Shell application tips:
TIPS:
1. Command completion function: key
2. Clear screen: Ctrl + l
Similar to: clear [DOS: cls]
3. Delete all content before the cursor: Ctrl + u
4. Command history: history
Now ,! The command number listed by history to
Introduction: Linux NAT cannot take effect in a timely manner because it is based on ip_conntrack. If the packet of this stream is bound to an ip_conntrack before the NAT iptables rule is added, the NAT rule will not take effect until the
The ipvs database is installed on the Linux server and cannot be accessed using the client tool. Later, I checked the problem with the Linux firewall. After it is disabled, the client can be connected normally, it is very insecure to disable the
In a linux system (CentOS 6.4 and Ubuntu 12.04 have been confirmed), you can run the dmicode command to view the detailed information of the hardware device.
The command format is dmidecode-t typecode.
The typecode is the code of the device type.
Automatic mounting of Linux disks is required and necessary. Otherwise, it will be too troublesome to mount the disks after each restart.1. view the disk information in the system and determine whether partitions are required.First, add a new disk
When I first arrived, it was also the first time I wrote a technology-related blog. I 'd like to share a few articles about Linux in my favorites. I hope I can help anyone who needs it.
1. Advanced Bash Script Programming Guide: This website
I. Basic Format of the until statement
The statement block is executed as long as the conditional test statement is not successfully completed. (If a condition test statement is successfully exited at the beginning, no statement block is executed
You can use the x option of the set command to display all command execution and variable value change processes.
Usage: First UseSet-x to enable debugging, And finally use the commandSet + x disable debugging mode.
A simple example shows how to
Operating system detection
Xprobe2
Format:
./Xprobe2 Domain Name
./xprobe2 –v –r IP
Port service software testing
Amap
Application Mapping mode:
Amap-A domain name port
Banner mode:
Amap-B domain name port
Building more and more website projects on linux servers to prevent website projects from being hacked is the basic work of web O & M personnel. There are countless articles on website O & M skills on the Internet, with different methods,
The details are as follows:
All operating systems provide entry points for multiple services, and the program requests services from the kernel. UNIX implementations of various versions provide clear definitions, a limited number of entry points
I. general process of I/O flow operation:
(1) define a FILE * type pointer variable for each FILE to be opened. This pointer variable points to the FILE structure used by the I/O Stream.
(2) Use the fopen function to open the I/O Stream. To open an
I. Procedures
A program (program) is an executable file stored on a disk and in a directory. Use one of the Six exec functions to read the program into the memory and execute the program.2. Process and process ID
The execution instance of a program
In text processing, it is very useful to count the number of lines, words, and characters of a file. For developers themselves, counting the lines of code (LOC) is an important task. What commands in linux can help us make statistics? That's
Occasionally, we can see that BeyondCompare has a Linux version of the file comparison tool on this excellent Windows platform, so we started our journey on CentOS with the idea that we must run it on Linux.
To put it simply, I use CentOS 64 bits
I. Introduction
In UNIX systems, most file I/O only requires five functions: open, read, write, lseek, and close. These functions are often called unbuffered I/O without buffering ). The term "no buffer" means that each read or write operation
You can also use the creat function to create a new file.
# Include creat (* pathname, mode_t mode );
Return Value: if the operation is successful, the system returns a write-only file descriptor. If an error occurs, the system returns-1.
Note
In linux, the user name and password added during system installation are used by default to log on, so the login account permission is used for operations.
To obtain the permissions of the root user of the system for operations, use the "sudo +
Awk was born in 1977 and has three founders: Alfred Aho, Peter Weinberger, and Brian Kernighan. The names originate from the initials of the three founders.
Purpose:Process text files.
Awk features the ability to operate rows and columns.Man awkYou
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service