Linux under oracle11g DG Build (iv): Subsequent validation operationsEnvironment
Name
Main Library
Standby Library
Host Name
Bjsrv
Shsrv
Software version
RedHat Enterprise5.5,
Permission object:Owner: UGenus Group: GOther people: OEveryone: ALinux Basic permissionsREAD: The read identity is: R octal ID: 4Write: The Write ID is: w octal ID: 2Execution: Execution is identified as: x Octal ID: 1Special permissionsSetuid:
: Wineqq2013sp6-20140102-longeneThe following steps must be in order, I use the system isInstall QQSudo-iCd/etc/apt/sources.list.decho "Deb http://archive.ubuntu.com/ubuntu/raring main restricted universe multiverse" >ia32-libs-raring.listApt-get
(1) View the usage of each CPU coresudo top-d 1After entering, press 1, the following CPU usage will appear, where the US column reflects the use of each CPU core, a percentage of the core is a high-stress task.(2) See which process is running on
The system module for vehicle trading is being done. The boss wants to see it so that people in the city can make comments. It then adds a tomcat to the server again.Previously is configured, the configuration process is actually very simple, this
Department of the very old fedora14, installed some software and download things when compared to egg pain, happen to ubuntu14.04 release, so install try, by the way record the usual configuration, memo.1. Make the image, compare the old motherboard,
1. In general, dependencies can make the software smaller and all dependent software will benefit from a Lib bug fix.
dependency, for maintenance is also pros and cons, first, if a dependent software bug or vulnerability, this time only
The initialization of a Linux system can be divided into two parts: kernel initialization and system initialization. The operating system is a bridge between the user and the computer hardware. The operating system manages all the hardware resources
Linux network-related query script 2014-03-17posted by Yeho1. View TCP connection StatusNetstat-Nat|Awk' {print $6} '|Sort|Uniq-C|Sort-Rnnetstat-N|Awk'/^tcp/{++s[$NF]}; END {for (a in S) print A, s[a]} ' OrNetstat-N|Awk'/^tcp/{++state[$NF]}; END
Premise: This is an experiment done by Ubuntu Server in the SERCURECRT remote virtual machine.First we need to know the composition of the word lamp: linux,apache,mysql,php. This article is to show you how to complete apache,mysql,php installation
Performance Analysis and Optimization Based on Linux servers (1)
As a Linux system administrator, the most important task is to optimize system configuration so that applications can run in the optimal state on the system. However, hardware,
The simplest way to install a system is to find a system installation disc and install it step by step. It is simple, but most people seem to have Linux installation CDs. Therefore, you can only use a USB flash disk to simulate the function of the
Nginx is a common server developed by Russians. Its biggest feature is load balancing and smooth startup. This blog explains how to install Nginx.
Step 1: download and install pcre. Find and download the latest pcreinstallation package from the ftp:
1. GNUGNU is the abbreviation of "GNU's Not Unix". Stallman announced that GNU should be pronounced as Guh-NOO to avoid confusion with the word "new" (note: in English, Gnu stands for the African Impala. Its pronunciation is the same as that of
(1) view the usage of each CPU Core
Sudo top-d 1
After entering, press 1, the following CPU usage will appear, the us column reflects the usage of each CPU core, the percentage is large, it indicates that the core is running a tight task.
(2)
The IP address is divided into IPv4 (32-bit) and IPv6 (128-bit ). IPv6 is proposed to cope with the problem of insufficient IP addresses in the future, but IPv4 is still the mainstream.
An IP address is divided into four segments, each of which has
Tang Zhiming said Sun, New Day, New day, new day
Kang Yi and Zuo Xinmin
Shiyue Zhou, although the old state has its life Restoration
This is why a gentleman has no need of him.
-- Liji · Emy
In the previous article "anti-DDoS (II): CC attack
It has three modes:
I. general mode
2. editing mode
Three Command Line Mode
This section describes several common features ~~
Exit: q write: w
Force :!
(The above can be superimposed)
Show row number: set nu cancel: set nonu
Jump to n rows:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service