First, the company has a printer with the HP LaserJet m1120 mfp model, which is inconvenient to use because it is not a network printer, the boss of the company asked to connect the printer to the company's intranet linux Server (CentOS) and then
In windows, The Decompilation will not be mentioned. Baidu is a bit more versatile. Next we will talk about the decompilation of Apk in Linux.Decompilation can be divided into two types: obtaining the application resource file and obtaining the
1. Describe the cut command in one or two sentences!As its name suggests, cut is used to cut data. Specifically, cut data is used in files.Cut is a processing object for each row. This mechanism is the same as sed. (The Introduction to sed will be
1. Introduction to loop DevicesIn UNIX-like systems, a loop device is a pseudo-device, or a simulation device. It allows us to access a file like a block device.Before use, a loop device must be connected to a file. This combination provides you
Many software applications need to bind MAC addresses (for example, OpenCountry). Sometimes we need to modify the MAC address of the NIC for special purposes.1. Method 1:Use the command to temporarily modify:Ifconfig eth0 down
Ifconfig eth0 hw
Use the yum program to install the required development kit (The following is the standard rpm package name)
# Yum install gcc-c ++ gcc-g77 flex bison autoconf automake bzip2-devel zlib-devel ncurses-devel libjpeg-devel libpng-devel libtiff-devel
Quickly modify the host name in SSH1. view the current host name
Hostname # directly execute this command to view the current host name
2. Change the host name to www.centoscn.com.
Hostname www.centoscn.com
You can modify the yellow part
Count the number of files in a folderLs-l | grep "^-" | wc-lCount the number of directories in a folderLs-l | grep "^ d" | wc-lCount the number of files in the folder, includingLs-lR | grep "^-" | wc-LFor example, to count all js files under
Anyone who has played Linux should know that if you want to run a program in the background, you only need to add an & symbol at the end of the command. However, this method is not very safe. Some programs will stop when you log out of the terminal.
PS: I have been using Nginx for two or three years. Now I often encounter some basic questions from new users. I have no time to answer them one by one. It took me some time this afternoon, based on your experience, I will share the main
Anyone who has installed linux knows that it is easy to install linux on only one machine. We only need to put the optical drive in, and install it step by step! But when we install multiple machines in one data center at the same time, it is
Usage: cat [Option] [file]...Output A [file] or a combination of standard input to standard output.-A, -- show-all is equivalent to-vET.-B, -- number-nonblank: number of non-empty output rows-E is equivalent to-vE.-E, -- show-ends is displayed at
Function Description: lists information about users who failed to log on to the system.
Syntax: lastb [-adRx] [-f ] [-n ] [account name...] [terminal number...]
Note: Execute the lastb command separately. It will read the file named btmp in
Swap cleanup:
swapoff -a && swapon -a
Note: This cleanup requires that the idle memory must be larger than the used swap space.
Cache cleanup:
sync; sync; sync;&& echo3 >/proc/sys/vm/drop_caches
sleep 2
echo
Settings:
You can manually modify the network address or add a new network interface to the new interface by modifying the corresponding file (ifcfg-ethN) or creating a new file.
DEVICE = name indicates the name of the physical DEVICE.
IPADDR = addr
Convert the rm command in linux to move the file to the recycle bin.
Rm is the command to delete files in Linux. It is a very powerful but dangerous command in Linux. In particular, rm-rf is sometimes so powerful that you can cry, when you want to
Today, let's review how to configure multiple IP addresses for a single Nic in linux. One is to use commands for direct configuration, and the other is to write the configuration file by yourself, now let's talk about it one by one.1. Use commands
Shc is a tool for encrypting shell scripts. it converts shell scripts into executable binary files and performs automatic maintenance on the system using shell scripts, which is simple, convenient, and portable.However, shell scripts can be read and
Chapter 1 How to know where to install software in linux
Note: The default installation directory of general software is in/usr/local or/opt. You can find it there.
Command name: whereis
Function Description: search for qualified files in a specific
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service