First, Login:User name: User ID, Linux identifies the user based on ID, root ID is 0Certification authentication, authorization authorization, Audit auditionCommand Prompt promptLinux based on the number of magic numbers on the head of a file search
# No Anonymous loginanonymous_enable=no# let Local Users login# If connect from the Internet with local users, you sho Uld Enable tls/ssl/ftpslocal_enable=yes# Write Permissionswrite_enable=yes
# 1. All users is jailed by
the difference and usage of/etc/profile and/ETC/PROFILE.D under Linux environment1. Two files are set file,/etc/profile is permanent, is global variable,/etc/profile.d/set all users to take effect. 2./etc/profile.d/than/etc/profile good maintenance,
1) After restart effective on: chkconfig iptables on off: chkconfig iptables off 2) Immediate effect, restart after failure on: service iptables start off: service iptables stop It should be explained that for other services under
/bin binary Executable command/dev Device Special files/etc system administration and configuration files/ETC/RC.D startup configuration files and scriptsThe base point of the home user directory, such as the user's home directory is/home/user, can
Date Linux time management, displaying and configuring system time. RTC Real time, motherboard crystal hardware time, Linux system boot is read hardware time as system time, after startup kernel use CPU to simulate hardware time as system
To see if the system installs the VSFTPD service# Rpm-qa VSFTPDIf not installed, can be installed with Yum#yum-y Install vsftpdModifying a configuration fileManual inputChroot_local_user=yesThis line comment (anonymous login)#anonymous_enable
* represents any number of characters? represents any one character; delimiters for successive different commands# configuration file Comments| Piping~ User's home directory- Last directory$ the symbol to be added before the variable/ Path
I pretend that samba is always used to transfer files between Linux and Windows in a virtual machine, there are a lot of installation tutorials on Samba online, and a more comprehensive blog is recommended: http://www.cnblogs.com/mchina/archive/ 2012
1. File descriptor(1) The essence of a file descriptor is a number, which is essentially a table entry in the process table file descriptor, the process through the file descriptor as index to get the table table pointer, and then indirectly access
The first stepOpen the VMware Software [edit] Select virtual Machine Network configurationStep TwoSelect VMnet8 This cardSubnet IP set to xxx.xxx.xxx.0Note 1: Nic VMnet1 is a network that provides bridging mode{If you use this network card, you are
Front desk and backstageWhen the user enters the shell command and presses the ENTER key directly, a foreground process is started.After the user enters the shell command, adding the "&" symbol and pressing ENTER will start a background process. At
First, the basic principles of Linux system1, all documents.2. The configuration file is saved in plain text format.3, consisting of a single small program, combined with a number of small programs to complete complex tasks4, try not to capture the
It is a very important security common sense to change the password regularly, we usually change the user password to use the command such as the passwd user to change the password, but this will enter the interactive mode, even if the use of script
Shutdown command:
ShutdownShutdown command to safely shut down the system. It is dangerous for some users to turn Linux off using a direct power-off . Because Linux , unlike Windows, runs many processes in the background, forcing a
Process Management 2: Process Management
Process Management-terminate a process
1. kill command
[Root @ localhost ~] # Kill-l
# View available process signals
Signal code
Signal name
Description
1
SIGHUP
This signal
Process Management 1. Process Management
Process Management:1.1 view Processes
1.2 Process Management
1. process description ◆ a process is a program or command being executed. Every process is a running entity and has its own address space and
Linux Firewall iptables command details, iptables command details
[Go to: original article link]
Iptables-FIptables-XIptables-F-t mangleIptables-t mangle-XIptables-F-t natIptables-t nat-XFirst, empty the three tables and empty the self-built
Linux installation and linux Installation
Red Hat linux 6 installation process details.
Installation is applicable to Windows physical machines and macOS physical machines. VMware is used to install virtual machines. VMware for mac is simple. You
Install Nginx + MySQL and centos7nginx on CentOS7First, install the nginx yum source.
[Root @ AD ~] # Rpm-Uvh http://nginx.org/packages/centos/7/noarch/RPMS/nginx-release-centos-7-0.el7.ngx.noarch.rpmGet
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service