1.1 QuestionsThis example requires a simple management operation that is familiar with the MARIADB database and accomplishes the following tasks:将 MariaDB 数据库的管理密码设为 1234567新建一个名为 newdb1 的数据库删除名为 test 的数据库授权数据库用户 zhsan 可从本机访问任何数据库,拥有所有权限,访问密码为 pwd123
2-4 Linux Partitions
Partitioning: Dividing a large hard drive into small logical partitions
Format: Write to File system
Partition device file name: Defines the device file name for each partition
Mount: Assign a mount point to
(1) file descriptor in Linux the legal range of FD is 0 or a positive positive number, it cannot be a negative number.(2) open to return the FD program must be recorded well, later to this file all operations rely on this FD to correspond to this
ordinary users do not have permission to use the Shutdown command, only the root user has permission . shutdown [ option ] time [ warning message " System shutdown¨ -c Cancel the previous shutdown command. It is worth noting that when
Logical Volume ManangerThe system kernel called by this tool is Dm:device Mapper, which organizes one or more underlying block devices into a logical device module.LVM is like a dough, the underlying disk makes up a huge dough, and then divides the
With mount-t Cgroup-o cpu,memory my_virt_res/cgroups/my_cpu_and_mem mount the Cgroup file system, use theCgcreate-g CPU:/MY_CPU Create a control group under/CGROUPS/MY_CPU_AND_MEM/MY_CPU,Then a mis-operation unloaded the file system on
Steps for the boot processThe typical boot process for a Linux system consists of the following 6 different phases:Loading and initializing the kernelDetecting and configuring devicesCreating Kernel ThreadsOperator interventionExecute the System
Recently a little busy, or to strengthen self-control and squeeze time.One: Linux systemThe Linux GUI is just an external software, with and without all.Ide:DLL files under windows are dynamic Connection librariesLinux. So is a shared objectII:
This article describes how Linux can see how a port is consumed by which process:
1. Lsof-i: Port number2. Netstat-tunlp|grep Port numbercan see which process is consuming the specified port"Step One" lsof-iThe lsof-i is used to display
user profile and password configuration filesUser Profile/etc/passwd divided into 7 fields: ① User name ② account password/etc/shadow file ③ user identification number Uid④ Group identification number Gid⑤ Comment Description ⑥ user home directory ⑦
Jboss configuration and operation tutorial in linux,
Indicates that the object version is Jboss7.1 JDK7.
1. Jboss is free of installation. Download jboss from the Jboss website and upload it to the server.
2. Configure Jboss Parameters
Modify
How to configure routes for dual NICs in linux
I. Environment:
Three directly connected computer hosts
PC1 PC2 PC3
Two NICs eth0 and eth1 are available on PC2, which are connected to PC3 and PC1 respectively.
------ Network cable
Ii. Requirements:
Linux Storage Management: hard disk, partition and file system, linux partitionStorage Management: 1. Hard disks, partitions, and file systems
Ii. Hard Disk Quota RestrictionsI. Hard Disk, partition, and file system
Physical Concept of a hard disk:
Llinux commands and llinux commands
1. Shut down and restart1) ShutdownShutdown-h now (shutdown immediately)Shutdown-h 5 (shutdown in 5 minutes)2) RestartShutdown-r now (restart now)Shutdown-r 5 (restart in 5 minutes)Reboot (restart immediately)2.
Linux details, linux detailsLinux1
Linux is not Unix
The Linux kernel was originally written by Linus Torvalds, a Finnish student, at the University of Helsinki for personal interests.
Linux is a free and free-to-use Unix-like operating system. It
Linux learning,Ifconfig1, Function
This command is used to view and configure network devices. When the network environment changes, you can use this command to configure the network.2. Usage
Ifconfig [network device] [parameters](1) Parameters
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service