Transfer from http://blog.csdn.net/tengdazhang770960436/article/details/53906263First step: Get the process number" ps-ef | grep ${tomcat_name} | grep-v grep | awk ' {print $} '"'{print $}' )Step two: Kill the process" kill-9 ${pid}
The total meaning of the command in 1.ls-lThe file system determines the size of the block when it is formatted, each block can hold only one file, for example, only 3 K, which will occupy a 4K block, other files can not occupy the remaining 1K
Linux InstallationDownload the test to the catalogue,chmod +x Mounting KitIn execution./Connect the installation packageStart XAMPP/opt/lampp/lampp startStop XAMPP/opt/lampp/lampp stopRestart XAMPP/OPT/LAMPP/LAMPP restartSecurity
NFS is a network file system that enables management of remote file systems with the help of RPC (remote procedure Call). The client that provides the RPC service in centos6.5 is Rpcbind. 1. Install start NFSInstall NFS service via Yum-y
1. Related files for users and groups1.1/etc/passwdEach line represents an account, and a few lines represent a few accounts in your systemWith ":" As a delimiter, seven fieldscat /etc/passwdroot:x:0:0: Root:/root:/bin/bash1.1.1 Account Name: root1.1
TAR-CVF Test.tar Test----Package The test folder into Test.tar.# TAR-XVF Test.tar----The Test.tar is disassembled and extracted from the file# TAR-TVF Test.tar----List contents in tar Package# TAR-RF Test.tar log/----Append the log folder to the
FHS definition: filesystem hierarchy standard, File system hierarchy standard .rootfs: root file system ./boot: the relevant file storage path required for system startup vmlinuz: Kernel file . initrd: disk impression file, a
I. Renaming files and folders under Linux and CentOSMv:move with the move File command, because the Linux system does not have a dedicated rename command.Basic format:Move file: MV file name move destination file nameRename file: MV FileName
KGDB:Note: The Linux kernel has been internally integrated Kgdb from 2.6.26, just configure KGDB and recompile 2.6.26 (or higher) cores toThis article uses kernel 3.0.35, CPU as imx61. Configure Kernel support KDBMake MenuconfigKernel Hacking--->[*]
1.awk This command is primarily a matching column, and grep is a match line for some actionCat Data.txt | awk ' {print '} '--pick out the first column in the document650) this.width=650; "Src="
Linux Development and application
Unix/linux Development is and version
Free software and lamp
Linux application areas
Linux Learning Methods
UNIX Development History(1) In 1965, the United States Massachusetts Institute
User and User password security:Linux, like Windows, manages the operating system with user accounts.There are two types of Linux users:1: System User2: Login UserA system user is an account that the system completes certain services in a specific
1 Date command, display system date, display in format, date +%y-%m-%d 2 Cal command, display calendar, Cal month Year Cal 2 2017 3 BC Simple and useful calculator 4 Common Hotkey tab, CTRL + C, ctrl+dThe TAB key has the function of command
pwd-----To see your current directory/-----represents the root directoryCD (chage directory)-----switch directoriesLS-----View the files in the current directoryls-l----- Listing Current directory detail file information.. -----to return to the
1, minimize the installation of CENTOS7 operating system 2, the new hard disk divided into two partitions, two partitions of the file system in order to EXT4 and XFS3, two file systems are hung in the/mnt and/opt directory 4, the addition of
The most important function of the SED command is to replace it with the following document content as an example
650) this.width=650; "Src=" https://s5.51cto.com/wyfs02/M01/8F/76/wKiom1jfGBGwKTdoAAAhAmip6nE421.png-wh_500x0-wm_ 3-wmp_4-s_3702725
key points : 1, the installation of the Linux system on the virtual machine steps, the main note in the choice of Linux system 32-bit Select the system, if 64-bit system must choose 64-bit system, otherwise the network card can not be recognized,
IntroducedMost of the IO statistics tools under Linux, such as Iostat, Nmon, and so on, are only counted to the Per Device's read and write situations, and if you want to know how each process uses IO, it's a bit cumbersome.Iotop is a top class tool
Non-balanced handling of NIC interruptions and nic interruptions
When the data volume is large, hard interruptions and soft interruptions may cause bottlenecks.
The network adapter receives data packets and generates an interrupt signal from the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service