Question 1:find Why can't I find the following *sample* file when I use "-a" command?[[email protected] test]# Find/-name "USR"/usr/usr/share/doc/oddjob-0.30/sample/usr/usr/share/gdb/auto-load/usr[[email protected] test]# Find/-name "usr"-a-name
1. Because of the deep appreciation of the Linux programming concept:For example: "Small is the beauty", "Let the program do only one thing", "portability is more important than efficiency", "Everything is the file-easy to use and the hardware as
1. Telnet to the Linux server with putty, then use Puttygen to generate the key, save the generated key, save the private key and save the public key copy to the Authorized_keys file of the Linux server.2. Create file:
Prior to configuring the Linux system, in the network this block I use bridge mode.Now share the process of configuring the Linux network using virtual machine bridging mode .First, configure the local IP address of the external network.Ii.
Summarize the interview questions encountered: If there are errors, please point out, thank you!1, using iptbales How to forward the local 80 port request to 8080 port, the current host IP is 192.168.2.1 1), Dnat implementation: IPTABLES-T nat-a
First, the problem introduced1. header Files and librariesWhen we are in a PC host Linux environment (such as Ubuntu), write a Linux application and then use GCC to compile. The header file is written at the beginning of the source code because we
The two Linux upgrade commands are yum upgrade and Yum Update, and the two commands are different:Copy CodeThe code is as follows:Yum-y UpdateUpgrade all packages and also upgrade software and system coresCopy CodeThe code is as follows:Yum-y
1. After installing the system, reboot, will let you enter the account passwordAccount Number: RootPassword: is the password you configured before you installed the systemAfter entering the system. Modify the configuration file for the
If you forget the root password of Linux, you can go to single user mode to modify the root password; This article describes how different versions of Linux enter a single user.1. RHEL5 access to single-user methodStart Redhat Linux 5 First, and
Viewing the contents of a file There are many useful instructions to learn: Let's get started.1 Cat Displays file contents starting from the first line 2 The TAC starts with the last line showing 3 NL output Line number when displayed 4 More one
Basic knowledge of Linux (v)First, the Linux network principle and the basic setting1. Use the Ifconfig command to maintain the network1) function of the ifconfig command: Displays the details of all the network cards being started or sets the IP
Read the data from City1.csv, City2.csv, City3.csv, City4.csv, and draw a line chart.CSV Data 1A bFigure 1The code is as follows:#读取csv数据Data1=read.csv ("City1.csv")Data2=read.csv ("City2.csv")Data3=read.csv ("City3.csv")Data4=read.csv ("City4.csv")#
Hello everyone, my name is Xiao Bai, began to contact Linux, the main reference Amin teacher Linux for the main line, I hope to have a growing process.1. How can I learn Linux well?* Practice makes perfect* Persist* Develop a Learning Plan*
Linux: quickly find the Thread that occupies too much CPU, linuxthread
1. Use the top command to find the CPU-consuming process and write down the PID
2. Run the command ps-mp PID-o THREAD, tid, and time to find the threads with high CPU
Common centos command line operations, centos command line
1. view port usage
Lsof-I tcp: 80
2. check whether a firewall is installed.
Service iptables status
Check whether firewall is enabled/Etc/init. d/iptables status
3. view all installed
Virtual Machine CentOS NAT Mode Networking and secureCRT remote login management tool, centossecurecrt
During the past few days, I have been coding at work in the company during the day. In the evening, I went home to drum up the CentOS under
Special variables in Shell
$0
File Name of the current script
$ N
N is a number starting from 1. $1 represents the first parameter, $2 represents the second parameter, and $ {10} represents the tenth parameter.
Sed usage (reprinted) and sed usageIntroduction
Sed is an online editor that processes a row of content at a time. During processing, the currently processed rows are stored in the temporary buffer, called the pattern space. Then, the sed command is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service