One: View CPUMore/proc/cpuinfo | grep "model name"grep "model name"/proc/cpuinfoIf you feel the need to see more comfortablegrep "model Name"/proc/cpuinfo | Cut-f2-d:Two: View memorygrep memtotal/proc/meminfogrep Memtotal/proc/meminfo |
New Autologsplit.cron file Contents:0 0 * * */bin/bash/alidata/log/nginx/access/autosplitlog.shNew autosplitlog.sh (must have x Execute permission) file contents:#everyday exec This script at 00:00logs_path= "/alidata/log/nginx/access/"
Q: After backup in the recovery system, the NIC number becomes eth1 instead of eth0A: Modify the Udev rules file, delete the 70-persistent-net.rules file under the/ETC/UDEV/RULE.D directory, and then restartFor some special applications, such as a
I once asked others how to start the kernel programming study, they basically said: ① If you don't need to know how the kernel works for you, why do you try? ② you should subscribe to the Linux kernel mailing list and try to understand. ③ If you don'
Third, Linux common commands 04Compression: gzip:1. Only files can be compressed and the directory cannot be compressed2. Do not keep source filesDecompression: Gunzip
The previous article is about Linux basic Rights management, which says that Umask has three digits, but when we execute the umask command to view the current user's umask value, we find that the output is 4 bits, which is the special
Linux file function-creatCreate a fileFunction Name: creatFunction prototype:int creat (const char *pathname, mode_t mode)function function: Create a file or device and open it in a write-only wayOwning header file:#include #inlcude #include return
The GCC compiler is a combination of many compiler portals, such as when compiling a. cpp file, using the C + + compiler, when compiling. c files.When compiling a C + + program, the library file and header file can be specified by-l[dir],-l[name]
When we clone each Linux server in the virtualization platform, there will be a situation where the NIC cannot be used, the way to solve this problem:650) this.width=650; "Title=" appears with this error "alt=" wkiom1u_xjcx0udwaac1iw3lync960.jpg
Linux file segmentation can be achieved through the split command, you can specify the number of rows divided by the size of the two modes. File merging under Linux can be done with the Cat command, which is very simple.Use split for file
Mount//10.7.21.25/linux-o Username=administrator,[email protected]/mnt/10.7.21.25 is the address of window The Linux directory is a shared file on window username password is the window's account password/mnt/is the location of the mounted Linux
Linux I/O redirection and linuxo redirectionI/O redirection:Linux:>: Overwrite the output.>>: Append outputSet-C: Disable overwrite redirection for existing files;If you want to force override, use> |Set + C: Disable the above functions2>: redirect
Common linux commands (1) grep
Grep is used to find strings.Case 1: Get the user's home directory
For example, if the user name is whuang, How can I obtain his home directory?
grep "^whuang:" /etc/passwd |awk -F : {'print $6'}
Case 2: Get the user
What to do after Ubuntu15.04 is installed
Ubuntu 15.04 has been released, bringing many new features and many unaccustomed things. Therefore, after installing the system, we need to perform a series of optimizations.1. Delete libreoffice
Although
64-bit ubuntu15.04 Upgrade Linux kernel to linux4.1.01. download the relevant kernel package
Ubuntu official website Linux kernel Repository: http://kernel.ubuntu.com /~ Kernel-ppa/mainline/
Download the following three deb packages:
$ wget -c http:/
Linux-(11) Permissions
Permissions are mechanisms used by the operating system to restrict resource access. In Linux, permissions are generally divided into read, write, and execution. Each file in the operating system has specific permissions,
View server hardware configuration information and resource occupation commands in Linux
View the machine model:
dmidecode | grep"Product Name"View Nic information:
dmesg | grep -ieth
View CPU information:
cat /proc/cpuinfo
View only the
How to clean up system memory in CentOSAfter opening a lot of programs that will occupy the memory, close these programs and find that the memory space is the same as that used when the application is not closed, as a result, when other applications
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service