Linux has been widely used in desktop applications in the past two years, and many people have become active and want to switch to linux. A few days ago, I wrote, "why don't we choose linux ?" . It has aroused the response of many netizens, which
For Linux systems, whether it is a central processor, memory, disk drive, keyboard, mouse, or user, it is a file. Linux system management commands are the core of its normal operation. After familiarizing yourself with common Linux File Processing
1. tremulous: open-source FPS games under linux
This game uses the quake3 engine, so the screen is quite good, it is very simple to install in ubuntu
Sudo apt-get install tremulous
That's all. This game only has a multiplayer version. after
Linux supports multiple file systems, including ext2, ext3, vfat, ntfs, iso9660, jffs, romfs, and nfs. to centrally manage various file systems, linux introduces Virtual File System (VFS), which provides a unified operation interface and Application
You can use the uniq command to delete adjacent duplicate rows:
Uniq [file]
However, if a text contains duplicate but not adjacent lines, it cannot be deleted. You need to combine the sort command:
Sort [file] | uniq
The equivalent sort
The following methods are used to remotely forward linux desktops to the local XDMCP protocol) to achieve local graphical management.
1. Xmanager can be used to enable XDMCP in linux to directly modify the configuration file. You can also run
When using Nmap, we found that Nmap prompts Happy 10th Birthday to Nmap, and may it live to be 110! (It is now 10 years old, maybe it can live to 110 years old) I did not expect that September 1 was the day of its birth, 10 years a sword ah.
In
Use the following command to configure the Ethernet
1. ifconfig
You can use the ifconfig command to configure and view the network interface configuration.
For example:
1) configure the IP address of eth0 and activate the device.
# Ifconfig eth0 192
The Linux kernel supports the DOS/FAT/NTFS partition format. The kernel compilation option is slightly configured. After compilation, the fat Chinese partition can be supported.
Start the kernel compilation configuration program # cd/usr/src/linux
#
General backup should be the highest priority of responsible system managers. Although Linux is a highly reliable operating system, system failure may still occur. It may be caused by hardware failure, power interruption, or other unexpected
1. files required for system startup
/boot/grub/grub.conf /etc/inittab /etc/rc.d/rc.sysinit
/etc/rc.d/rc /etc/rc.d/rc?.d
/etc/rc.d/rc.local
/etc/fstab
How to save grub. conf file errors:
Grub>
I. Linux File System StructureThe file system structure is the method of organizing files stored on disks and other storage devices. It is mainly reflected in the organization of files and directories.Directory provides a convenient and effective
InLinuxIn the system, there are three mainSystem Logs:
Connection time log-the log is executed by multiple programs and written to/var/log/wtmp and/var/run/utmp, login and other programs to update the wtmp and utmp files, enables the system
I usePostfixAfter a long time, I have seen many knowledge points about Postfix and want to share them with others. Let's talk about the address Operation Problems in Postfix.
1. Rewrite the address to the standard format
Before the cleanup process
SendmailHow do users limit the permissions to process mail queues and prevent unauthorized changes to files.
1. Restrict the permission to process the mail queue to "root"
Generally, anyone can use the "-q" switch to process the mail queue. to limit
In fact, the configuration of Small and Medium-sized EnterprisesSendmailThe steps are actually very simple. Please refer to the following.
Assume that the enterprise uses a leased line to access the Internet and has two Linux servers (Redhat 6.1)A
In recent years, it has become increasingly popular to use the same host to build multiple domains. For example, oreillynet.com and onlamp.com are actually located on the same host, but from the external point of view, they seem to be located on two
KonquerorIs an embedded browser that runs mainly on Linux and BSD operating systems. This article describes how to run konqueror as follows.
After andlinux is upgraded to beta2, the program in the menu is missing a lot of operations because it is
InIptablesAfter a long configuration, I have several Iptables Application Instances for your reference!
I. single rule instance
Iptables-F?
#-F indicates clearing. It is used to clear all the chain rules of the filtre table.
Iptables-a input-s 172.20
How to UseIptablesImplementationNATIn fact, it is very simple. It only takes six major steps.
This article describes how to use iptbales to implement the powerful NAT Function under linux2.4. For more information about the syntax of iptables, see
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service