Linux tail command Analysis 1. to view the first five lines of a file, run the head command, for example, head-5/etc/passwd 2. run the tail command to view the last 10 lines of the file, for example: tail-2/etc/passwd or tail-n 2/etc/passwd
In Linux, apart from common read (r), write (w), and execution (x) permissions, linux has three special permissions,They are setuid, setgid, and stick bit www.2cto.com 1, setuid, and setgid, view your/usr/bin/passwd and/etc/passwd file permissions
After installing vncserver in ubuntu, press the letter D to display the desktop. The problem that the terminal disappears is said to be a bug, but it does not matter. There are common shortcut key conflicts. after the vncserver is installed, log on
At present, I am not very familiar with the use of apt-get. I only know some basic operations. Now I will record them and accumulate them later. 1. sudo apt-get autoremove: delete isolated software that is no longer used by the system. Focus on this.
Problem: In a mysql Backup directory, the "modification time" attribute is the file of the current day, renamed = original name + date stamp; put www.2cto.com in the folder named after the date. The first impression is the xargs command + ls command.
Before using ubuntu, you need to start to switch to centos. The installation of centos software package can be roughly divided into two types: [centos] rpm file installation, use the rpm command [ubuntu] deb file for installation, and use the dpkg
The usage of useradd and adduser in ubuntu 10.04 has never been clear about the difference between useradd and adduser In ubuntu. Most posts on the Internet say that the two are actually implementing the same function, but I have a lot of problems
Before installing Nginx in Linux and simply managing Nginx, you need to prepare the following packages: 1. perl Library: pcre-7.9.tar.gz2. nginx installation package: nginx-0.8.15.tar.gz whether your Linux has installed gcc and so on, if not, first
The freenx configuration in CentOS is successful. It is already early in the morning that installing 1yum install freenx sets www.2cto.com.1. zookeeper/etc/nxserver/node. confENABLE_PASSDB_AUTHENTICATION = "1" 2. command 1 # nxserver -- adduser $
Nginx Server installation and configuration 1. installation 1) install and download nginx for windows in windows, decompress it, enter the directory, and run the following command: start nginx: nginx-s [stop | quit | reopen | reload]2) install tar
Run the. sh file in Linux, and the system prompts "No such file or directory". On the Windows platform, write the shell script file, migrate it to the linux platform, grant executable permissions, and execute the sh file,The system prompts No such
In LINUX, you can configure the IP address of the NIC in command mode after the linux system is installed. The configuration file is usually/etc/sysconfig/network-scripts/ifcfg-interface-name1. configure the nic ip address
Linux Kernel 3 Note: Linux Kernel configuration of Linux kernel has the following advantages:1. Clear temporary files, intermediate files and configuration files. make clean: delete most of the generated files (such as. o files in compilation) but
Linux Crontab scheduled task commands I. Crontab introduces the function of crontab commands to schedule the execution of some commands at a certain interval. 1.1/etc/crontab file www.2cto.com has a crontab file under the/etc directory, which stores
Linux IP address failure problems in Linux often use the ifconfig command to set the IP address, but after each setting is complete, the IP address will be cleared after the server is restarted. The specific reason is that the ifconfig configuration
Common CentOS operations: 1. initialization setting # yum-y update # tzselect Time Zone setting #5> 9> 1> 1 # cp/usr/share/zoneinfo/Asia/Shanghai/etc/localtime save the time zone to install Chinese Characters supported # yum install "@ Chinese
In fact, Windows systems are similar to Linux systems. The properties of files and directories in Windows systems are read-only and hidden, while those in Linux are the same.In Linux, each file has a specific attribute. It mainly includes two
I. Cluster solutions on clusters and Linux
Cluster mainly solves the following problems:
High reliability (HA ). With the cluster management software, when the master server fails, the backup server can automatically take over the work of the master
BY: rayh4c.cn
I. I first found the news and reports of this attack on the Internet
Http://www.bkjia.com/ OS /200803/24504.html
Http://www.nsfocus.net/news/6697
Http://hi.baidu.com/secway/blog/item/e80d8efa4bf73ddab48f31a3.html
You can search for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service