If you are a Linux command-line user, sometimes you may not want certain commands to be recorded in your command-line history. There may be many reasons, for example, you have a position in a company where you have some privileges that you do not
Packaging Example: package files in the /usr/local/src/zlib-1.2.5 directory into zlib-1.2.5.tar.gzCD/USR/LOCAL/SRCTAR-CZVF./zlib-1.2.5.tar.gz/zlib-1.2.5/*# compressed into the development directory (for example:/root/2/) tar-czvf/root/2/
I. BACKGROUNDSystem administrators often require SSH or telent telnet to a Linux server and often run tasks that take a long time to complete, such as system backups, FTP transfers, and so on. Usually we open a remote terminal window for each of
http://blog.csdn.net/guowake/article/details/3279796 Linux proc File system, through the proc file system to adjust to achieve the purpose of performance optimization.
5 hidden dangers in the programming of Linux socketsDeveloping reliable Web applications in heterogeneous environmentsM. Tim Jones ([email protected]), Senior software engineer, EmulexIntroduction: The Socket API is a standard API for practical
Modify folder directory permissions under Linux systemFolder permissions IssuesLinux, Fedora, Ubuntu modify files, folder permissions the same way. A lot of people start to get into Linux when they're having headaches with Linux file permissions
Linux system log and log analysis The Linux system has a very flexible and powerful logging function, which can save almost all the operation records and retrieve the information we need.The default log daemon for most Linux distributions is syslog,
Guide How can users who have just reached the Linux desktop choose a suitable Linux desktop environment? If you're used to Windows or OS X, then how do you choose between more than 10 major Linux desktops and dozens of secondary ones when you
Http://www.jb51.net/os/RedHat/1109.htmlLinux is an excellent open-source operating system, can run in large-to-small to the palm of a variety of computer systems, with the growing maturity and stability of Linux systems and its unique advantages of
VI is a screen editor provided by all Unix systems, and it provides a Windows device through which you can edit files. Of course, the UNIX system slightly know people, more or less think VI super difficult to use, but VI is the most basic Editor,
The KILL command in Linux is used to terminate the operation of the specified process (terminate a process). Kill to send the specified information to the program. The preset information is sigterm (15), which terminates the specified program.(1)
With the development of embedded, Linux knowledge is a necessary part, let us do the Linux system installation process demonstration:First, the installation of LinuxThis blog is described in red flag Asianux Workstation 3 As an example, and other
This article is the first of a series of Linux system invocation columns, and the definition, rationale, usage, and considerations for Linux system calls is probably introduced to make a general impression on Linux system calls.What is a system call?
Introduction of environment variable fileTransferred from: http://blog.csdn.net/cscmaker/article/details/7261921Environment variables in Linux include system-level and user-level, system-level environment variables are system variables to be read by
The Chown command alters the owner of a file or directory and the group it belongs to, which can authorize a user to become the owner of the specified file or to change the group to which the file belongs.(1) Usage:usage: chown [Options] ... Owner [:
grep is known as one of the Three Musketeers of the text processing, although the Three Musketeers is the least functional and the simplest, but still can not be underestimated.The full name of grep is: Global search REgular expression and Print out
First, IntroductionProxy Server English full name is proxy server, its function is proxy network users to obtain network information.Squid is a software that caches Internet data, receives a user's download request, and automatically processes the
Linux system is a multi-user multi-tasking time-sharing system, any user who wants to use system resources must first request an account from the system administrator and then enter the system as this account.On the one hand, the user's account can
Http://blog.sina.com.cn/s/blog_9d074aae01013ctk.htmlFirst, dirname directive1. Function: Remove the file name from the given file name containing the absolute path (part of the non-directory) and return the remaining path (part of the directory)2.
Make is a very important compilation command , both in Linux and in the UNIX environment. Whether you are developing your own projects or installing applications , we often use make ormakes install. With make tools, we can break down large