When Ubuntu was started, the password was correct, but the problem of loop login occurred. This morning, the first one came to the lab and started working in Linux with great enthusiasm, but the problem was discovered only after it was opened ~ I
In Linux, how does one clearly view the number of digits of the operating system? How does one know whether the operating system is 32-bit or 64-bit? Here we introduce a simple way: [plain] [root @ localhost mysql-5.1.57] # getconf LONG_BIT 64
An important feature of the linux 2.6 kernel is the provision of a unified kernel device model. With the continuous advancement of technology, the topology structure of the system becomes more and more complex, and the requirements for intelligent
If ubuntu is installed in the virtual machine but there is no 1600*900 resolution, Step 1: xrandroid-q view all the resolutions in the current system. Step 2: cvt 1600 900 to obtain the required resolution data. Step 3: http://service.ap-southeast-1.
1. using tr, you can easily implement many basic functions of sed. You can use tr as the (extremely) Simplified variant of sed: it can replace another character with one character, or it can completely remove some characters. You can also use it to
Linux boot details Linux boot process refers to the process from power on the computer to display the user login screen. Step 1: load the BIOS (Basic Input Output System) information and store it on the computer's motherboard, which must be
In Linux, the command for disabling GUEST in ubuntu 12.04 has a guest user by default. You can use GUEST to access the Ubuntu machine without a password. After you add allow-guest = false to gksudo gedit/etc/lightdm. conf, [SeatDefaults]
Ubuntu 11.10 garbled problem (TXT) after installing ubuntu 11.10, we found that the txt file garbled. I went online and found that many methods could not be used. After several efforts, we finally got the result. The solution for ubuntu 11.10 is as
Ubuntu has been building nginx + scala + play 2.0 runtime environment to learn scala for a while. Recently, scala has been used as a community: , started to buy a vps with 512 memory, but did not pass the compilation, the jvm prompts that the
Shell script contact (random name) 1. Write a script to implement the random selection function. The script must pass in a parameter, such as pick. sh 1 shows the result "Jia Ju" pick. sh 3 displays random results such as "fallen leaves" "jason"
The nginx installation process is nothing more than nginx. The process is as follows: note that the source code downloaded by nginx must be compiled before it can be used. One, Pcre installation,: http://www.pcre.org/download. Tar zxvf pcre-8.01.tar.
Shell_2> & 1 (redirection) problems are often found in some scripts, especially when calling crontab. sh>/tmp/test. log 2> & 1 first half/tmp/test. sh>/tmp/test. log is easy to understand, so what is next to 2> & 1? To solve this problem, we still
Webmin is currently the most powerful Web-based Unix system management tool. The Administrator accesses various management functions of Webmin through a browser and completes corresponding management actions. Currently, Webmin supports the vast
Ubuntu 12.04 server network problems in VirtualBoxSome time ago, in order to build an open source blog on ubuntu in a virtual machine, virtualbox's default NAT access method does not support access from the host to the virtual machine. Therefore, I
The following is a summary of my personal experience. I believe it is useful for UNIX or UNIX-clonefreebsd, openbsd, netbsd, linux, and etc that have been infiltrated:
First, you can use the following system commands and configuration files to track
Oh, I wrote something to play on my blog, Because I searched chinaunix (habitual action) and didn't find it before, so I posted it. Don't laugh, correct the error. Thank you! : Mrgreen:Recently, due to the security needs of a program, you need to
WuFTD has been prone to security vulnerabilities since 1994. Hackers can easily obtain Remote root Access permissions, in addition, many security vulnerabilities do not even require a valid account on the FTP server. Recently, WuFTP also frequently
1. gateway host settingsThere are two NICs on the server. eth0 uses *. * IP address to connect to the Internet, and eth1 connects to the LAN. The/etc/network/interfaces settings are as follows:
Auto loIface lo inet loopbackAuto eth0Iface eth0 inet
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service