Netstat-n | awk '/^ tcp/{++ S [$ NF]} END {for (a in S) print a, S [a]}'FIN_WAIT_1 286FIN_WAIT_2 960SYN_SENT 3LAST_ACK 32CLOSING 1CLOSED 36SYN_RCVD 144TIME_WAIT 2520ESTABLISHED 352Www.2cto.comThe return parameters are described as follows:CLOSED: No
Foreword most senior programmers may now use github for code management tools. However, many companies still choose svn as the code version management tool considering the ease of implementation and the ability to accept the code, the following
Ubuntu backup system 1. the backup system www.2cto.com first becomes the root user: $ sudo su and then enters the root directory of the file system (of course, if you do not want to back up the entire file system, you can also enter the directory
Linux IP address modification and DNS take Red Hat Enterprise Linux 5.2 As An Example 1. The most common command for configuring ip addresses for NICS is www.2cto.com # ifconfig eth0 192.168.0.1 netmask 255.255.255.0 up. Description: eth0 is the
Why I ssh to log on to the server, error msg: @ WARNING: remote host identification has changed! @ It is possible that someone is doing something nasty! Someone cocould be eavesdropping on you right now (man-in-the-middle attack )! It is also
Common functions of Linux CURL 1. download the file www.2cto.com # curl-u username: password-o ftp from ftp: // ip/file % Total % Received % Xferd Average Speed Time Current Dload Upload Total Spent Left Speed100 37986 100 37986 0 0 27854 0 0:00:01 0
In LINUX, we often want to calculate the number of lines of code that we have written during programming. What should we do at this time? Although Vim and other editors have lines of code displayed, they cannot be opened one by one and then added up?
Linux ln command (link command) Details ln is another important command in linux. Its function is to create a non-same link for a file in another location, the most common parameter of this command is-s. The specific usage is the target file of the
The problem that the password entered by the ubuntu system cannot be entered two days ago when the android environment was set up in linux, the system was restarted after the android configuration information was added to the/etc/profile file.When
Use the dd command in linux In linux, the dd command is used to perform hard disk engraving and clone the hard disk. in linux, all devices are represented as a file, dd commands are used to copy and convert file streams, so they can be used to clone
I. recompile the linuxn Kernel(1) unzip the netfilter-layer7 and linxu KernelTar-jxf netfilter-lay [table]-C/usr/srcTar-jxf linux-2 [table]-C/usr/srcCDS/usr/src/linux-2 [table]Patch-p1 (2) Reconfigure Kernel
The setuid and setgid methods are chmod 4755 program and chmod 2755 directory. Theoretically, all processes initiated by starting a program should belong to the user of the file. Therefore, setting chmod o + x program alone is not enough because it
Axel is a multi-thread download tool under the command line. It supports resumable data transfer, which is usually several times faster than Wget.Its official website:
Http://wilmer.gaa.st/main.php/axel.html
:
Http://wilmer.gaa.st/downloads/axel-1
Because your cluster is implemented in the user space, similar to the iptables service in linux, you need to use ipvsadm to implement it. Since linux kernel version 2.6, the Code has been compiled into the kernel, for an earlier version, you need to
After installing fc15 in a notebook (integrated graphics card), you can experience gnome3. It feels great. You have installed a new one on a desktop (with a video card), but when you enter the desktop, it indicates that no video card driver is
[Note] Some changes have taken place in the work queue since Linux 2.6.20. Currently, the materials searched from the network are generally about the work queue of the old version, and the introduction of the new version is rarely seen. This article
For any computer user, data may be lost due to sudden system failures or sudden power outages during normal operation. We always regret failing to back up the system and various files in time. In fact, it is a good habit for a computer user to back
The basic functions of the top command and ps command are the same, displaying the current process of the system and other conditions. However, the top command is a dynamic display process, that is, you can press the key to continuously refresh the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service