In linux, The md5sum command uses the brief md5 Algorithm to verify the integrity of network file transmission and prevent file tampering. The message-digest algorithm (md5) algorithm generates a 32-bit fingerprint with a hexadecimal length.
In linux, users and groups who modify files can use the chown command to modify the user of the file or directory: www.2cto.com command: chown user directory or file name, for example: chown qq/home/qq (change the owner of the qq directory under the
Solaris add and delete a virtual network card IP address 1. view the IP Address Configuration of the current network card www.2cto.com root @ solaris # ifconfig-alo0: flags = 2001000849 mtu 8232 index 1 inet 127.0.0.1 netmask ff000000ce0: flags = 10
PrefaceThere are many ways to use kill-URS1 on the Internet to generate new log files for nginx, and many people complain that this method is correct. Here I want to tell you that this method is very correct. I have read the logrotates that comes
The linux TCP client specifies the port number to connect to the Server Linux. There seems to be no command to directly enable or disable the port, because if you only enable the port and do not associate it with the process, enabling and disabling
Linux memcached cache framework parameter description-d option is to start a daemon process,-m is the amount of memory allocated to Memcache, the unit is MB-u is the user who runs Memcache, we recommend that you create a memcached user
My first Hello World Driver in ubuntu is a memorable day. I don't know how long it took me to compile it! In the process of writing this driver, I really realized that driver programming is not that simple ~, I'm a little excited now. It's really
Gcc and g ++ are respectively gnu c & c ++ Compilers
Gcc/g ++ requires a total of four steps for compiling.
1. pre-process and generate the. I file [pre-processor cpp]2. Do not convert the pre-processed files into assembly languages to generate
Sort command Summary
Function: SortSyntax: sort [-bcdfimMnr] [-o ] [-t ] [+ -] [-- help] [-- verison] [file]
Parameters:-B ignores the leading space characters in each line.-D: When sorting, other characters are ignored except English letters,
I. Under what circumstances do I need to remotely start the instance?If our servers are not deployed locally (normally, we host the servers in the IDC ),In addition, there are more than one server in the data center. When one of the servers is
Select the installation mode as text
Boot: linux text
Select the default language
Choose a language: English
Select default keyboard
Keyboard type: us
Select the installation Source
Installation method: local cdrom
CD detection
CD find:
This section describes how to check and set the properties of a volume group and logical volume.Background informationThe check and settings are as follows:Check the status of all volume groups and logical volumes.Set the logical volume attributes
Today, these two parameters have made a little effort to sort them out, so as not to be delayed.
Allow and Deny can be used in apache conf Files or. htaccess Files (with Directory, Location, Files, etc.) to control access authorization for
VMWare provides three working modes: bridged (bridging mode), NAT (network address translation mode), and host-only (host mode ). To apply them properly in network management and maintenance, you should first understand the three working modes.
1.
I. First, clarify the tty driver's hierarchical structure in linux:
Top-down systems are divided into the TTY core layer, TTY line rules, and TTY drivers.
2. TTY core layer and line procedure Layer Analysis
The user space program
Vsftp cannot be connected. The system prompts No route to host.
Cause: port 21 is not enabled for iptables
[Root @ localhost sysconfig] # iptables -- list
Chain INPUT (policy ACCEPT)
Target prot opt source destination
RH-Firewall-1-INPUT all --
Use of linux timing functions
In linux, the timer function is used to measure the running time.
Header file
# Include
Timing Functions
Int gettimeofday (struct timeval * TV, struct timezone * tz );
Storage Time struct
Strut timeval {
(1) File Operations
1. Touch creates a new file and modifies the timestamp.
Touch + new file
Touch-t 201007111500 f1 modified f1 Timestamp
Ll -- time-style = long full file display time
2. cp option source file target file
Option [-r] recursive
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service