First, read file meta data
int stat (const char *path, struct stat *buf);
int fstat (int fd, struct stat *buf);
int Lstat (const char *path, struct stat *buf);
Stat () Stats The file pointed to by path and fills in BUF.
Lstat () is identical to
In the Linux operating system, many activities are related to time, such as process scheduling and network processing, and so on. Therefore, understanding the clock processing mechanism in the Linux operating system helps to better understand how
Yesterday, Chiang helped a friend of the website relocation server, because the entire site's data has more than 10GB size, the friend is also ready to upload files via FTP file, according to the fact that with Aliyun bandwidth 1M calculation, it is
Soft links under Linux are similar to shortcuts under Windows
Ln-s A B is the source file, B is the link file name, its function is when entering the B directory, actually is the link into a directory
As the above example, when we execute the
With the expansion of Linux enterprise applications, there are a large number of network servers using the Linux operating system. Linux server security can be more and more attention, here according to the depth of the attack on the Linux server in
Steps to build a Linux web site
1, install Linux, if you need to use a dual network card, preferably before the installation of two network card plug
1) Install Linux
2 after installation, after entering the X_window configure the second network
This is the first of a series of articles on how to develop Web programs for Linux using a variety of available interfaces. Like most unix-based operating systems, Linux supports the use of TCP/IP as a local network transport protocol. In this
Objective:
This paper mainly introduces the use of Squid and Squidguard configuration Proxy server in Linux, with the WWW Proxy service as an example to explain how to filter harmful sites and restrict users ' access to the Internet.
I.
To establish a secure Linux server, you first need to understand the meaning of the configuration files that are related to the network service and how to configure them securely in the Linux environment. In a Linux system, TCP/IP networks are
The basic concept of signal
Each signal has a number and a macro definition name that can be signal.h found in.
Use the kill -l command to view the list of signals defined in the system: 1-31 is a normal signal; 34-64 is a live signal.
All
When files on one server are updated, other servers also need to be updated, and when they are updated
It should be updated only on new or modified files, otherwise it will cause network bandwidth and waste of time. Rsync is able to have
Excellent
Wget in a Linux system is a tool for downloading files, which is used at the command line. For Linux users is an essential tool, we often have to download some software or restore from the remote server back to the local server. Wget supports the
There are 2 main types of surveillance this time:
1.web Server
2.mysql Server
So first of all to ensure that Nginx/apache or MySQL service startup;
The following is the function Installmysql () script for the MySQL Monitor-side deployment:
1. Mail system role
MUA (mail user agent), MTA (message transfer agent), MDA (Message Distribution Agent), MAA (mail access Agent)
MUA: (Mail user agent): A user interface to an e-mail system, in most cases, a program that runs on a mail client.
Cron is a daemon that can be used to schedule execution of repetitive tasks based on a combination of time, date, month, and week.Cron assumes that the system is running continuously. If the system is not running when a task is scheduled, the task
first, the Linux file structureA file structure is a method of organizing files on storage devices such as disks. Mainly embodied in the organization of files and directories.The directory provides a convenient and effective way to manage
First, a brief introduction of the monitoring system(1) Cacti: The storage data ability is strong, the alarm performance is poor(2) Nagios: Poor alarm performance, storage data only a simple paragraph can determine whether the length of the data
Fedora 25 Workstation Installation GuideIn this tutorial, we will go through every step of installing Fedora 25 workstation on a computer. This Guide includes every step of the installation process. Therefore, follow these steps carefully.New
Linux basic commands-text editing vimGuideThis article describes the general usage of vim (version 7.4,Vim is a powerful text editor and enhanced version of vi.The most common commands for editing a file using vim are:
Vim file is a new file or an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.