Common Text Conversion Command 1 (TR) under Linux

Common text conversion and Processing command TR command under LinuxTR: replacing, compressing, or deleting charactersFormat: TR [OPTION] ... SET1 [SET2]Options: -C complement uses character set 2 to replace characters not contained in

Linux SSH Service

OpenSSL-based SSHSSH: Client programSSHD: server-side softwareThe Sshd:centos is installed and running by defaultSSH protocol: SSH v1 SSH v2v1 now basically not seeSSH authentication:1. Password-based authentication (default authentication method)2.

Linux Build FTP User

#! /bin/bashSleep 1Mkdir-p/ceshi/Userdel Ceshiuseradd-d/ceshi-s/sbin/nologin Ceshiecho Mima | passwd Ceshi–stdinChown-r Ceshi:ceshi/ceshiKillall PROFTPDSleep 1Service PROFTPD StartView User files:/etc/passwdThe above is the Linux to build the entire

FTP Service built under Linux

First, install VSFTPD componentsYum-y Install VSFTPDSerivce vsftpd Start #启动服务FTP is logged on by default for anonymous usersInstall the FTP client component on another serverYum-y Install FTPFTP +ip Address: FTP 192.168.1.100Enter user name: FTP

Linux text commands

Sort compares each line of a file as a unit, comparing it from the first character backwards, to the ASCII value in turn, and finally outputting them in ascending order.-B ignores the front-most whitespace part-D does not ignore the first whitespace

Linux Directory Management commands

1. Open Folder command: CDCd/dirExample: Opening the ETC directorycd/etc/2. View current directory command: PWDExample: Current Location/tmptmp]# pwd/tmp3. View all files and folders under current path: LSExample: currently under

Ext2 of Linux file system

1, ext2 file system overall layoutA disk can be partitioned into multiple partitions, and each partition must first be formatted with a format tool (such as a MKFS command) to format the file system before the file is stored, and the formatted

"Linux" records the process of a system attack

Today login Zabbix Monitoring Web page when found very card, log in to the system after, through top, CPU has 100%, there is a process called Httpds occupy, the first reflection is the system was invaded, the following records the process, only for

14. Self-learning Linux road: Positional parameters, interactive scripts, giving variables default values

mul

Knowledge point 1: Positional parameters    position parameter :#/tmp/tesh.sh 3 89       $: script itself       $: The first parameter of a script       $: second argument to script       ....     Example : Any given two integers, sum, difference,

Linux Basics-Manage user and file permissions

(i) Users and groupsUser account:Super User: Root userNormal User: Created by the root user or another administrator with full permissions only in their own host directoryProgram users: not allowed to log on to the system, such as: Bin, daemon, ftp,

Basic configuration of Linux

Installation: Vmvare, CentOS, securecrtportable (free version)Software address: https://share.weiyun.com/1da7a1853bc8f9b8375a1564842899f2 (password: zu6g)3. Start configuration1 open VMware, press actionGateways can be set by themselves | Click OK

Linux Operations Block Diagram

Outermost: CDN Server (Content sub-party network) ———— > DNS (Intelligent Parsing)|          |( Network) VRRP,ROUTER,OSPF||| (Static and dynamic separation data) inner layer:     MemRedis,nosql Dynamic | static MongoDB V/——— Sphp/jsp Storage     /

Linux System Optimization Summary

Recently a friend asked me, said Linux system how to optimize will be better, I think actually this topic is actually bigger, I also collected the next Linux system optimization of the article, roughly collated under, as follows:1, close the SElinux2

The most dangerous command in a Linux system have you tried it?

Linux commands to worry about1.RM-RF *Man RMNAMERm-remove Files or directoriesOPTIONSRemove (unlink) the FILE (s).-F,--forceIgnore nonexistent files, never prompt-R,-R,--recursiveRemove directories and their contents recursively-V,--verboseExplain

Linux shutdown, restart, exit

Tag:nbsp    off     10 min     system     sync     tab   lin   esc    sleep     Serial number Command Description 1 Shutdown-h now Turn off the machine now 2 Shutdown-h +10

No access to another Linux service via SSH under Linux

No access to another Linux service via SSH under LinuxWe use SSH login on 192.168.5.21 's computer 192.168.5.20 prompt error650) this.width=650; "title=" image "style=" border-top:0px;border-right:0px;background-image:none;border-bottom:0 px;padding-

Alternatives use notes, alternatives notes

Alternatives use notes, alternatives notes The X64 ora23 X64 system has multiple versions of python. The default version is python2.7. $ ls -l /usr/bin/python*lrwxrwxrwx. 1 root root 24 Mar 26 15:49 /usr/bin/python -> /usr/bin/python2lrwxrwxrwx. 1

[Original] install nodejs + express and centosnodejs in Linux (CentOS)

[Original] install nodejs + express and centosnodejs in Linux (CentOS) I have found many steps on the Internet and made a summary of various problems. 1. Download Wget -- no-check-certificate https://nodejs.org/dist/v6.10.1/node-v6.10.1-linux-x64.

Linux Kernel version uname command GNU Project Linux release version, unamegnu

Linux Kernel version uname command GNU Project Linux release version, unamegnu 1. the kernel version is uniformly encoded and released by the Linux kernel community. The format is as follows: Major. minor. patch-build.desc Main version number.

Kafka ~ Several Common commands on the server, kafka server commands

Kafka ~ Several Common commands on the server, kafka server commands After kafka is installed and deployed on Centos, we can push messages to and consume messages to the server. Today we mainly talk about several common commands, such as creating

Total Pages: 5467 1 .... 3858 3859 3860 3861 3862 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.