1. Download the JDKCurrently the latest JDK version is: Java SE development Kit 7u5: http://download.oracle.com/otn-pub/java/jdk/7u5-b06/jdk-7u5-linux-i586.tar.gzCheck Latest: http://www.oracle.com/technetwork/java/javase/downloads/index.html2.
Simple use of the Vmstat commandVmstat command is a common system monitoring tool for Linux/unix, which can easily view CPU, memory, swap partition, IO reading and writing.Vmstat commonly used parameters are two: 1. Time interval of acquisition 2.
http://blog.csdn.net/blueice8601/article/details/76664271. Linux Driver classification2. Signal volume and Spin lock3, platform bus equipment and bus equipment how to write4. The difference between Kmalloc and Vmalloc5, the level of module_init6.
Linux Security ReviewFirst, the basic Linux command1. File Management commandsLvm2. User Management commands3. Network Management Command4. Rights ManagementGeneral Permissions and Special permissionsPermission Command modification5. Service Command6
Test the hardware information of the machine: View CPU information (model) # Cat/proc/cpuinfo | grep name | Cut-f2-d: | uniq-c 8 intel (R) Xeon (r) CPU e5410 @ 2.3 3ghz (see there are 8 logical CPUs, also know the CPU model)
Yesterday, a written test on the Linux system started the process, did not answer, and now sorted out (in fact, not complicated).After pressing the power button until the Welcome page comes out, the total amount of Linux you can do is divided into
Exit to Windows, in the Virtual Machine menu bar, click Virtual Machines, install the VMWARE TOOLS submenuGo to Linux system, select System Tools-terminal command su root or su to enter as rootHanging on the optical drive Mount/dev/cdrom/mnt/cdromIf
Date1. Query the system time2.-d followed by characters, query for specific conditions of time, such as 3 days ago, 2 days later, 5 minutes later, 6 seconds before etc.Date-d ' 2 day ago ' two days agoDate-d ' 3 year ' three years laterDate-d ' 1
Linux commands refer to seq and linux Command seq.Seq generates an integer sequence. Usage: 1. If seq 5 is followed by only one numeric parameter, the number indicates the number of termination. The start number is 1 by default. The step size is 1.2,
Linux Command date, linuxdate
Date
1. query system time
2.-d is followed by characters to query the time of a specific condition, such as 3 days ago, 2 days later, 5 minutes later, 6 seconds ago, etc.
Date-d '2 day ago 'two days ago
Date-d '3 year'
Linux User Management (1) ---- create users (adduser and useradd) and delete users (userdel), adduseruseradd
I. Common commands:
(1) create two user commands:
Adduser
Useradd
(2) User deletion command:
Userdel
Ii. Differences between two
Linux User Management (2) ---- modify user mode (usermod, sudo permission, etc.), usermodsudo
You can use the usermod command to modify the user mode.
I. Introduction to common usermod commands:
-A: It is only used with-G to add users to the
Linux Command summary a. *, linux summary.
Home: http://blog.csdn.net/minna_d
First, paste the. * command, which contains a total of 184 commands.
After all, there are too many commands that I can't write in one or two days. This is a constant
Detailed steps for creating and Deleting Users in linuxIn linux, user operations are relatively easy to understand. The basic operations are as follows: 1. Only root users can create new users.
# Useradd user1A user home directory with the same
Use the performance analysis tool nmon in linux and the performance tool nmon in linux1. Introduction The nmon tool can help display all important performance optimization information on a single screen and dynamically update it. This efficient tool
Linux notes (1)One sentence is recommended: anyone who can be patient can become coder of the world, including you.Summary: ubuntu uses the apt-get management package and redhat uses yum.Linux is divided into four parts: Linux kernel, GNU user
Linux Command summary .*
Home: http://blog.csdn.net/minna_d
First, paste the. * command, which contains a total of 184 commands.
After all, there are too many commands that I can't write in one or two days. This is a constant process. The topic of
Detailed description of SSH key logon under CentOS6.5I. Necessity of key Logon
Generally, SSH key logon is safer than Account Password Logon. Sometimes, the company needs to configure Server logon for new colleagues. Generally, SSH key logon is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service