Fuser use: Identify processes using a file or file structure, that is, which processes in the query occupy the files, directories, devices, or sockets that have been developed;LsofMTRFuser commandPurpose : Use a file or file structure to identify
shutting down the firewall from the configuration menu is not working, simply do not install the firewall at the time of installationTo view the firewall status:/etc/init.d/iptables StatusTo temporarily turn off the firewall:/etc/init.d/iptables
First, installation preparation1. Installing OpenSSLTo enable Apache to support SSL, you need to install OpenSSL support first. Recommended Download Installation openssl-0.9.8k.tar.gzDownload openssl:http://www.openssl.org/source/TAR-ZXF openssl-0.9.
The format of the for loop described earlier is as follows:For VARNAME in List;doStatement...DoneThe For loop in this format is the statement that assigns each value in the list to the variable varname, and then executes in the loop body. When no
2014-07-07 Linux Common commandsRead some articles on linuxtoy.org collect some common commands==================First, PS, kill use for referenceSecond, the Ubuntu tips threeThird, minimize the installation of UbuntuFour, Linux Mint set timeOne to
One, GNUGNU is the "GNU's not Unix" recursive abbreviation, Stallman announced that GNU should pronounce Guh-noo (slave) to avoid confusion with the word new (note: GNU in English is intended to be the African wildebeest, the same pronunciation as
It is necessary to copy and paste entire lines (multiple lines) in the VI editor.1. Copy1) Single-line copyIn command mode, move the cursor to the line that will be copied, and press "yy" to copy;2) Multi-line replicationIn command mode, move the
Two global variables involved in Linux clock interrupts one is xtime, it is the TIMEVAL data structure variable, the other is the jiffies, first of all, look at the timeval structurestruct Timeval{time_t tv_sec; /***second***/susecond_t
Recently wrote a shell script that used the CP, time, cut, and awk commands to write down their use methods:1.CP and MVCP command: Used to complete the copying of files from the source folder to the destination folder . Both the source and
Reprint Please specify source: http://blog.csdn.net/suool/article/details/38582521.Basic concepts and principlesMutexes can resolve mutually exclusive access to resources, but in some cases, mutual exclusion does not solve the problem, such as two
Mysqladmin in SuSE linux -- incorrect sleep parameter usage, mysqladmin -- sleep
We all know that in MySQL, you can use the extended-status option of the mysqladmin command to view the running status of MySQL, for example, to obtain the values that
Echo command instance
The echo command is a built-in shell command used to display the value of a variable or print a line of text.
The echo command plays an important role in building shell scripts.
Syntax:
# Echo [Options] [String]
The items in
Comparison and Analysis of three major WEB servers (apache, lighttpd, and nginx)
I. Software introduction (apacheLighttpdNginx)
1. lighttpd
Lighttpd features low memory overhead, low cpu usage, good performance, and rich modules. Lighttpd is one of
[Tips] use commands to set the default browser In Debian/Ubuntu
Hey, guys!
In this article, we will use the command to set the default browser In Debian/Ubuntu.
Although it is convenient to use the main browser interface to set the default
Use forever to implement self-starting Node. js projects on Linux
It is easy to manually run the Node project on a computer, node xx. javascript is done. If you want to run the Node project in the background, you cannot directly use the node command.
Red Hat Linux 7.0 installation illustration
Red Hat Enterprise Linux 7 is now available for users to download
RHEL 6.3 installation tutorial
1. Start from the CD and select "install Red Hat Enterprise Linux 7.0"
2. Select the language for
Can traditional RAID be built on SSD?
When asked whether traditional RAID can be built on SSD, the first response should be "yes, but Trim command support is required ". On the Internet, we can also see that many people use SSD to create RAID, but
How to Use Motion to manipulate Linux surveillance cameras
Motionhttp: // www. lavrsen. dk/foswiki/bin/view/Motion/) is a small, lightweight, but powerful application software that can be used to manipulate surveillance cameras on Linux. It works
For the current enterprise application operating systems, Unix and Linux should be dominant. Both administrators and developers can operate fluent character command lines ". After several years of improvement and optimization, the Linux GUI has made
Bkjia: In this article, I have figured out several things that will always be done after installing a brand new Kali Linux. Since I have multiple laptops and workstations, we recommend that you expand the scope of the following steps to meet your
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.