Linux file backup

1.tar-p whether to keep the root directory-T view the contents of the compressed file-n 201401010 backup date aftertar -zcpf/tar/data2. tar. GZ/ETC/*conf[[email protected]/]# CD Tar/[[email protected] tar]# ll total 80-rw-r--r--1 root ro OT 39051 09-

NIC Bindings under Linux

The function of NIC binding: 1, redundancy, prevent single point of failure2. Prevent transmission bottlenecks1. Switch Port bindings:1 system-view2 link-aggregation Group 1 mode manual34 For example, to bind ports 1 and 2 56 interface ethernet1/0/1

Linux Network (i)

[Email protected] ~]#ifconfigeth0 Link encap:ethernet HWaddrxx: 0C: in: +: F6: Ainet Addr:172.17.4.128Bcast:172.17.4.255Mask:255.255.255.0Inet6 addr:fe80::20c:29ff:fe78:f612/ -scope:link up broadcast RUNNING multicast MTU: theMetric:1RX

Linux process creation

1, the process is the execution of the program, will be loaded into memory, each process includes the code and data of the program, including the data of the program variables, external data, program stack.2, Linux, the input command, such as VI

Linux--IP (RPM)

IP is a command, there are many functions of IP command! Basically it integrates the two commands, ifconfig and route, but the IP is more powerful! If you are interested, please vi/sbin/ifup on your own to know that the entire ifup is the use of IP

Workaround for Linux system to initiate automatic activation of network card

Linux every time you start the network card needs to be activated in order to surf the internet, it is very troublesome.Search the Internet for information, and finally the solution:# vi/etc/sysconfig/network-scripts/ifcfg-eth0:1 View the eth0:1

Settings for Linux time

For example, the following code can be used for reference:static void _sleep_response_timeout (modbus_t *ctx) {#ifdef _WIN32/ * Usleep doesn ' t exist on Windows */ sleep ( Ctx->response_timeout.tv_sec * +

SYSFS file system and Linux device model

Since Linux's kernel space and user space are strictly separate, SYSFS can be seen as a bridge between user space and kernel space,SYSFS the devices and buses connected to the system into a hierarchical file that can be accessed by user space, and

First knowledge of the Linux kernel

First knowledge of the Linux kernelLinux was born in 1991 in the year of Linustorvalds. POSIX represents a Portable operating system interface (portable Operating system Interface). POSIX is a product that appears in the Uni standardization process.

The Linux series blog begins

Since the decision to do development, has not configured a Linux system for a long time. Don't try to write a blog, you may really have to return to the teacher. In the spirit of review, while the principle of recording, some Linux configuration and

The difference and connection between profile, BASHRC, Bash_profile in Linux

Original address: http://blog.csdn.net/chenchong08/article/details/7833242/etc/profile: This file sets the environment information for each user of the system, and the file is executed the first time the user logs on. and collects the shell settings

Linux-Last (manual)

LAST,LASTB (1) Linux System Administrator ' s Manual LAST,LASTB (1)NAMELast, lastb-show listing of the last logged in usersSynopsisLast [-R] [-num] [-N num] [-adfiowx] [-f file] [-t YYYYMMDDHHMMSS] [name ...] [TTY ...]LASTB [-R] [-num] [-N num] [-f

Linux User Management

Linux system has three kinds of users: general users, system users, super usersThe Superuser's userid is 0, the system user's ID range is 1-499, the general user's ID range is 500,You can use the ID command to view the current UserIDUser Information

Linux to see if a port is occupied

One can be counted:[[email protected] ~]# netstat-nlptu |awk ' {print $4,$7} ' | grep 80::: 2508/httpdThis makes it more intuitive to display the ports to be queried and the programs that use this port.The feeling is not very profitable accurate:(

Mutual exclusion Lock, condition variable, semaphore of multi-threaded programming under Linux

1. Process creationint Pthread_create (pthread_t * thread_id, __const pthread_attr_t * __attr, void * (*__start_routine) (void *), void *__res Trict __arg);The first argument is a pointer to the thread identifier, the second parameter sets the

Five query commands in Linux and five commands in Linux

Five query commands in Linux and five commands in Linux 1. find Use the find path command action For example, find.-name a.txt is a file named a.txt in the current directory. You can also add the time parameter: -Atime access time -Ctime: the time

Mud: KVM, kickstart and NFS integration, kvmkickstart

Mud: KVM, kickstart and NFS integration, kvmkickstart This article was sponsored by Xiuyi linfeng and first launched in the dark world. In fact, this article may not have been written. However, to learn how to use NFS, write it as a note. For how

Batch set folder 755, webpage file 644 Permissions

Batch set folder 755, webpage file 644 Permissions Although we are more free to set up a website on VPS, we need to do the security settings of the space ourselves. Once the website space or webpage is insecure, other websites may be affected by

Introduction to LINUX Remote Online Software: PUTTY, SecureCRT, and X-Manager

Introduction to LINUX Remote Online Software: PUTTY, SecureCRT, and X-Manager **************************************** ******************************** **************** Original works, from "Deep Blue blog" blog, welcome to reprint, reprint please

[Linux] history: display the command execution time

[Linux] history: display the command execution time Display the time of a historical command line The environment here is centos5.8 Vim ~ /. Bashrc or ~ /. Bash_profile add export HISTTIMEFORMAT = "% F % T" Execute one session first Export

Total Pages: 5467 1 .... 4357 4358 4359 4360 4361 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.