Linux software installation: some basic concepts of source code and software installation 1. What is open source code? 1.1, the files that can be really executed on Linux are binary files, such as/usr/bin/passwd,/bin/touchshell script only calls
Connect to GIT 1 through SSH authentication. There are multiple methods for connection permission authentication to connect to the GIT server to obtain or submit information, mainly including 1. Each developer creates an account. 2. SSH public key
Soft-float Debian "wheezy" [preface] The installed operating system is suitable for developers and officially states that the JVM supports the version. 2012-08-08-wheezy-armel SSH to start the configuration interface commands, including modifying
I believe that you are familiar with the most basic cat, more, and less methods for viewing File Content in Linux tail. What if you have special requirements: 1. if you only want to view the first five lines of the file, you can use the head command,
Program Management-ps, top, pstree, kill, killall 1. Program observation-ps commonly used: one is to view only the 'ps-l' Of Your bash program ', one is to check the programs running in all systems 'ps auxf '. Www.2cto.com [root @ www ~] # Ps-lF s
Program Execution Priority-Priority and Nice value 1. Relational concept: Priority is the PRI value. The core control of this value can be changed for Nice that cannot be changed. Relationships: PRI (new) = PRI (old) + nice www.2cto.com 2. Nice
In linux, view the operating log of the system. The Java code 1. last www.2cto.com-a displays the host name or IP address from which to log on to the system in the last line. -D. Convert the IP address to the host name. -F specifies the record file.
Regular Expression and file formatting Regular Expression in "laruence's Linux private house dish-basic learning": A string processing method, which processes strings in the unit of action, regular Expressions help users easily find, delete, and
Parsing of SSH password-less login configuration error in Hadoop cluster ConstructionSome netizens said that the firewall needs to be closed before configuring ssh. I did it, but it should be okay to close it. Disable the firewall command "sudo ufw
Svn add *. so files. When you use svn add in linux to add and upload files to svn ,*. so *. bin and other files are ignored: www.2cto.com two solutions: Method 1: each time you add a file, use the following command: svn add -- no-ignore folder
Differences between the static function library and dynamic function library, applications-ldconfig and ldd 1. Differences between the static and dynamic functions library: a. Static function library: Sub-file name. a is to include the entire
Shutting down a Linux system is different from restarting a desktop system. As a server, we rarely restart a Linux system. However, in the following cases, we will restart the system: www.2cto.com changing the hardware to change the system
Common vim commands in linux★Command mode: www.2cto.com move the cursor h or move the cursor to the left direction key (Direction) → move the cursor to the left a character j or backward (direction) → move the cursor down to a character k or forward
GPRS-PDP context activation process (external protocol stack) GPRS-PDP context activation process www.2cto.com GPRS wireless data transmission terminal using the network to achieve full duplex data communication with the host computer. The terminal
The following section describes the scripts used after automatic Jenkins Compilation: add to Build-> Execute Shell, [plain] sshpass-p pwd ssh-t root@192.168.1.55 'service my_web stop' sshpass-p pwd scp bin/my_web root@192.168.1.55:
In linux, general users must use commands that require special permissions, but do not want to disclose the password of the root user. Therefore, with sudo, users are allocated with some specific commands or software that can run with root
Linux tools Notes 1. ubuntu Input Method Problems. Problem description: Environment: ubuntu 10.4 is installed on XP VMWare. the user's graphical logon screen can work on the keyboard. However, after entering the desktop, the key value of the
Set the boot auto-start item in ubuntu. You can use some gadgets to manage the startup options of Ubuntu: tool rcconf: # sudo apt-get rcconf # sudo apt-get install rcconfroot. Run the following command: # sudo rcconf: sysv-rc-conf # sudo apt-get
In linux, the name of the method for executing tasks with cron: crontab permission: All users use crontab file [-u user]-to replace the current crontab with the specified file. Crontab-[-u user]-replace the current crontab with the standard input.
Linux system security and Optimization Configuration 1. openssh Security Configuration this section focuses on SSH-related security configuration 1.1. prohibit the root user from logging on only to normal users, and then switch to the root user
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.