From: http://blog.chinaunix.net/uid-20546441-id-1746200.html I'm adding "prerequisites" to some of the issues that are encountered with virtual machine compilation Linux Android source full virtual machine disk space around 100G (60G used to store
First, the composition of the package1. Binaries (binary, executable): Mysql,mysqld,mysqladmin2, configuration files, the composition method:A) cut the master profile into multiple small files and place them in a directory, such as:/etc/profile,/etc/
The functionality of Samba is simple enough to make sharing between Linux and Windows possible. and using Samba to build a file server is not only more powerful than windows, but also fast and safe to access. Samba server has so many advantages, it
Experimental environmentRHEL5.9 DHCP serverRHEL5.9 Linux ClientWin7 Windows clientExperimental Prerequisites:1, the server and client need to be in the same network segment2,DHCP requires a fixed IPExperimental steps:Service-side Operation steps:1,
Last time said "agreement" related topics, this time specifically to talk about the "tcp/ip" agreement.The theme here is what is "tcp/ip"? But not to explain what "tcp/ip" is, the point is what "tcp/ip" really mean, where to use "tcp/ip". This is
Dynamic library *.so in Linux under the C and C + + programming often encounter, recently found a few articles on the Web site to introduce the compilation of dynamic library and links, finally understand this has not been familiar with the east,
The basic concept of DHCP is DHCP, the Dynamic Host Setup Communication Protocol (PROTOCOL), which is defined by the Internet standard in RFC2131 and 2132 to dynamically set the client IP status.Port number for DHCPUDP Server service sideUDP Client
There are four concepts of synchronous (Sync)/asynchronous (async), blocking (block)/non-blocking (Unblock) frequently encountered in network programs.The difference between synchronous and asynchronous is whether the call result is communicated to
Generally we read the file on Linux, is the VI tool, if the shell script is written, the general type through the cat and then use the pipeline to achieve the flow of processing.However, if the file is too large, simple cat may use too much memory,
1. Nginx as the reverse proxy of the excellent, with irreplaceable role:
HTTP layer exchange, can be used to divert users, such as according to the user's ID is even or odd to divert
Load Balancing
For cache server
URL
Linux has many screenshot tools of different tastes, including screenshot programs dedicated to the desktop environment, such as KSnapshot in KDE, GNOME-screenshot in gnome, and Xfce Screenshooter ), or a common screenshot program such as Shutter ).
In linux, you sometimes need to obtain the attacker's IP address. Here there are two methods: first use who am I to obtain the logon IP address, and then intercept the string:
1. awk truncation and sed replacement
Who am I | awk '{print $5}' | sed'
Linux is a multi-user and multi-task time-sharing operating system. On the one hand, the user's account can help the system administrator track users who use the system and control their access to system resources; on the other hand, it can also
After Centos is installed on the Virtual Machine and the password is forgotten when the machine is started today, Baidu began to search for the resetting method. After experiment operations, the method is indeed valid. The record is as follows:
(1)
In the past, these ISO image files were often used in Windows. We can use a virtual optical drive to load them. But there are no tools in LINUX. What should we do in Linux?
First, we need to load the iso to a directory, which is used.
Mount-o loop
First, read the following concepts:IDE hard drive starts with hd (now basically disappears, except for some older machines), and SCSI hard drive starts with sd (now popular sata ). Floppy Disk starts with fd (can be said to disappear directly ). The
Step 5: Use the local machine or ssh to connect to the centos system, run the "/sbin/iptables-I INPUT-p tcp -- dport 1st-j ACCEPT" command, and confirm the method.Note: If you want to open any port, write the port directly in the command. Generally,
1. Prepare for shutdown
1.1 observe the system Usage Status
· Who is online: who
· Networking status: netstat-
· Background programs: ps-aux
1.2 notify online users of Shutdown Time
· Shutdown + 2 "The machine will shutdown" # shut down after 2
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service