tar command
[Root@linux ~]# tar [-cxtzjvfppn] files and directories ....
Parameters:
-C: Create a compressed file parameter instruction (create meaning);
-x: Unlock a parameter command for a compressed file!
-T: View the files inside the Tarfile!
In
In the 70 's, the UNIX system's source program can be freely circulated. The Internet's underlying protocol TCP/IP was created in that era. At that time, people in the creation of their own "program works" enjoy the scientific exploration,
The Mysqlcheck client tool can examine and fix myisam tables, and can also optimize and analyze tables.
In fact, it integrates the functions of check, repair, analyze, optimize in MySQL tools,
There are 3 different ways to invoke Mysqlcheck:
First, create a directory habit
~ $ mkdir tmp
~ $ cd tmp
~/TMP $ mkdir a
~/tmp $ CD a
~/tmp/a $ mkdir b
~/tmp/a $ cd b
~/tmp/a/b/ $ mkdir C
~/tmp/a/b/$ cd C
Should use:
Second, the habit of extracting files
Transparent Big Page Introduction
Some official presentations from transparent Huge pages:
Transparent Huge Pages (THP) are enabled by default in RHEL 6 for all applications. The kernel attempts to allocate hugepages whenever possible and any
Linux using md5sum recursively to generate the entire directory MD5 today to use the md5sum operation directory, recursive generation of all the files in the directory MD5 value, the results found that it does not support recursive operations and
Introduction: This article uses Linux's Kylix 3 and Borland dbexpress data access drivers to analyze DB2 UDB database tables, fields (names, and types), allowing users to select specific tables, toggle between fields to be displayed, and view data
The informixseforlinux of this article is the compiled version:
Installation steps are as follows
Server environment: TurboLinux4.0 Chinese version, Kernel2.2.10,64m,pentium90 take SE as an example, ESQL/C is SQL embedded C development tools,
The monitoring side of the work has been done, now as long as the monitoring side of the operation;
Note: be monitored MySQL remember to set the password AH
The addition of service types is also 2:
1.web Server
2.mysql Server
The following is a
The boot process refers to the whole process of powering up the computer until Linux displays the user's login screen. Analyzing the Linux boot process is also a great way to get a good idea of how Linux works.
Start the first step-load the BIOS
The Linux file system is an inverted tree structure, all files or folders are contained in a root directory "/".
Linux systems are strictly case-sensitive and have a name of up to 255 characters
All valid characters except forward slash
Each
First, the Linux Firewall Foundation
Firewalls are divided into hardware firewalls and software firewalls.
1. Overview
Linux firewall system mainly works in the network layer, for TCP/IP packet implementation of filtering and restrictions, belong
Cd.. Return to the previous layer;PWD view current directory;Ssh-l Oracle oracle_id into the databasePs-ef|grep Oracle View current Oracle ProcessesSqlplus/nolog into SqlplusUse $,sql under Linux! (seems to be so, to be verified later) expExported
########################################################### #第十单元 #######################################################################1.RSYSLOGD Service (SYSLOGD enhanced version)RSYSLOGD service function is used to manage system logsFunction:1)
DF -H/du -hs./dugrep [[:d igit:]+]gdu [-ABCDHHKLMSSX] [-l ][-x ][--block-size][--exclude=][--help][--version][directory or file]Common parameters:-A or-all displays disk usage for each specified file, or displays the respective disk usage for each
Remote Desktop of VNC under the same LAN in CentosI. VNC software
For example, Centos is controlled by Windows:Install VNC on Centos
// Check whether installation # rpm-q tigervnc-server // installation # yum install tigervnc-server // create a user
How to check whether the Apache module is normal
In this article, we will briefly discuss the Apache server front-end and how to list or view the Enabled Apache modules. Apache is built based on the modular concept. This allows the web administrator
How to build new application-oriented O & M management ideasGuideO & M requires breakthroughs in thinking, from Ops to DevOps, from projects to products, from resources to applications. Many problems have been plagued and are being considered. Why
Java SE users are careful!Is Java free? You think too much. Oracle's lawyers are on their way. Six years after the acquisition of Sun Microsystems, Oracle finally began to audit Java customers with great fanfare. More and more Oracle customers and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service