You actually can does this netcat with, I believe it's already installed in the most cases on Linux, and it's dead Simp Le.On PC 1, type: nc -l 55555On PC 2, type: nc $IP 55555, where $IP equals the local IP address of PC 1 [e.x. 192.168.2.50]Once
Reprint: http://www.cnblogs.com/aLittleBitCool/archive/2011/10/18/2216646.htmlAsynchronous Io, a very interesting thing, from the interface, the package is more powerful, there is time to study the internal implementation, you can consider
In the interrupt mechanism in the kernel, in order to prevent the problem of resolving interrupt nesting (preventing one interrupt from interrupting another interrupt), introduce the small task mechanism:Using a small task mechanism requires three
Answer:When applying permissions to directories on Linux, the permission bits has different meanings than on regular files.
The write bit allows the affected user to create, rename, or delete files within the directory, and modify the
Linux is a very automatic file generation system, log, mail, backup and so on. But for some long-time logs, you can set up scheduled task deletions. sentence notation:find corresponding directory-mtime + days-name "file name"-exec rm-rf {} \;Example
Java programmers need to learn some Linux knowledgeJava programmers want to learn some Linux knowledge, here is the command you want to learn: large-scale Java EE applications are built in the Linux environment. In the development environment, we
In many classic operating system textbooks, the process is always defined as an execution instance of a program, it does nothing, it only maintains the various resources required by the application, while the thread is the real execution entity.The
Use a one-time password to securely log on to Linux through SSH
Some people say that security is not a product, but a process (LCTT Note: security company McAfee believes that security risk management is a methodology, rather than a stack of
Use Git after the default SSH port is changed
For security or other reasons, we may modify the default SSH service port number. By default, the existing git project reports an error during pull or push.
Now, if the remote settings of the original
Centos7 switch root user set no password
In centos7, whenever we use a common user to switch to the root user, a password is prompted. However, in some cases (such as personal computers), it may be a little troublesome.
Therefore, it is necessary to
Sequence of CentOS boot scriptIfServiceToolAfter the restart, You need to manually start a lot of services, work and future maintenance is relatively cumbersome, and I have summarized the followingLinuxLowerStartAuto StartScriptInvolvedKnowledgeAnd
CentOS7 Automatic startup commandOld task commandsThe new command enables a service to automatically start chkconfig -- level 3 httpd on systemctl enable httpd. service causes a service to not automatically start chkconfig -- level 3 httpd
Centos password cracking and running level
Today's key words: centos cracking password running level
OK. Let's talk about today's content.1. Don't teach you anything. Teach you to read the system version first (I vaguely remember how to help the
Common CentOS text display commands
Keywords: 1. common text viewing commands ------- 2. File Types and basic Permissions
1. common text viewing commands
The following shows the commands one by one, and then introduces cat ---- more ----- less -----
Difference between su and sudo commands in CentOSI. Use the su command to temporarily switch user identities 1. Conditions and power of su
The su command is a tool for switching users. How can this problem be solved? For example, if we log on as a
Adjust the terminal resolution after minimal Centos Installation
Problem description: to minimize the installation of CentOS, there is no graphical interface by default. However, the command line interface is very small (800*600 by default), and
Basic commands for CentOS
Common basic commands:
Type COMMAND: displays the type of the specified COMMAND.
Whatis COMMAND: View COMMAND summary and Chapter Information
Info COMMAND: online document
Hwclock-w: synchronize system time to hardware time
CentOS Permission System Restoration Method
Sometimes the chmod-R is 777/, and the system is paralyzed ~ What should we do ?? Let's take a look.
First, you must prepare the same system as the faulty machine. For example, you can install a linux
Use rtop to monitor remote servers
Rtop is an SSH-based remote system monitoring tool. PassRtopYou can remotely monitor CPU, memory, disk, and network usage.
RtopYou can use the Go language to obtain and compile the source code as follows:
Git
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service