Samba service configuration sharing

1. The local machine is not connected to the Internet. Set yum to search for vi/etc/yum from the local device. repos. d/Centos-Media.repo 2. mount iso mount/dev/cdrom/mnt/cdrom3.yum install yum-y install samba * -- skip-broken4. modify the

Redhat9 compilation and installation apache2.2.23

Redhat9 compile and install apache2.2.23 (1) Get apache source code: wget http://archive.apache.org/dist/httpd/httpd-2.2.23.tar.gz (2) unzip: www.2cto.com tar-zxvf httpd-2.2.23.tar.gz (3) Compile and install: cd httpd-2.2.23. /configure -- prefix

In Linux, the application is displayed as square.

In Linux, the application is displayed as a square to solve the java application in Linux (I use ubuntu). If a Chinese character is entered in the UI, it is displayed as a square.There is no problem in output or file generation, but the input in the

Two problems after the project is deployed to linux

The first problem that occurs after the project is deployed to linux is the Exception error generated during tomcat startup: java. io. fileNotFoundException: Mirrors. log (Permission denied) www.2cto.com this error is caused by my log4j. the log

Linux operating system and time synchronization settings

For linux operating systems and time synchronization settings, note the following command prerequisites: run the root permission to set the time: www.2cto.com date-s 11:25:36: date-s 07/26/2005 forcibly write the system time to CMOS (otherwise, the

Solve the problem that users and groups cannot be added in linux (the groupadd command is unavailable)

To solve the problem that users and groups cannot be added in linux (the groupadd command is unavailable), you need to install mysql on a linux server. When installing mysql, an error message is displayed: www.2cto.com [root @ localhost

Linux shell programming extraction character and statistics

Extraction of characters and statistics in Linux shell programming 1. Assume that the format of a bb file is as follows: www.2cto.com currently requires to extract the above part of the red body, which can be achieved through the following command:

Obtain the process id and name in linux.

Linux obtains the process id and name as a shared library, and requires statistics on the Usage Frequency and usage of various applications in this library. In order to make better improvements to the main applications. Www.2cto.com, You need to

Java classpath batch set shell scripts

Java classpath sets the delimiter between shell script linux bash jar files in batches to ':' www.2cto.com export JAR_HOME = path to directory which limit des jars for f in $ JAR_HOME /*. jar do JAR_CLASSPATH = $ JAR_CLASSPATH: $ f done export

Interface for setting TCP heartbeat in the Kernel

Kernel's interface for setting TCP heartbeat SO_KEEPALIVE www.2cto.com/proc/sys/net/ipv4/tcp_keepalive _ * when TCP link has no data communication for a long time, to prevent silly behaviors (Client crash), you can send some "hello" TCP packets.

Linux Server Optimization

1. Disable services not required by some servers For example, bluetooth and pcscd   2. Cancel Some uncommon scheduled tasks For example, makewhatis. cron (in/etc/cron. weekly and/etc/cron. daily) is used to generate the whatis database. In addition,

Software compilation and installation in linux, prerequisites and Methods

In linux, if you want to use the source code package for compilation and installation, you need to use the gcc tool. This tool is usually available by default when installing the system. Run rpm-qa | grep gcc to check whether gcc is

View the remaining disk space and folder size in linux

The Df command is used to view the file system by disk partition in linux. You can add parameters to view the remaining disk space. The command format is as follows:Df-hlDisplay format:File System capacity used available % mount pointFilesystem Size

Deploy openvpn service on RHEL5.4

I. Introduction to openvpnOpenvpn is an SSL-based vpn. It uses the industrial standard SSL/TLS Protocol to implement the layer-2 and layer-3 secure data link VPN. Its advantages are as follows:1. It is secure Based on the SSL protocol and can be

Batch add and delete user scripts

#! /Bin/bash## This script is used to add or delete users in batches. The initial user password is 123456. You need to change the password for the first login.# Format:./class_stu.sh parameter 1 parameter 2 parameter 3# Parameter 1: Start user name,

Linux scheduled execution command crontab

Syntax: crontab [-e [UserName] |-l [UserName] |-r [UserName] |-v [UserName] | File]Note: crontab is used to allow users to execute programs at a fixed time or interval. In other words, it is similar to the user's time table. -U user is used to set

Centos selinux is disabled without restart

To disable SELinux:Modify selinux = "" in the/etc/SELINUX/config file to disabled, and then restart.If you do not want to restart the system, run the setenforce 0 command.Note:Setenforce 1 sets SELinux to enforcing ModeSetenforce 0 sets SELinux to

Modify Swap partition in linux

Modify the Swap partition size after installing the Linux system (two methods) After Linux is installed, what should I do if the swap partition is too small? How can I expand the Swap partition? There are two ways to create a new swap partition, one

Query the number of digits in a Linux System

Query the number of digits in a Linux SystemWe often encounter situations where we need to query the number of digits in the linux system. The following are two methods that I usually judge for reference only.1. check whether there is a/lib64

CentOS vncserver Configuration

I. Introduction to VNC:VNC, fully known as Virtual NetworkComputing, is a desktop sharing system. It is similar to the Remote Desktop function in windows. VNC uses the RFB (RemoteFrameBuffer, remote frame buffer) Protocol to remotely control another

Total Pages: 5467 1 .... 5432 5433 5434 5435 5436 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.