Toss an afternoon, finally success can use the handle and then Chromebook to play arcade game (Slam Dunk, fist, assault Cavalry)Download the corresponding MAME version in http://sdlmame.wallyweek.org/download/(both the main installation package and
The zero-based Linux 21st ChapterIn the tense study, and ushered in a new week ~ ~ Small in the students urged to continue to update the blog.Students: "We did not ask you!" ”Alas?? Students do not cooperate at all ~ ~ Don't be embarrassed.OK ~
The grep command in a Linux system is a powerful text search tool that uses regular expressions to search for text and print matching lines. The grep full name is global Regular expression Print, which represents the globally regular expression
Two virtual machines, all to be detected1. is yum available2. Firewall default zone modified to trusted3. Whether the IP address is configured-----------------------------------------------------------------------------------------Samba file Share
In the development of Linux products, it is often necessary to pay attention to the system memory usage, and to evaluate the memory usage of a single process, so that we can choose the appropriate machine configuration to deploy our products.Linux
If you want to get into the business of operations it? Not aware of the prospects and roadmap for Linux OPS engineers? It is unclear what system is optimized for Linux operations? Then what are you waiting for? To listen to the old boy teacher's
Directory Operations
command name
function Description
Examples of Use
Mkdir
Create a Directory
mkdir dirname
RmDir
Delete a directory
RmDir dirname
Mvdir
Format a USB flash drive using the MKFS commandAfter the computer inserted the USB flash drive, the first DF command to check the confirmation disk, you can format the USB flash drive into ext2/ext3/fat32 format, the specific command is MKFS-T
It is well known that vmareworkstion is a powerful desktop-based virtualization software that compares Windows virtual machines, Linux virtual machines, and even network operating systems, such as Cisco ASA, Juniper SRX, and so on. And you can use
The following describes the Linux security settings, network firewalls (iptables, NAT, Layer7, diff, Patch, SELinux)First, the firewall1. Firewall Foundation(1), firewallFirewall, which is an isolation tool that works on the host and network edge.
Target Environment,3DeskCentOS 6.6, a set asNTPDServices and external publicNTPService synchronization time, as well as the intranetNTPDservers, and other machines do time synchronization with this service. 650) this.width=650; "src="
The following table lists the default directories or files for Linux and their uses:
Catalog/File
Use
Source
/
/At the top of the Linux file system tree structure, it is the gateway to the Linux file system,
Know that SSH friends should know what it is used to do, if you do not know what is SSH telnet, you can go to see my previous blog, about the network foundation of Linux knowledge.Note:ssh is used to log in remotely. Execute the SSH command to open
What is itThe uptime is used to see how long the system has been started. It displays the same information as the header of the W command (the first line). Give me a chestnut.To give an actual application scenario: such as the discovery of some
Ls:list (List contents)Cd:change directory (change directory)Su:switch User Switch usersRpm:redhat Package Manager Red Hat Pack ManagerPwd:print Work Directory Print current directory displays the absolute path of the current working
Company recently to a batch of CDN server, need to change the password regularly, originally wanted to use automation tools to achieve this function, but recently busy no time to do, so the first way to modify the script, the Internet search for a
Sometimes the Tomcat port is occupied, the process ID needs to be detected and the process is killed.1. Find the process ID that occupies the port (Windows and Linux as 8005 can also be quoted)6904 is the process ID that occupies the port. In order
Python iterator, generator and decorator, and python generator Decoration
1. Principles and usage of the iterator:1> principle:An iterator is a way to access a set element. The iterator object is accessed from the first element of the set until all
Install NodeJS, mongoDB, and nodejsmongodb in LinuxPrevious
This article describes how to install NodeJS and mongoDB in Linux
NodeJS
1. Download The NodeJS installation package in the Linux environment from the official website.
2. Upload the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service