Analyze the impact of Swap space on performance when the system's physical memory is insufficient, a part of the physical memory needs to be released for the current running program. The released space may come from some programs that haven't been
Clean up svn junk files in linux. the svn folder sometimes uploads svn code to the server and accidentally uploads svn system files. These files are used for version control and are always a bit uncomfortable in the production environment. In linux,
When preparing an XML cross-platform demonstration in the RHEL5 rescue mode under VM6, I suddenly thought of an analogy of JAVA cross-platform, but I didn't pay attention to the problem of $ and $ When configuring/etc/profile, everyone should be
Fedora access to samba server error: "You may not have permission to use network resources" problem: when using Samba to create a Window sharing with Linux, if not, "You may not have the permission to use network resources", www.2cto.com, that is,
In the AWK language of AIX, the regular expression [plain] www.2cto.com can be used in the awk command to use the regular expression awk. The metacharacters are as follows: \, ^ ,., [], |, (), *, + ,? +: Match one or more characters?: The occurrence
Ubuntu eclipse keyboard failure problem Ubuntu10.04 system Eclipse input ". "prompt: After the keyboard is invalid, the key disk becomes invalid and the character cannot be entered. However, you can enter it elsewhere. Click somewhere else and
Menu of the Grub startup Item of CentOS6.3. the content of the lst file may vary depending on the disk partitions installed on different machines, but the basic information is similar. You can use it as a reference: www.2cto.com # grub. conf
The powerful grep command explains the grep command on the Internet. It basically translates man commands. To tell the truth, forget it after reading it! I personally think that the best way to learn commands is to simulate the real environment,
Configure the static address in Ubuntu. First, set the IP www.2cto.com $ sudo gedit/etc/network/interfacesauto loiface lo inet loopback auto eth0 iface eth0 inet static address 192.168.1.99netmask 255.255.255.0 gateway 192.168.1.1 to save. In this
Background: to delete all files during system startup and damage the boot program, you must repair the system quickly without compromising data.
Rm/boot/*-rf
Dd if =/dev/zero of =/dev/sda bs = 446 count = 1
Rm-f/etc/inittab
Rm-f/etc/rc. d/rc.
Problem with war release in linux 1 linux mysql startup varies depending on the startup method, and the result is www.2cto.com passed. /mysqld_safe & start ps-ef | after grep mysql is started, the following information is displayed: root 15537 1 0? 0
Factors that need to be considered when backing up data on a Linux server if you perform a general backup, the daily basis is better (at least for user files with more frequent changes ), you will reduce the loss of archives and increase the
Memcached has several important restrictions, especially the expiration time restrictions. Otherwise, it is easy to step on the mines: www.2cto.com 1) size limit of a single cache value: the size limit of a single memcached cache value is 1 MB (10000
"Linux users who forget the history are destined to enter a lot of information ."This also makes powerful historical commands (including the Bash shell's historical variants) not only useful when invoking previous commands without re-entering them,
1.> fileIf there is no command before, shell will create an empty file (with a length of 0 characters). If the file already exists, its content will be lost.2. You can type multiple commands in one line, and separate them with good scores.3. If the
1. Explanation of dd commands.Dd: Use a block of the specified size to copy an object and perform the specified conversion at the same time.Note: place the specified number. If the following column ends with a character, multiply it by the
1: ls related options:-A: This option can display hidden files starting ".".-I: displays the inode number of each file,-R: list all sub-directory layers at the same time-L display in long format-F: Display suffix# For example:Directory test/The
This system audit records users, times, and operations. Then, record the information to a file.
1. Configuration
1. Add the following two lines of code at the end of the/etc/profile file:
Export HISTORY_FILE =/var/log/'date' + % Y % m''. log
The network environment of a server in the company is too high. When the server is connected to the source server for download, it runs to 400 M-500 M. In order to control the server, we studied TC. To control traffic. To control it to a small
(1) Linux distribution companies: redhat suse redflag
(2) storage media:
The Iide interface is automatically recognized as/dev/hda.
The Scsi interface is automatically recognized as/dev/sda.
Stata (Serial hard drive)
The software drive is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service