chmod: Change file 9 propertiesThere are two ways to set up Linux file attributes, one is a number and one is a symbol.Linux files have the basic permissions of nine, respectively, owner/group/others three identities each have their own
Linux system configuration and service management
Application, server application-openstack
Operating system
Three necessary levels for-------------system applications
Hardware
What is a regular: a string of regular stringsgrep: Filter The specified keyword format: grep [-cinvabc] ' word ' filename-C line number-I is case insensitive-N Display Line number-V Take reverse-R Traverse All subdirectories-A followed by a number
Centos7 Some simple operations after installation of the systemThe last time we completed CentOS7 through the virtual machine has been installed.After rebooting the system, enter the login screen.Once the system has landed successfully, it looks
command to count the number of files:1) Count the number of files in the current folder Ls-l |grep "^-" |wc-l2) count the number of directories under the current folderLs-l |grep "^d" |wc-l3) Count the number of files in the current folder,
In the process of learning Linux, we will generally use virtual machines to build the Linux environment we need, because the system will die in various test situations, and the installation of the environment is a waste of time, on the virtual
#! /bin/bashPath=/usr/local[!-D "$path"] && mkdir $path-PCat 1.[install Lamp]2.[install LNMP]3.[exit]pls input the num you want:EndRead-p "Please input num:" numExpr num + 1 &>/dev/null[$?-ne 0] &&{echo "The num you input must is {1|2|3}"Exit
Linux Link ConceptsThere are two types of Linux links, one called hard links, and the other called Symbolic links (symbolic link). By default, the LN command produces a hard link."Hard Connect"A hard connection is a connection that is made through
Some of the commonly used shutdown/Restart commands under Linux are shutdown, halt, reboot, Poweroff, and Init, all of which can achieve the purpose of shutting down the system, but the internal working process of each command is different. Linux
Introduction to security alerts on GitHub
Last month, we used dependency graphs to make it easier for you to track projects that your code depends on. It currently supports Javascript and Ruby. Today, over 75% of GitHub projects are dependent. We
Use sudo for authorization in Linux
Learn how to grant the managed network functions and specific service permissions to trusted users while protecting the security of the root password.
I recently wrote a brief Bash program to copy MP3 files from
Configure and use Maven in Eclipse
Build a Maven development environment under Eclipse.
Now we need to use Eclipse to develop Maven projects. We need to configure Maven in a simple way.
1. Download the Maven installation package.
2. If you directly
Create a sub-process execution task in Linux
The Linux operating system depends on Process Creation to meet user needs. For example, if you enter a command, the shell process creates a new process, and the new process runs another copy of the shell
CentOS 7.4 Upgrade Linux Kernel
Recently, intel has released two Meltdown and Spectre vulnerabilities that allow major service providers to perform system upgrades one after another. Therefore, we recently learned about Linux kernel upgrades.
Using snapper to easily play with the snapshot function of BtrfsI. Preface
The outbreak of the WannaCry ransomware virus in early May 2017 made me aware of the importance of deploying storage snapshots, especially on servers that provide storage
Mysql adds the federated engine for dblink remote table access and federateddblink
Check whether the mysql database federated engine is enabled.
Show engines;If federated is not enabled, add federated to mysqld in mysql configuration file my. cnf.
Docker3.10 modify the default address and common docker commands, docker3.10docker
How to modify the docker0 IP address of the docker default NIC:[Root @ centos7 ~] # Cat/etc/docker/daemon. json Add the following line to this file and restart the
Docker Quick Start Guide
Docker is developed using the Go language. It encapsulates and isolates processes based on Linux kernel cgroup, namespace, AUFS, and other technologies. It is an operating system-level virtualization technology. Because the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service