In general, after solaris 11 is installed, the system prohibits the root user from logging on directly for security reasons. If you want ssh to log on directly from the root user, you need to modify the configuration file: # vi/etc/user_attr and
Firmware (CMOS/BIOS) post power-on self-check-à bootstrap loader (GRUB) (Load Kernel) à load Kernel (driver hardware) à START process init à read execution configuration file/etc/inittab
Stage 1: BIOS startup
1. After pressing the power supply,
Preparation in advance:
1. Add hard disks (IDE and SCSI) to virtual machines)
2. fdisk partitioning
# Fdisk-l
Objective: To view the name of the newly added Hard Disk/dev/sdb
# Fdisk/dev/sdb
Commond: m
Commond: n
E:
P: p -------- hard disk
Red hat System File Installation Software in rpm format Debian series File Installation Software in deb format
The ubuntu installation software is installed in deb format, and the File Installation Software in rpm format is:
First,
Service iptables start does not respond;
[Root @ lt ~] # Service iptables status
Firewall stopped
[Root @ lt ~] # Service iptables start
[Root @ lt ~] # Service iptables status
Firewall stopped
For example, the configuration file is not
The on-board fake raid of HP ProLiant ML110 G7 does not support raid5, And even if raid10 is enabled, ubuntu server10.04LTS of CD is not driven and cannot be identified. So I simply shut it down and set soft raid when installing ubuntu. I used three
In fedora linux, enter root and password, and then identify the fault. This is because the root Super User is disabled by default in fedora linux. Make the following changes. Enter repair mode, and enter the following command to modify:Enter the
China Telecom's optical fiber household has cut off the former ADSL cat. Because China Telecom's wireless cat is used, my wireless route is useless for the moment. My dedicated PC must also use a wireless network card, because it is a dual system,
Ubuntu live-cd provides the iso file boot function. You only need to add the boot = casper iso-scan/filename =/path/to/filename. iso parameter to the kernel boot.The following grub2 boot ubuntu-11.10-desktop-i386.iso from the u disk as an example.
I. linux boot guide process (first, let's take a look at the linux boot guide process) Boot self-checkMBR boot record)GRUB menu (if multiple systems are used, select which system to use)Load Linux KernelINIT process initializationInit process---- It
I will not talk about the advantages and functions of svn any more. Next, let's do a test to understand the operations;
1 to the svn official website to download the installation package, http://subversion.apache.org/download/#recommended-release
②
Install SambaInstall samba Sudo apt-get install sambaConfigurationThe first step is to create a shared directory: for example, to create/home/user name/share, first create this folder (this user name is your user name, which I wrote for ease of
How can I modify IP information in Linux? In the past, ifconfig was always used for modification, and it had to be redone after restart. If you modify the configuration file, you don't have to worry about it ~ A. Modify the IP address Effective
In linux, crontab files are often maintained using the crontab command to submit scheduled jobs. Before introducing the crontab command, let's take a look at the format and meaning of each field in each entry in the crontab file.Each entry of
A friend's house uses the China Telecom wireless cat PPPOE for dial-up Internet access and does not have a wireless route. Therefore, he has to use pppoeconf under ubuntu to configure dial-up Internet access, result After the configuration is
There are two methods: Host Name-based virtual host and port number-based virtual host.I. Host Name-based virtual host configuration methodAdd the following statement to tomcat server. xml: Open the hosts file under C: \ WINDOWS \ system32 \
Linux Kernel introduction:A) LINUX architecture: I. user space: application, C library Ii. kernel space: Code related to the system call interface, kernel, and architecture Iii. Reason for layering: the operating system itself is fully protected.
Linux, unlike Windows, can be automatically identified after new hardware is connected. in Linux, new hardware cannot be automatically identified and must be manually identified. USB mobile storage devices are generally identified as sda1, which can
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service