1. File basic information: TimeAccess time: atime, view content//rhel6 will be postponed changes AtimeModified: Mtime, modify contentChange time: CTime, file attributes, such as permissionsDeletion time: Dtime, the time when the file was
/( Direct/ )Direct/representation: root directory../( dot followed/ )The dot follows/represents: the current directory (the way the relative path is written).. /( dot space/ )A dot with a space is equivalent to the source command, which indicates
Install the required environmentNginx is a C language development, it is recommended to run on Linux, of course, you can also install the Windows version, this article uses CentOS 7 as the installation environment.Internet configuration:If you
According to the project needs, we need to put all the services to the designated user name to run, Baidu has a lot of articles including Google also did not find the answer, after many tests, and finally success. Here is an example I wrote (note
User Management Linux system is a multi-user multi-tasking time-sharing system, any user who wants to use system resources must first request an account from the system administrator and then enter the system as this account.On the one hand, the
1. Linux environment variable (source/etc/profile immediate effect)/etc/profile This file sets environment variables for each user of the system, and when the user first logs on, the file is executed and the shell settings are collected from the
The iptables command is a common firewall software on Linux and is part of the NetFilter project. Can be configured directly or through a number of front-end and graphical interfaces.GrammarIptables (option) (parameter)Options-tIP address to
1. Search for the specified file in the current directory:Find. -name Test.txt2, in the current directory of Fuzzy search files:Find. -name ' *.txt '3. Search for files with specific attributes in the current directory:Find. -AMIN-10 # Find the
Exsi host on the right-click on the new virtual machine, build your ownInstall the operating system on the virtual machine, Windows or Linux, two kinds of loading method:1 with the physical optical drive on the ESXI host2 on Vclient, vcenter client,
Getting started with Shell: Shell operators, getting started with shell OperatorsShell (2) Basic Shell Operators
Like other programming languages, Shell supports multiple operators, including:
Arithmetic Operators
Relational operators
Boolean
Summary of common linux commands for file operating system and disk management, and common linux commands
1. df-h view disk capacity
2. view the directory capacity in du-h.
3. view the directory depth by du-h-d
Du-h-d 0 ~ View level-1 directory
The path to Python [Article 3]: grocery stores based on Python, Article 3 of pythonString formatting
There are two ways to format Python strings: percent and format.
The percent sign method is relatively old, while the format method is relatively
Linux Server version selection method, linux Server version1. if a large company has more than 50 servers or hundreds of servers, we recommend that you keep them as they are or use red Hat Enterprise. redhat is the linux release, the best release of
Detailed analysis of \ r \ n in Linux, linuxOperating in Linux, \ r \ n is inevitable, especially in many places, such as the recent email sending, why \ r \ n, in the past, only the era of \ n seems to have passed, because I am a person who prefers
Dm-verity,1. Device Mapper:
Dm-verity is a sub-module in the Device Mapper of the kernel subsystem. Therefore, before introducing dm-verity, you must first introduce the basic knowledge of Device Mapper.
Device er provides a ing framework from a
Notes for setting up Solr7.2 on Linux
System EnvironmentSolr-7.2.0.tgzApache-tomcat-9.0.2.tar.gzJdk-9.0.1_linux-x64_bin.tar.gzCentOS-7-x86_64-DVD-1708
Procedure
1. decompress the tar.gz source code package and get the solr-7.2.0/folder;
2. Create
In Linux, after a VM goes downSolution after virtual machine downtime in Linux
Symptom
The VM cannot be started due to an unexpected operation, and the host operating system cannot be restarted.
Recovery Method
Step 1:
Delete the VM.
Step 2:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service