For example, two NICs are configured under CentOS, one for daily Internet access, and the other for connecting to the Development Board, which is configured in different network segments. Originally, NetworkManger is used under CentOS, DHCP is used
When I installed CentOS for Lenovo's G480 notebook, I found that the AR8162 Nic had no driver. I found the information on the Internet because I encountered some other problems, therefore, only a few posts are combined to solve the problem. Download
Lynis is an audit tool for Linux and Unix provided by the system administrator. Lynis scans system configurations and creates professional audits that outline system information and security issues. After the user starts the software, Lynis will
Introduction:
Sudo can temporarily grant some root permissions to a common user for security and permission allocation.
Open the configuration file:
# MongodoOR# Vi/etc/sudoers
Syntax:UserName Ip = (Who) [NOPASSWD:] Command
Example: root ALL = (ALL)
LVM:Image outline:
1) What is LVM and its role:LVM is called logical volume management, which improves the management and usage flexibility of disk partitions.The logical volume LVM can effectively manage and allocate disk space. It can combine
1.
Ubuntu downloads the twistedcompressed package, twisted-3.2.0.tar.bz2,
Cd to the download directory, decompress with tar-jvxf Twisted-13.2.0.tar.bz2, decompress the package to enter the directory Twisted 13.2.0, and then install with python
1. find overview;As a Linux O & M personnel, the find command is also a long-used command. I personally think it is also the most useful and confusing one. Because its syntax is different from the standard syntax of other commands, it also supports
Recently, Google Keep has become my favorite note application in Android. In my work on Ubuntu, I also want to take some quick notes. Since Google Keep can be synchronized between devices, it is also useful to install Google Keep on Ubuntu. In this
For system administrators or programmers, grep is probably the most popular tool when they need to search for specific text or patterns in a directory with complex configurations or in a large source code tree.
If grep is one of your favorite tools,
Incorrect direction keys for Vi in Ubuntu
(1) Problem description:
Vi cannot use direction keys normally
(2) Solution:
Problem Analysis: ubuntu is pre-installed with the vim tiny version, but requires the vim full version. Run the following
1. View character setsThe character set is embodied in the system as an environmental variable. Taking centos as an example, you can view the character set used by the current terminal in the following ways:
1. [root @ david ~] # Echo $ LANGZh_CN.GB1
Vi is a powerful text editor that is included in most Linux systems, and even has vi in embedded Linux. Sometimes you have to edit the text on a system without a more friendly text editor, so it is necessary to know more about vi.Unlike Nano (an
I believe you have met the NIC configuration of the CentOS system. Most of the time there is only one Nic mode, but sometimes we need two NICs, for example, when configuring a database cluster, how can we configure a floating IP address? With this
Environment:System-CentOS 6.5;Tftp and ftp service addresses: 192.168.0.11;Principles:1. Use the pxe protocol to send a request to the dhcp server in the network to obtain the IP address and the tftp address.2. Obtain the Boot Loader from the tftp
Error message:Root @ localhost: ipvsadm-1.25] # yum install gccLoading "security" pluginLoading "rhnplugin" pluginThis system is not registered with RHN.RHN support will be disabled.Setting up Install ProcessParsing package install argumentsNo
Because some JSON data formats are to be processed recently, after some searches, we finally found jq, a great tool. Jq allows you to operate JSON directly on the command line, including sharding, filtering, conversion, and so on.
Let's use several
1 Main Features of Linux memory management
--------------------------------------------------------------------------------Regardless of the physical memory size, Linux fully utilizes it to read the hard disk data called by some programs into the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service