Compared with nload, Iptraf is an excellent free small software that monitors network traffic of specific ports in linux.System Environment: centos6.3Iptraf: iptraf-3.0.0 2. view the dependency package: # rpm-qa | grep gcc # rpm-qa | grep glibc #
I am a Linux cainiao. I recently used ftp operations in my project, but I am helpless. I have nothing to worry about. I need to start from scratch and search for various Baidu and materials. Finally, the service was set up and accessed
Set system environment variables
[Plain] view plaincopyprint?
Vi/etc/profile
Add at the end (press the I key to enter the editing status, drag the cursor down, add the following, and then press: wq to save and exit, where: q! Is it forced to
Linux file management.
1. File naming rules
As we all know, files must have file names. in linux, there are several naming rules to regulate File naming,
1). All characters except/are valid.
2). It is recommended that you do not use some text,
1 I/O the amount of pre-read requests (the kernel system first responds to read requests by default, the amount of the first response is adjustable ):Check blockdev -- getra/dev/sda. The default value is 256. This is one-way or
Installing software in Linux environment is not an easy task. If the software is installed after source code compilation, of course it is more complicated. Currently, various software installation tutorials are common; however, if you have a solid
Yum is a background program used to manage rpm packages. It is written in python and can easily solve rpm dependencies. After the yum server is created, the yum client can obtain the software package through http and ftp, and directly manage and
In Centos, locale is used to set different language Environments for running programs. locale is supported by ansi c. Locale naming rules are _. , such as zh_CN.UTF-8, zh stands for Chinese, CN stands for mainland China, and UTF-8 stands for
Mysql supports logical backup and physical backup Based on Backup recovery methods.
Logical backup is a backup SQL statement. The backup SQL statement is executed during restoration to reproduce the database data.
Physical backup is used to back up
About ulimit
Ulimit-a is used to display various current user process restrictions.Linux limits the maximum number of processes for each user. To improve performance, you can set the maximum number of processes for each linux user based on the
Etc/fstab is a text file in which each file system (including partitions or devices) is described in one row. In each row, fields are separated by spaces or tabs. Lines starting with "*" in the file are comments. Sorting records in fstab files is
This article introduces the syntax and details of the Linux shutdown command-halt. Shutdown is inevitable in Linux. There are two common commands for shutdown: halt and shutdown. Shutdown is more powerful than halt and is recommended.Shutdown.
This article introduces the shutdown syntax and details of the Linux shutdown (restart) command. Shutdown is the safest command to shut down and restart. We recommend that you use the shutdown command to shut down and restart your system.
Shutdown
[
Gnu grub introduction ("GRUB" for short) is a multi-operating system startup program from the GNU project. GRUB is the implementation of multi-boot specifications. It allows you to have multiple operating systems in your computer and select the
Set centOS not to enable graphical interface
Our linux server runs in the data center for a long time. Generally, the graphic interface is not required, and the graphic interface occupies the memory.
Therefore, we can use simple settings to enable
Recently, I am studying Linux. Below are some notes.
When using a computer, you often need to find files.
In Linux, there are many ways to do this. The foreign website LinuxHaxor summarizes Five Commands. You can check several of them. Most
When files are frequently accessed in Linux, the physical memory may be exhausted. When the program ends, the memory will not be released, but will always be used as a cache.Linux cache includes dentry, buffer cache, and page cache. Dentry is used
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service