Under virtual machine, switch the image interface and the command interface shortcut:Switch to Command box: CTRL+ALT+FN+F2 (F2~f6 all Can)Switch to the graphical interface box: CTRL+ALT+FN+F7File backup and file compression related commands1. The
The installation of the source code generally consists of 3 steps: Configuration (./configure), compile (make), install (makes install).The most common command at this point is these three ——./configure && make && make
The SCP is secure copy, a command that is used to remotely copy files under Linux.Windows to Linux:Note: the path to the file in Windows is separated by ' \ ', while in Linux it is separated by '/'.Windows:Linux:When you open git bash under windows
The user of the Linux system is a sub-role, the user's role is identified by the UID and GID (that is, the system identifies the user's UID, GID, rather than the user user name), there is a UID is unique (the system is the same as the identity card)
First, SuSwitch usersSu-usernameSwitch users with User environmentsu - -c "touch /tmp/123.txt" user1以user1用户创建/tmp/123.txt 文件如果需要切换到一个没有家目录的用户,会像图中一样报错这时候首先需要创建家目录,然后将文件夹用户与组修改为目标用户与组,再将bash配置信息复制到家目录下,cp/etc/skel/.bash*/home/user4Can LoginIt's a
1. Unzip to the specified directory2.yum InstallationInstalling LRZSX3. Remote Copyscp [参数] [原路径] [目标路径] scp local_file [email protected]_ip:remote_file4. Install the EXAMPLE.RPM package and display the installed file information and installation
As a technician, when you enter the new company, the company will generally give you a bunch of server user name password, these initial passwords are randomly generated, to use the brain to remember that it is absolutely deadly, and many times
First, IntroductionUploading and downloading of files on the InternetSecond, installation1. Installing the FTP Software2. Boot from[[Email protected] ~] #chkconfig vsftpd on Third, the configuration1. Upload the download file anonymously[[email
First, download the JDKJDK Download URL: http://www.oracle.com/technetwork/java/javase/archive-139210.html (download the corresponding JDK version as needed)JDK version: jdk-7u80-linux-x64.tar.gzIi. Installation of JDK1, download the JDK
Establish a soft link ln-s example: Ln-s b AExplanation: Associating folder A with folder B, accessing folder A, actually accessing the Ask price clip BDelete Soft connection RM-RF a directly deletes the soft connection of a folder with A and B.
Common Linux Command series-online query and help commands (help), common linux commands
Article directory:
1. Syntax
2. Options
3. Parameters
4. Instance
4.1 get built-in command help information
4.2 obtain external command
3 minutes to learn the basic usage of git commands, 3 minutes to learn git commands
Preface nonsense
Some time ago, I took a driver's license and registered for more than a year before I got on the bus to study subject 2. On the 5th, I took the test.
CentOS Installation Process notes: CentOS Installation Process
First, write some small details that need to be paid attention to during CentOS7 installation. No images are provided for the moment.
If you use a dual system, you must be careful when
Partition management in Linux
Linux system partition management
Q: Why partition?
Convenient management and data recovery
Partition and File System
System partitioning concept: the boot hard disk is recorded on the master information, the hard disk
In linux, how does one solve nginx installation errors ?, An error occurred while installing nginx in linux.
./Configure -- prefix =/usr/local/& make install
Prompt when installing nginx
./Configure: error: the HTTP rewrite module requires the
The role and implementation principle of RPM-GPG-KEY in package installation, rpm-gpg-key principle
In Linux, GPG is mainly used to sign officially released packages.
GPG is divided into public and private keys.
Public Key: A shared key. It is
To solve the "unable to connect to a repository at URL" problem, unablerepositoryProblem
The SVN server is built on A Linux machine. It is okay to checkout on machine A. After A while, install the SVN client on machine B and the checkout code
Linux memory layout example
Now let's take a look at how memory is laid out in this huge city history. During system initialization, the kernel first establishes a physical address ing in the real mode to specify which physical address ranges are
In linux, the find command uses instances and the linuxfind command instances.
In linux, the following search commands are available: which whereis locate find. The first three commands can be used to understand them.
Find command
Find [directory
Linux user configuration file and password configuration file tutorial, linux configuration file
Linux user configuration file and password configuration file tutorial
One row for each user, separated by seven segments
Section 1: User Name
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service