On February 23, November 10, Robin Miller published a short article entitled "The Day of the Linux Desktop "). At first, I didn't notice it. However, after one day, I found that there were a lot of "posts" in this article (as many as 33), and they
Recently, a new thinking has become popular in the Linux circle: a variety of Linux releases, although of different appearances, are essentially the same. Accordingly, it is called the "big reunion" of the Linux release version "). The
1. Use hostname to modify the current host name.
Hostname New-hostname
Modify the/etc/sysconfig/network configuration file so that the new host name can be used at the next restart.
Open the/etc/sysconfig/network file and modify hostname =
SEQ is used to print a string of ordered numbers.
# Seq [-SFW] Last # seq [-SFW] First last # seq [-SFW] First incrment last
Parameters:
F: Specifies the output format. The default value is % G;
S: Specifies the delimiter. The default
How to forget the root user password in Linux
GRUB: loading at bootProgramOn the menu, type [e] to enter the editing mode. You will face a list of pilot projects. Find the following output sentence lines:
Kernel/vmlinuz-2.4.18-0.4 Ro root
Today, I learned about Linux in the first day. At the beginning, I used 2008, So I first allocated some space for Linux. The centos introduced by Zhao Peng is very stable, so I used it.
After the system is installed, connect to the network .. What
@ Page {margin: 2 cm}P {margin-bottom: 0.21}-->
Current,LinuxThe desktop user group is still a "small group". When everyone is crowded, the user group is very dense and almost breathless. Now, there is another new styleLinuxDesktop, in this "Small
The tar command is used to handle packaging and package settlement. The following commands are commonly required:
1. Unpack:
# tar -zxvf file.tar.gz
The preceding command decompress the package to the current directory. If you extract the package
Ldconfig is a dynamic link library management command to share the dynamic link library with the system.
Main uses of ldconfig:
Search for/lilb and/usr/lib by default, and the library files under the directories listed in the configuration
The netstat command is used to display various network-related information, such as network connection, route table information, interface statistics, and multicast memberships ).
# netstat -[atunlp]
Parameters:
-A: list all the connections,
Red Hat Linux
# Add a userUseradd Username# Set PasswordPasswd Username# Deleting a userUserdel UsernameUserdel-r username # delete a user and the user's home directory# Modify the incorrect configuration at startupPress e when you select a startup
Steps during the production of Linux releases zdnet software channel: Author: | Chinese IT lab I would like to comment (
)
Keywords:Operating System
Install
Tips
Linux
The purpose of making a Linux release is to quickly and correctly establish the
Document directory
How to Create image files in Linux
How to create an image file http:// OS .51cto.com Metallica Saidi network I would like to comment on the Linux operating system (0)
Abstract: I have always wanted to create a small Linux of
Detailed description of xargs command usage in Linux: From: Internet browser: 11945
Detailed instructions on xargs commands in Linux:Xargs is a very useful command in Linux. It is often used in combination with other commands and is very
Linux network command ifconfig
InLinuxIn the environment, how can I use commands to view related network information?
IfconfigCommand: Used to view IP addresses and modify Network Interface Parameters
[Root @ Linux ~] # Ifconfig {interface}
Linux also has corresponding methods to decompress the compressed files .zipand .rar in Windows:
1)for. Zip
Linux provides zip and unzip programs, Zip is a compression program, and unzip is a decompression program. They have many Parameter options,
All UNIX systems use the start point of the same time and date: Greenwich Mean Time (GMT), January 1, January 1, 1970
Time is processed by a predefined time_t type. in Linux, it is a long integer. Included in time. h.
# Include
Time_t time (time_t *
Write System Call
# Include # include int main () {If (write (1, "here \ n", 6 )! = 6) {write (2, "wrong", 5) ;}exit (0 );}
Read system call
# Include # include int main () {char buffer [128]; int nread; nread = read (0, buffer, 128); If (
If you want to know whether the standard output is redirected, you only need to check whether the underlying file descriptor is associated with a terminal. The system calls isatty to complete this task.
You only need to pass a valid file descriptor
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service