To build yum, first install the yum source using rpm. to install the software using yum, you must configure the client and server. There are two yum client configuration files:/etc/yum. conf is/etc/yum. repo. d /*. repo file, yum. the conf file is
The following tutorials will show you how to easily decompress and repackage the. deb files on the Debian-based Linux operating systems for Ubuntu, Linux Mint, and Debian GUN/Linux users.
Sometimes you may encounter this problem in your life. You
In Linux, there are two types of function libraries:
1. Static LibraryThe link of the static library is completed in the program compilation phase.Each program that needs to call the static database has a copy of the database,Therefore, the absolute
After so many errors have occurred in the Ubuntu file system built by myself, I feel it is necessary to write about the permissions of the file system. Previous errors mainly occur due to file permissions. Linux system permissions are its security
Configure Vi syntax display in Ubuntu
Method 1: Modify the vi/etc/vim/vimrc file.
Method 2: add the touch. vimrc file in the user directory.
The content is as follows:
Set syntax = on "highlight syntaxSet fenc = UTF-8 "set Default DecodingSet fencs =
The cut Command refers to a text truncation tool that can read content from a linux File or standard input and vertically intercept the required information columns. Cut can help us cut out the required information items, so that we can analyze the
2 TB disk formatting in Linux
View System Information[Root @ localhost ~] # Cat/etc/RedHat-releaseRed Hat Enterprise Linux Server release 5.5 (Tikanga)[Root @ localhost ~] # Uname-r2.6.18-194. el5[Root @ localhost ~] # Uname-Linux localhost.
System Administrators must maintain the health of their servers. Memory is an important part. When the server memory usage is too high, it will reduce the server performance. Linux has a tool called free to monitor memory usage.
What is the free
As a system administrator, we need to figure out who is active on the system at a specific time point. We must closely monitor our servers. However, we certainly cannot stare at the system 24 hours a day. In linux, we can use the who command to view
The following system calls are used to write data in the buffer back to the disk.Where:The system calls sync to write data to the buffer first, and then writes the data back to the disk from the buffer;It is an asynchronous call, but the I/O
NetCat is known as "Swiss Army Knife" in network tools, and has Windows and Linux versions. It is designed as a simple and reliable network tool because it is short (1.84 is only 25 kb, earlier version or even smaller version) and has practical
Test Linux: Ubuntu 8.04
Here I think you have installed Subversion and Apache. For more information, see subversion apache installation configuration.
Install ViewVC
1. Environment required by ViewVC
For CVS Support:
* Python 1.5.2 or
Ubuntu 12.04 has been installed recently. it is inconvenient to enter the unity interface and then enter the command line. If you do not need the interface, you can set it to boot to the command line mode.
Today, we provide a better method for both.
Unable to connect to VMware (10.0.1) network in Ubuntu 13.10
The network cannot be connected.
Error message:
Cocould not connect Ethernet0 to virtual network "/dev/vmnet1". More information can be found in the VMware. log file.
Failed to connect
Plank is the simplest Dock on the planet. The goal of Plank is to provide the simplest Dock with no excess fat! Haha.
Although simple, Plank can be extended to create more advanced features. It has an extension library. Therefore, Plank is the
The same problem occurs in different scenarios: unable to load selinux policy
Scenario 1:
It appears after/etc/selinux/config SELINUX = disable is modified
Unable to load selinux policy. machine is in enforcing mode. halting now.
Kernel
To log on to a computer, we need a user name. A user name is an identity that can be recognized by a computer. Based on this, the computer will apply a series of rules to the login users using this user name. In Linux, we can use the id
This tutorial teaches Arch Linux users how to install Syslinux under Arch-a lightweight, fast, and modern system boot program that replaces the GRUB boot program that comes with the system.
In fact, Syslinux is not a simple Boot Loader. It supports
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service