How to hide the command line history of your Linux

If you are a Linux command-line user, sometimes you may not want certain commands to be recorded in your command-line history. There may be many reasons, for example, you have a position in a company where you have some privileges that you do not

Linux tar (package. Compress. Unzip) Command Description | How does tar extract files to the specified directory?

Packaging Example: package files in the /usr/local/src/zlib-1.2.5 directory into zlib-1.2.5.tar.gzCD/USR/LOCAL/SRCTAR-CZVF./zlib-1.2.5.tar.gz/zlib-1.2.5/*# compressed into the development directory (for example:/root/2/) tar-czvf/root/2/

Linux screen command details and common problems solved

I. BACKGROUNDSystem administrators often require SSH or telent telnet to a Linux server and often run tasks that take a long time to complete, such as system backups, FTP transfers, and so on. Usually we open a remote terminal window for each of

Linux Kernel (proc file system) parameters Linux proc File system, through the proc file system to adjust to achieve the purpose of performance optimization.

5 hidden dangers in the programming of Linux sockets

5 hidden dangers in the programming of Linux socketsDeveloping reliable Web applications in heterogeneous environmentsM. Tim Jones ([email protected]), Senior software engineer, EmulexIntroduction: The Socket API is a standard API for practical

Modify folder directory permissions under Linux system

Modify folder directory permissions under Linux systemFolder permissions IssuesLinux, Fedora, Ubuntu modify files, folder permissions the same way. A lot of people start to get into Linux when they're having headaches with Linux file permissions

Linux system log and log analysis

Linux system log and log analysis The Linux system has a very flexible and powerful logging function, which can save almost all the operation records and retrieve the information we need.The default log daemon for most Linux distributions is syslog,

Novice chooses seven points of note for using the Linux desktop

Guide How can users who have just reached the Linux desktop choose a suitable Linux desktop environment? If you're used to Windows or OS X, then how do you choose between more than 10 major Linux desktops and dozens of secondary ones when you

Linux mount (Mount) command detailed

Http:// is an excellent open-source operating system, can run in large-to-small to the palm of a variety of computer systems, with the growing maturity and stability of Linux systems and its unique advantages of

The VI editor for Linux uses

VI is a screen editor provided by all Unix systems, and it provides a Windows device through which you can edit files. Of course, the UNIX system slightly know people, more or less think VI super difficult to use, but VI is the most basic Editor,

A Linux command (PNS) Kill command per day

The KILL command in Linux is used to terminate the operation of the specified process (terminate a process). Kill to send the specified information to the program. The preset information is sigterm (15), which terminates the specified program.(1)

Installation of Linux operating system

With the development of embedded, Linux knowledge is a necessary part, let us do the Linux system installation process demonstration:First, the installation of LinuxThis blog is described in red flag Asianux Workstation 3 As an example, and other

[Linux] System call understanding (1)

This article is the first of a series of Linux system invocation columns, and the definition, rationale, usage, and considerations for Linux system calls is probably introduced to make a general impression on Linux system calls.What is a system call?

environment variable files and configuration in Linux

Introduction of environment variable fileTransferred from: variables in Linux include system-level and user-level, system-level environment variables are system variables to be read by

One Linux command per day (chown) command

The Chown command alters the owner of a file or directory and the group it belongs to, which can authorize a user to become the owner of the specified file or to change the group to which the file belongs.(1) Usage:usage: chown [Options] ... Owner [:

Basic analysis of Linux operating system (v)--grep command Family and regular expression initial knowledge

grep is known as one of the Three Musketeers of the text processing, although the Three Musketeers is the least functional and the simplest, but still can not be underestimated.The full name of grep is: Global search REgular expression and Print out

Linux Squid Cache Server

First, IntroductionProxy Server English full name is proxy server, its function is proxy network users to obtain network information.Squid is a software that caches Internet data, receives a user's download request, and automatically processes the

Operating system Knowledge (4)--linux User and user group management

Linux system is a multi-user multi-tasking time-sharing system, any user who wants to use system resources must first request an account from the system administrator and then enter the system as this account.On the one hand, the user's account can

Linux DirName, basename instructions

Http://, dirname directive1. Function: Remove the file name from the given file name containing the absolute path (part of the non-directory) and return the remaining path (part of the directory)2.

The make command in Linux explains the collection

Make is a very important compilation command , both in Linux and in the UNIX environment. Whether you are developing your own projects or installing applications , we often use make ormakes install. With make tools, we can break down large

Total Pages: 5469 1 .... 41 42 43 44 45 .... 5469 Go to: GO

Alibaba Cloud 10 Year Anniversary

With You, We are Shaping a Digital World, 2009-2019

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.