[Gzip/gunzip] gzip is the compression command, and the corresponding gunzip is the decompression command, which is very simple to use, as follows: gzip file1 is compressed, the compressed file name is file1.gz gunzip file1.gz, And the decompressed
RedHat encoding format query and Modification 1. query encoding format commands (case sensitive) Ruby code echo $ LANG 2. method 1 to set the encoding format (taking UTF-8 as an example. after setting this method, must be restarted to take effect
In Linux, shell calls cmdct to Perform Batch upgrade and execute the main. sh script to upgrade the updatefilename update package for each IP machine in the hostname. The tcl and keep CT packages are placed in the same path, and $ TSMIS_ROOT is the
Ubuntu12.04 uses pppoe for dial-up and frequent disconnection. Solution code: search for lcp-echo-interval 30 by sudo gedit/etc/ppp/options and change it to lcp-echo-interval 3153600000 # July 100 ...... to express your anger, if it is the dial-up
In Linux, to install the matlab command to run a program, you need a mix of matlab and C ++ programming. I installed matlab on linux, because I am not familiar with linux systems, therefore, I would like to ask zookeeper for help. I would like to
In Linux, there seems to be no command to directly enable or disable the port, because if you only enable the port and do not associate it with the process, enabling and disabling a port makes no sense (when a port is opened, no program processes
File Transfer between Linux servers 1. transfer files from server A to server B 1.1 normal file transfer, do not need to connect to server B through proxy service, log on to server A, execute scp test. SQL user @ server-B: path Description: The file
Install archlinux and use parted to create partitions use parted to partition: Select/dev/sda as the first line of parted, or select hard disk when starting: parted/dev/sda create gpt partition table in the second row, or resume mbr Partition Table:
Ubuntu Linux ruijie installation method has to switch from windows to linux due to learning needs in the near future, while the school needs to pass ruijie authentication on the Internet and access a large amount of information, at last, ruijie
To install svn in linux, follow these steps: 1. download the latest src package of subversion and apache 2. create a user: svnroot. The following operations are not specifically described as root user operations # groupadd svn # useradd svnroot-g
Arch linux uses fbterm. ucimf, as a Chinese terminal, recently transferred the source program under WIN to linux. It basically works in the console, so garbled code is often encountered, which is disgusting. Today, I finally found my solution to
In linux, the character conversion command-tr can be used to view tr as a simplified sed tool. tr is expressed as: translate. The tr command is mainly used to convert strings in the following two replacement operations. The String Conversion of the
A net send tool is provided in windows to send messages to machines with the messenger service;
In linux, commands are not provided to communicate with the window machine;
Generally, we can use commands such as talk, write, and wall to
Uniq command: displays unique rows. Only one row is displayed for repeated rows!
The following example shows how to use it:
[Root @ stu100 ~] # Cat test
Boy took bat home
Boy took bat home
Girl took bat home
Dog brought hat home
Dog brought hat
Fedora 9 is changed to 2.6.25 kernel and 2.6.25 supports ipv6 tunnel access in ISATAP mode. So I simply configured my machine to support IPV6.
1: Ensure that kernel supports ipv6
2: edit/etc/sysconfig/network and add the following line.
Listen 6
In linux, USB flash drives have viruses. They are all files such as auto. If you run the ls-l command to view the properties, nothing happens, and the virus file cannot be deleted.
The reason for the query is that linux cannot process files ending
More and more webmasters begin to use independent hosts and VPS. In order to save costs or improve performance, many independent machines and VPS are all unmanaged bare-metal machines, and everything needs to be DIY. At this time, the implementation
Similar to top monitoring system activity, ntop is a tool used to monitor network usage in real time. Because ntop has the Web interface mode, it is easy to get started quickly in a short time, regardless of configuration or usage.
This
A super user is the owner of the highest permissions of the system and the only winner of system management. A super user has super permissions and is omnipotent. If the super user is not good at management, it will pose a threat to system security.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service