Process Control statement:The IF statement is formatted as follows:#if语句的后面是Shell命令, if the command performs a successful return of 0, the command following then is executed.
The code is as follows
Copy Code
if
Expect detailed
The expect command is simply to implement tools that automatically interact in interactive software through its built-in commands.
SSH can be used in conjunction with the Spawn command to achieve automatic SSH login. And because it
How the Linux server configures Linux Linux configuration management with puppet and Augeas management, puppet management configuration, Augeas management configuration Puppet is a centralized configuration management system for Linux, Unix, and
Operation Steps1. Confirm that crontab is installed:Executing the crontab command if you report command not found, it indicates that you did not install2. Install CrontabPerform Yum install-y Vixie-cron3. Confirm that the installation is
As we buy Xen VPS will be directly logged on to the root and then install the Panel or a key to build the station, the site may be small data or the beginning of the stage can not find the problem, as time goes by our site data will gradually
Docker starts the listening port, uses HTTP, and can remotely manage the Docker host.Such a scenario has drawbacks, the API level is not provide user authentication, Token, such as authentication, anyone can use the address plus port to control
When it comes to cloud hosting, we must be familiar with the most famous brand in China--Ali Cloud, come from behind it by a lot of stationmaster is sought after, its stability and service let it's price ratio straight up, now Aliyun the lowest end
The "/" root directory section has the following subdirectories:The/usr directory contains all the commands, libraries, documents, and other files. These files will not be changed during normal operation. This directory also contains the main
The 3rd chapter: Red Hat Linux 7.1 Usage Basics
3.1 Login and exit system
1. Start the system
Usually Lilo is installed on the MBR, after the computer starts, the MBR program is executed, there will be a not very beautiful graphics: the left side
This article introduces the 12 classic techniques of Linux operating system application, which can be used to better use Linux system.
1, processing the special file name
Assuming that the Linux system has a file named "-ee", if we want to operate
In August 1991, a student from Finland posted the following paragraph in the Comp.os.minix News Group:
Hello, all people using minix-I am doing a free operating system for 386 (486) at (just for hobbies, not as big and professional as GNU).
This
Linux has many advantages in function, price or performance, however, as an open operating system, it inevitably has some security problems. about how to solve these hidden dangers, to provide a safe operation platform for the application, this
For a long time no update, I will hand in the hands of some of the problems in Azure, share to everyone not too many of the truth, some actual dry goods, this is mainly about the Azure platform of Linux virtual machine, forgot the password, account
This section says the SSHSSH manufacturing private and public keysThe private key is the keyThe public key is a lockDistribute the public key to each Linux server you want to log on to#ssh-keygen-t DSAUsing this command will generate a pair of keys
Because many VPS or server are limited traffic, but many service providers do not provide a detailed flow chart, such as daily traffic table, so it is certain that some people would like to know how much traffic on their servers.Vnstat is a very
This is a program developed by Red Hat following GPL rules. It has an interactive operation interface that allows you to easily enable and disable the operating system at each execution level by using the arrow keys and space keys, the system
Tip:1. Use the shortcut key (Ctrl + F), enter the command you want to know, and press enter to quickly find the command;2. Some commands have not yet been updated. In the future, we will take the time to update them. Please pay attention to the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.