The history command of a linux Command in a day is used to display the commands that have been used and numbered them. History n displays n recent commands. Www.2cto.com history-c clears the history of the current shell. History-d 801: delete a
Linux (v) ---- You can directly submit a requirement to manage user group permissions for Common commands! The steps are completed first and then analyzed later. Authorized users chongshi and bugmaster have the write permission to create the
Nic naming rules in Linux: eth0 and eth1. The first Ethernet Card and the second card. Lo is the loopback interface, its IP address is fixed to 127.0.0.1, And the mask is 8 bits. It represents your machine. The Java code ifconfig [Interface]
Vim basic edit and move command 1. move cursor: h: left l: Right k: Top j: bottom 2. delete a row: dd www.2cto.com 3. delete A character: x4. delete a line break: J5. create a new line under the cursor and enter the insert mode: o (lowercase letter
A is A local host (that is, the machine used to control other hosts); B is A remote host (that is, the Server of the controlled machine), if the ip address is 172.24.253.2; both A and B are Linux commands on A: # ssh-keygen-t rsa (Press enter three
Neighbor: If a host is connected to your computer on the same LAN (that is, you and the host are connected through a shared media or point-to-point direct connection), then it is your neighbor, they also have the same L3 network configuration.
How to install the XP system through the xen Virtual Machine in centOS my test environment: 1. use the root user to log on 2. centOS minimizes installation for native DVDs. internet access 1. install xen # yum-y install xen * the services required
Archlinux screen brightness adjustment (dell studio's 15z-1569 notebook) after the 15z-1569 notebook of the dell studio series is installed with Archlinux, the screen brightness is the highest by default, and the eyes cannot stand it.The hotkey used
It's easy to handle port forwarding from one server to another. Enable Nic forwarding function # echo 1>/proc/sys/net/ipv4/ip_forward www.2cto.com. Example: From 192.168.0.132: 21521 (New Port) Access 192.168.0.211: port 1521A. Same port forwarding (
Install nginx in centos. Unzip nginxtar-zxvf nginx.zip to solve the pcre and md5 problems that may occur during the installation process (pcre-devel solves pcre and md5) yum-y install pcre-devel openssl-devel www.2cto.com install gcc, and makeyum-y
Ubuntu 13.10 has been released. After the upgrade from 13.04 is successful, you will find that the drop-down list cannot be displayed after you click the Eclipse menu bar, but the shortcut key is valid. This should be regarded as a bug of Ubuntu
Output special characters in AWK-single quotation marks output in AWK single quotation marks are implemented in a special way: [html]> uname Linux uses single quotation marks for output strings: single quotation marks-double quotation marks-single
KDE Desktop System The KDE Desktop System was launched in October 1996 and subsequently gained rapid development. The KDE Desktop system has the following features:◆ Environment configuration can be fully realized through the graphical user
1. Process special file names
Suppose there is a file name named "-ee" in Linux. If we want to operate on it, for example, to delete it, enter the rm-ee command in the command line according to the general deletion method, the interface will prompt
Author: C. Arthur Source: CCF
Unix is one of the only myths in the IT world. It has been used since its birth in 1969. Its past history is like the history of a nation.
We should be glad that all Unix users have finally survived the pain points of
Kernel configuration considerations
If you want to compile the kernel yourself (the kernel source code can be downloaded to the ftp://ftp.kernel.org/pub/kernel/, domestic download can be to the ftp://ftp.cn.kernel.org/pub/kernel/ so that download
Translated by Jeramiah Bowling/Huang yongbing
Channel, which means that the path or method is a guide or rule set for the desired result. Similar to other channels, security requires a structured and systematic method. At the same time, it should
Programmers who are new to linux often receive garbled greetings. It can be described as "starting from chaos ". Because of the garbled code, and finally gave up linux is not a minority. Well, let's get down to the truth. Let's first look at how
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service