Use the md5sum command in linux

In linux, The md5sum command uses the brief md5 Algorithm to verify the integrity of network file transmission and prevent file tampering. The message-digest algorithm (md5) algorithm generates a 32-bit fingerprint with a hexadecimal length.

Users and groups for modifying files in linux

In linux, users and groups who modify files can use the chown command to modify the user of the file or directory: www.2cto.com command: chown user directory or file name, for example: chown qq/home/qq (change the owner of the qq directory under the

Delete httpd from centos

Centos deletes the built-in httpd 1 and [root @ localhost etc] # rpm-qa | grep httpd to view the httpd-related software packages. Httpd-tools-2.2.15-15.el6.centos.i686httpd-2.2.15-15.el6.centos.i686 www.2cto.com 2, and then delete httpd: [root @

Redhat local yum source configuration

Redhat local yum source configuration environment: www.2cto.com vmworkstationRHEL-5.8 -- configure the repo file [root @ localhost yum. repos. d] # cat base. repo [server] name = server baseurl = file: // mnt/hgfs/vmshare/Server gpgcheck = 0 --

Add or delete a virtual Nic IP address on Solaris

Solaris add and delete a virtual network card IP address 1. view the IP Address Configuration of the current network card www.2cto.com root @ solaris # ifconfig-alo0: flags = 2001000849 mtu 8232 index 1 inet 127.0.0.1 netmask ff000000ce0: flags = 10

Nginx logs are separated by day

PrefaceThere are many ways to use kill-URS1 on the Internet to generate new log files for nginx, and many people complain that this method is correct. Here I want to tell you that this method is very correct. I have read the logrotates that comes

Linux TCP client specifies the port number to connect to the server

The linux TCP client specifies the port number to connect to the Server Linux. There seems to be no command to directly enable or disable the port, because if you only enable the port and do not associate it with the process, enabling and disabling

Linux memcached cache framework Parameters

Linux memcached cache framework parameter description-d option is to start a daemon process,-m is the amount of memory allocated to Memcache, the unit is MB-u is the user who runs Memcache, we recommend that you create a memcached user

My first Hello World Driver in ubuntu

My first Hello World Driver in ubuntu is a memorable day. I don't know how long it took me to compile it! In the process of writing this driver, I really realized that driver programming is not that simple ~, I'm a little excited now. It's really

Gcc and g ++ are respectively gnu c & c ++ Compilers

  Gcc and g ++ are respectively gnu c & c ++ Compilers Gcc/g ++ requires a total of four steps for compiling. 1. pre-process and generate the. I file [pre-processor cpp]2. Do not convert the pre-processed files into assembly languages to generate

Sort command usage details

Sort command Summary Function: SortSyntax: sort [-bcdfimMnr] [-o ] [-t ] [+ -] [-- help] [-- verison] [file] Parameters:-B ignores the leading space characters in each line.-D: When sorting, other characters are ignored except English letters,

Linux Remote Boot

  I. Under what circumstances do I need to remotely start the instance?If our servers are not deployed locally (normally, we host the servers in the IDC ),In addition, there are more than one server in the data center. When one of the servers is

CentOS 5.4 system installation

  Select the installation mode as text Boot: linux text Select the default language Choose a language: English Select default keyboard Keyboard type: us Select the installation Source Installation method: local cdrom CD detection CD find:

How to Use

This section describes how to check and set the properties of a volume group and logical volume.Background informationThe check and settings are as follows:Check the status of all volume groups and logical volumes.Set the logical volume attributes

Apache Order Allow Deny experience

  Today, these two parameters have made a little effort to sort them out, so as not to be delayed. Allow and Deny can be used in apache conf Files or. htaccess Files (with Directory, Location, Files, etc.) to control access authorization for

Linux Virtual Machine Network Connection Mode

  VMWare provides three working modes: bridged (bridging mode), NAT (network address translation mode), and host-only (host mode ). To apply them properly in network management and maintenance, you should first understand the three working modes. 1.

Connect to the tty-Driven Data Link of linux

  I. First, clarify the tty driver's hierarchical structure in linux:       Top-down systems are divided into the TTY core layer, TTY line rules, and TTY drivers.         2. TTY core layer and line procedure Layer Analysis   The user space program

Vsftpd prompt: No route to host troubleshooting

  Vsftp cannot be connected. The system prompts No route to host. Cause: port 21 is not enabled for iptables [Root @ localhost sysconfig] # iptables -- list Chain INPUT (policy ACCEPT) Target prot opt source destination RH-Firewall-1-INPUT all --

Use of linux timing functions

  Use of linux timing functions In linux, the timer function is used to measure the running time. Header file # Include Timing Functions Int gettimeofday (struct timeval * TV, struct timezone * tz ); Storage Time struct Strut timeval {

Basic linux Learning (2)

  (1) File Operations 1. Touch creates a new file and modifies the timestamp. Touch + new file Touch-t 201007111500 f1 modified f1 Timestamp Ll -- time-style = long full file display time 2. cp option source file target file Option [-r] recursive

Total Pages: 5467 1 .... 4672 4673 4674 4675 4676 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.