Linux under IP command usage

The configuration data forwarding, can pass 1, the route forwarding namely uses the router realizes;2, using NAT forwarding;To put it simply:The information in the routing table is just the next place in the router where the packet is specified.

Common examples of TAR commands under Linux

Syntax: tar [main option + Secondary options] file or directoryWhen using this command, the main option is required, and it tells Tar what to do, auxiliary options are auxiliary and can be used.Main options:C Create a new profile. Select this option

Jdk-6u45-linux-i586.bin Installation Steps

# chmod u+x ./jdk-6u45-linux-i586.bin1.# ./jdk-6u45-linux-i586.bin在按提示输入yes后,jdk被解压到./jdk1.6.0_45目录下。为与下面2中JDK安装路径一致,我们进行下列操作,在/usr/java下建立安装路径,并将文件考到该路径下:# sudo mkdir /usr/java# sudo cp -fr ./jdk1.6.0_45 /usr/java2.修改所有用户的环境变量# sudo vim

(019) Linux File Search

Fundamentals of the ten-year OPS series-LinuxZeng LinContact: [Email protected]Website: www.jplatformx.comCopyright: Please do not reprint the article without permission First, IntroductionThe Linux system contains very many files! This

Linux Commands-Rights Management command: Chown

Useradd Wangyunpeng Create a user named Wangyunpeng passwd wangyunpeng to wangyunpeng This user to change the passwordTo use a new user for quick connect:Touch ABCD -l show file list long format pwd view the absolute path of the

LINUX Config SVN

svn

1. Installing SVN yum-y Install Subversion2. Create a repository directorymkdir/root/svn/Svnserve-d-r/root/svn/3. Create a version librarySvnadmini create/root/svn/www.food.comIn this case, there are some configuration files in the www.food.com

Components of the Linux kernel

The Linux kernel consists of 5 subsystems: Process scheduling (SCHED), memory Management (MM), virtual file system (VFS), network Interface (NET), and interprocess communication (IPC).1. Process schedulingProcess in the process scheduling subsystem

Linux Commands-Rights Management command: chmod

Special note: In Linux, directories usually have R and x two permissions. The previous question of deleting a file is to have W permission on the directory where the file resides.CD/tmp switches to the TMP directory under Touch chengshi.list-L

Linux Core parameter modification

The main modified files are cat/etc/sysctl.conf, and the core parameters are reloaded by sysctl-p after modification.1, net.ipv4.tcp_fin_timeout = 30 After the socket connection is disconnected, the system recycles the handle after a few seconds,

View TCP connections and status under Linux

Netstat-n | awk '/^tcp/{++s[$NF]} END {for (a in S) print A, s[a]} 'Time_wait 8947Fin_wait1 15Fin_wait2 1Established 55Syn_recv 21CLOSING 2Last_ack 4 TCP Connection Status detailedLISTEN: Listening for connection requests from a

Linux Common Command accumulation

A few days ago in Imooc casually read a public class, learned a few common commands, recorded here, slowly accumulate. It feels like learning one, sometimes it's better to have a better memory than to follow a book and learn from the beginning.1.

Linux Learning Experience

? ? A few days ago to see an article, very agree with one of the words Linux只是一个工具,工具不是目的,只是手段。 ?? Today is not about how to learn Linux, just casually talk about my thinking of Linux. One of the most important concepts in Linux is ' files ', and

Understanding of permissions for Linux folders and files

A folder's R (readable) permission allows the user with this permission to see the directory structure within the folder, but cannot access the folder without the X (executable) permission. Therefore, to enter the folder must have X permission, W

Ubuntu 14.04 + Linux 3.14.34 system call for file copy

64-bit system with Ubuntu 14.04 + new kernel linux-3.14.34Https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.14.34.tar.xzBefore using/boot/grub/grub.cfg do not make changes, if you have changed the best to remove the previous changes.In order to

Wuyi Linux Uninstall JDK

Look at some of the information that some Linux comes with jdk1.4, if it comes with jdk1.4, the first thing to do is to unload jdk1.4. Practice: Input command: #rpm-QA | grep GCJ If the output does not have the content, the description does not have

Linux Common configuration Files

What is a configuration file?/etc contains a system-specific configuration file. The so-called configuration file, which is used for the control program to run local files, it is in most cases "read-only" and "private" files, and is editable.1.

The Linux history command displays the user name and operation time

Linux System when you enter and execute commands in the shell (console), the shell automatically logs your commands to the history list, which is typically saved in the. bash_history file in the user directory. By default,historydoes not log the

Linux commands-File Search command: Whereis

Whereis Useradd Find the location of the command Useradd and also find out where its Help file is located whereis rm Find the location of the command RM, and also find out where its Help files are locatedWhereis passwd View passwd file location, in

Linux commands-File Search command: grep

More/etc/inittab Paging View Inittab file contentsgrep multiuser/etc/inittab Find the location of the multiuser string in Inittab file contentsGrep-i Multiuser/etc/inittab Find the multiuser string in the location of the Inittab file contents

Linux Soft Interrupt

This article reprinted from: http://blog.chinaunix.net/uid-9620812-id-3833377.html, if necessary, please visit.Technorati Tags: Linux soft interrupt---------------------------------------I'm a split line---------------------------------------- first,

Total Pages: 5467 1 .... 4249 4250 4251 4252 4253 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.