How Linux switches to the root user and changes environment variables

(1) sudo command[Email protected]:~$ sudoThis allows you to enter the current administrator user password to get superuser privileges. However, by default, 5 minutes of root access is disabled.(2) Sudo-i[Email protected]:~$ sudo-iThis way, you can

Linux Common Commands Summary

bz2

First, packaging compression decompression① compressionTAR-CZVF Test.tar.gz./testTAR-CJVF Test.tar.bz2./test② DecompressionTAR-XZVF Test.tar.gzTAR-XJVF Test.tar.bz2-C,--create:create a new archive-Z,--gzip:filter the archive through gzip-V,--verbose:

Linux: Use the awk command to get a line of text, a column

1. Print the first column of the file (domain): awk ' {print '} ' filename2. Print the first two columns of the file (domain): awk ' {print $1,$2} ' filename3. Print out the first column, then print the second column: awk ' {print $ {$} ' filename4.

Linux Boot and service control

First, the Linux boot Process 1. Boot process(1)开机自检:根据主板BIOS对CPU、内存等进行检测,成功后根据启动顺序移动系统控制权(2)MBR引导:根据硬盘第1个扇区中MBR(主引导记录)的设置,将系统控制权传给包含系统的分区,

Linux file server combat (virtual user)

VSFTPD based on the system user access to the FTP server, the more users of the system is not conducive to management, the system security, so as to vsftp virtual protection of the way to solve.Virtual users do not have actual real system users, but

Linux directory Structure

Linux directory structure:==============================[[email protected]/]# lsBin Data etc Lib Media newdir proc run split_dir sys usrBoot Dev home lib64 mnt opt root sbin srv tmp varFor the CentOS directory structureBin: Commands used by ordinary

Linux File server combat (System user)

FTP anonymous user settings after the completion of anyone can access server-side files, directories, and even can modify the deletion of files and directories, how to store private files and ensure that files or directories belonging to the owner,

Linux for password-free login

Native Node1To implement a password-free login for this machine:# ssh-keygen-t Dsa-p '-F ~/.SSH/ID_DSA# cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keysCopy the public key of node into the/opt/of NODE4# SCP./id_dsa.pub [Email protected]:/optNODE4

Linux process management and scheduling tasks

First, the process 1. Overview of the process应用程序(软件):由开发人员使用语言编写;实现用户具体需求进程:运行软件时产生,用于拿取使用硬件资源 子进程:由单个父进程产生,当父进程结束时,该父进程的子进程全部结束线程:由进程产生,每个线程各自管理不同的资源内容,合理分配、管理资源※软件使用过程:开发人员编写→使用软件→产生进程→产生线程→使用硬件资源2. View the process(1)pstree [选项]

Linux learning record. 5.git & GitHub

ReferenceHttps://www.linuxidc.com/Linux/2016-11/136769.htmInstallationInstalling Git:apt-get Install GitView current version: Git--versionConfigure Git$ git config--global user.name "Your name"$ git config--global user.email "Your email Address"View

[Wolfgang mauerer] deep Linux kernel Architecture Chapter I overview

As a Linux developer, he has been engaged in Linux development for more than two years. Have done the BSP transplant, familiar with the U-boot code execution process; read several times "Linux device Driver Development", analyzed the kernel Start

Linux installation System selection daily 18/06/23

Linux Installation System SelectionCentos7Program Volume 7 g, if it is the beginning of learning,Be careful not to choose that small size, because I have to go in and find this wifie also have to carry out some strong command to connect successfully.

Self-study Linux shell12.6-nested loops for command

Click Back to learn the path of the Linux command line and shell script12.6-Nested loop for command A nested loop is a loop in which there is one loop. The inner loop, in the outer loop body, triggers an internal loop during each execution

? Several ways to intercept IP using text tools in Linux

Several methods of using text tools to intercept IP in Linux1, using the awk tool[[Email protected] data]# ifconfig ens33ens33: flags=4163  mtu 1500        inet 192.168.1.140   netmask 255.255.255.0  broadcast 192.168.1.255         inet6 fe80::8abb:8

Linux System Boot Process

Detailed procedures can be viewed http://www.runoob.com/linux/linux-system-boot.htmlThe boot process for Linux is not as complex as you might think, and the process can be divided into 5 phases: Boot of the kernel. Run init. System

Configure SSH without password login Linux

You need to install Git under Windows, or other software that can execute shell commands1, first to modify the SSH configuration filevi/etc/ssh/sshd_config# Modify config file # If the # comment, cancel the # and change to the following

Linux compression commands

Linux Unzip commandTar-C: Create compressed archives-X: Unzip-T: View content-r: Append files to the end of a compressed archive file-U: Update files in original compressed packageThese five are stand-alone commands, which use one of the compression

Linux Mounted Discs

Mount-t Iso9660/dev/cdrom/mnt/cdromUmout/mnt/cdromTo view a file system that has been mounted by the systemMountOutput format for each line:Partition name on mount point type File system type (mounted option)When using a CD, floppy disk, or USB

Linux Startup: Unexpected Inconsistency:run fsck manually problem solving

Phenomenon: Enter the root password in this interface. will go into repair mode In Repair mode, enter the command fsck–y/dev/mapper/vg_swnode1-lv_rootThe path behind this is the one you indicated above that the error occurred. After the

Linux view threads and number of threads

View threading methods under LinuxFirst, PS[[email protected] ~]# ps -T -p 30557 PID SPID TTY TIME CMD30557 30557 ? 00:00:00 nginxSecond, toptop -H -p Report:View Tomcat process number: Ps-ef | grep TomcatQuery the corresponding

Total Pages: 5467 1 .... 3686 3687 3688 3689 3690 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.