System Environment: CentOS LinuxNetwork Environment: two IP addresses, 192.168.0.10 and 10.10.30.2, mask 255.255.255.0,The Gateway addresses of the two subnets are 192.168.0.1 and 10.10.30.1.1. Configure the IP address 192.168.0.10 for the network
Common commands for copying files and folders using CentOS
CpNO1. copy the files in the specified directory to the current directory and rename[Root @ rehat root] # cp ~ /. Bashrc bashrc_bak
NO2. force copy the file from the specified directory to
I am using 8 M broadband for China Telecom, and the Internet is also expensive. Record the network configuration process of CentOS 6.4. The following statements are executed with the root permission. Enter the su press enter in the command line and
10 knowledge points for Linux beginners1. Linux is a case-sensitive system. For example, Mozilla, MOZILLA, mOzilla, and mozilla are four different commands (but only the fourth mozilla command is actually valid ). Also, my_filE, my_file, and my_FILE
Acpid power management can reduce energy consumption and save power by suspending unnecessary devices, reducing the CPU frequency or other methods.Apmd-apmd is used to monitor the power usage status of the system and write related information to
We often access a website. What if we set the mgcrazy.com domain name to automatically jump to www.mgcrazy.com when users access it? I have found a lot of information on the Internet, but none of them can solve the problem! Here are my solutions!
After logging on to the system, you will have a default permission when creating a common file or directory. The common file is 644, And the directory file is 755. We all know that this is determined by the umask value. You can run the umask command
By viewing the Nginx concurrent connections, we can clear the load of the website. There are two ways to view Nginx concurrency (the reason is that I only know two ways), one is through the web interface, the other is through the command, web View
Cryptsetup is a partition encryption tool in linux. It is a partition-level encryption tool that works at a lower level than the file system level. It creates a file system on an encrypted block device, last mount and use.
1: create a common logical
Use vim/vi to encrypt and decrypt files in CentOS1. Use vim/vi encryption:Advantage: After encryption, if you do not know the password, you will not be able to see the plaintext, including root users;Disadvantage: it is obvious that encryption is
: Xiaocheng was released at:. Category: Operating System
When configuring multiple servers, you often need to synchronize the time between each server. If the server has an Internet environment, you can directly update the time at the same time as
Disable ctrl + alt + del• By default, ctrl + alt + del is used to restart the system with a delay of 3 seconds. The delay between sending an alarm message to the process and killing the process signal is 3 seconds. • Edit/etc/inittab and set the
In virtualization, the virtual machine NICs cloned from the template are named eth1, and some programs or scripts that involve NICs are written with eth0 by default, the problem of changing eth1 to eth0 is as follows:
# Vi/etc/udev/rules.
Every time you download some configuration files to the physical machine in CentOS, and upload some files to the virtual machine, it is a little troublesome to enable the ftp software back and forth. Here we use two command tools, can be uploaded
ACL permission Control
Set ACL permissions: setfacl
View ACL permissions: getfacl
ACL permission control is designed to provide specific permission settings beyond the read, wirte, and execute permissions of the traditional owner, group, and other.
Record the description of the Nginx. conf configuration file on the nginx server, partial annotation collection and network.
# Running userUser www-data;# Start the process. Generally, it is set to be equal to the number of CPUsWorker_processes 1;
The latest CentOS version is 6.5, which provides the iso image for minimal installation (32-bit 285 M, 64-bit 322 M), the previous 5. version x is not provided separately. It is a good news for us to develop these products. Whether it is download or
When configuring multiple servers, you often need to synchronize the time between each server. If the server has an Internet environment, you can directly update the time at the same time as the external server. You can use the rdate command to
1. Introduction
Software Installation is the top priority of linux learning. * nux is an important philosophy
Learning to combine a number of small functions to become an available and maintainable system platform.
When the operating system is built,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service