK version is required, in the 5.0 version, requires JDK version of not less than 1.8 can be normal and practical.
Crontab: The daemon of timed tasks, accurate to minute, design the second we generally write the script--equivalent to the alarm clockLog file: ll/var/log/cron*Edit file: Vim/etc/crontabProcess: Ps-ef | grep crond ==>/etc/init.d/crond RestartRole:
The Ntpdate command is used to synchronize updates to Internet time, or NTP server timeThe NTP server "Network time Protocol (ntp)" is a protocol used to synchronize the computer's timing, which allows the computer to synchronize its server or clock
Yum Installation methodThe following installation is installed in the Centos Linux environment and if your Linux system is Ubuntu please use the Apt-get command.The Linux environment already supports Python by default. You can enter the Python
1.rpm"Command Function"The command of installing, querying, uninstalling, upgrading, and so on, is a powerful command, but it cannot solve the dependency problem, it is used to query and unload more first."Command Syntax"RPM [Options]
setting up SSH login without password can improve the security of our host. SSH login with no password to use the public and private keys. Linux can generate a public/private key pair with Ssh-keygen, followed by CentOS for example. Example diagram:
First, pre-installation preparation1. What is a virtual machineVirtual machine is a complete computer system that runs in a fully-functional environment through software simulations with complete hardware systems. The same as the actual server
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service