Direct:As shown: (Several of our most concerned data)
First line (MEM):
Total: The overall physical memory size of this machine;
Used: represents the amount that the total is allocated to the cache (containing buffers and
Find the file name called test and enter the path where the file exists/is an absolute path. As a relative pathFind/-name test-printThe Find command with test1 Find. -newer Test-printFind a new file in the current directory than the test
(1): Prepare the Linux host environment, install the development toolchain (description of the installation process of the low version of GCC):In this experiment, I used the host environment is Ubuntu10.04, its own kernel is 2.6.26. The tools needed
Linux 001Command 1:ls View the files under the current directory,-a view all files {hidden}.Command 2:who Displays the current login system user,-a all logged in account.The command 3:uname displays the system version-A to display the system version
Under Linux, remove all. SVN directory methods toFind. -type d-name ". SVN" |xargs RM-RFOrFind. -type d-iname ". SVN"-exec rm-rf {} \; The exam is very warm tip: This content is from the network, only representative personal views, and the position
1. Compiling the EnvironmentHost Environment: Unbuntu 10.04Using kernel version: 2.6.32-21Kernel version to compile: 2.6.38GCC version number: 4.4.*Note: The kernel version installed should be close to the native kernel version, or there will be a
First, overview:1. Three types of users under Linux:(1), Superuser (root) has all the permissions of the operating system UID value is 0(2), ordinary users have limited access to the operating system UID value 500~6000(3), pseudo-user is to
The following instructions use commands such as Iwconfig and ifconfig to manually configure WiFi wireless networks in the command line state. The previous question is that the wireless card driver has been properly installed and correctly identified
OSI model (theory) TCP/IP model (reality)Application layer (application) application layer (application): Smtp,ftp,telnetPresentation Layer (Pressention) Transport Layer (transport): Interpreting dataSession Layer Network layer (IP): Locate the IP
Method One: Temporarily modify the machine name: hostname www.2cto.com with the hostname command can temporarily modify the machine name, but after the machine restarts, the original value will be restored. #hostname//view machine name
Excerpt from data (Linux differs from Windows)There is no special means of communication between threads, because the data structure can be shared between threads, that is, a global variable can be used by two threads at the same time. Just be aware
Reinstalling windows on a dual-system (Windows and Linux) machine will cause the boot of Linux to be lost and inaccessible to the original Linux system [because Windows overwrites the Linux Bootloader-grub in the original MBR]. This can be done by
CentOS Nginx website server Construction Instance, centosng.pdfNginx is an open-source high-performance HTTP server and a back-to-proxy server. Download, compile, and install the module: [root @ localhost nginx-1.4.0] # wget
Ubuntu 15.04 code is identified as Vivid VervetAs one of the world's most popular and influential Linux distributions, every major version update of Ubuntu will attract a lot of attention from the community and fans. However, Ubuntu is somewhat
DIY production of your own CentOS ISO
Centos6.3 the official DVD package is too large and contains a large number of software. However, many of the software cannot be used in the production environment. Redundant installation will only result in a
Linux Process Communication-Overview and linux Process Communication OverviewOne Process Communication has the following purposes:
1. Data Transmission: A process needs to send its data to another process, with the data volume between one byte and
Add and delete users in CentOS
Test environment:
CentOS release 6.5 (Final)
1. Add a user. First, use the adduser command to add a common user tommy:
2. Change the user password. passwd tommy:
3. Grant root permissions
Modify the/etc/
Operating System character set for LINUX topics
Original Works are from the blog of "Deep Blue blog". You are welcome to reprint them. Please note the following source when reprinting them. Otherwise, you will be held legally liable for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service