Linux software installation: source code and software installation

Linux software installation: some basic concepts of source code and software installation 1. What is open source code? 1.1, the files that can be really executed on Linux are binary files, such as/usr/bin/passwd,/bin/touchshell script only calls

Connect to GIT through SSH Authentication

Connect to GIT 1 through SSH authentication. There are multiple methods for connection permission authentication to connect to the GIT server to obtain or submit information, mainly including 1. Each developer creates an account. 2. SSH public key

Soft-float Debian "wheezy"

Soft-float Debian "wheezy" [preface] The installed operating system is suitable for developers and officially states that the JVM supports the version. 2012-08-08-wheezy-armel SSH to start the configuration interface commands, including modifying

Linux tail viewing files

I believe that you are familiar with the most basic cat, more, and less methods for viewing File Content in Linux tail. What if you have special requirements: 1. if you only want to view the first five lines of the file, you can use the head command,

Program Management-ps, top, pstree, kill, killall

Program Management-ps, top, pstree, kill, killall 1. Program observation-ps commonly used: one is to view only the 'ps-l' Of Your bash program ', one is to check the programs running in all systems 'ps auxf '. Www.2cto.com [root @ www ~] # Ps-lF s

Program Execution Priority -- Priority and Nice values

Program Execution Priority-Priority and Nice value 1. Relational concept: Priority is the PRI value. The core control of this value can be changed for Nice that cannot be changed. Relationships: PRI (new) = PRI (old) + nice www.2cto.com 2. Nice

View system operation logs in linux

In linux, view the operating log of the system. The Java code 1. last www.2cto.com-a displays the host name or IP address from which to log on to the system in the last line. -D. Convert the IP address to the host name. -F specifies the record file.

Regular Expressions and file formatting in laruence Linux private house-Basic Learning

Regular Expression and file formatting Regular Expression in "laruence's Linux private house dish-basic learning": A string processing method, which processes strings in the unit of action, regular Expressions help users easily find, delete, and

Parsing of SSH password-less login configuration error in Hadoop cluster Construction

Parsing of SSH password-less login configuration error in Hadoop cluster ConstructionSome netizens said that the firewall needs to be closed before configuring ssh. I did it, but it should be okay to close it. Disable the firewall command "sudo ufw

Add files such as *. so to svn

Svn add *. so files. When you use svn add in linux to add and upload files to svn ,*. so *. bin and other files are ignored: www.2cto.com two solutions: Method 1: each time you add a file, use the following command: svn add -- no-ignore folder

Differences between static and dynamic libraries, applications-ldconfig and ldd

Differences between the static function library and dynamic function library, applications-ldconfig and ldd 1. Differences between the static and dynamic functions library: a. Static function library: Sub-file name. a is to include the entire

Shut down and restart the Linux System

Shutting down a Linux system is different from restarting a desktop system. As a server, we rarely restart a Linux system. However, in the following cases, we will restart the system: www.2cto.com changing the hardware to change the system

Common vim commands in linux

Common vim commands in linux★Command mode: www.2cto.com move the cursor h or move the cursor to the left direction key (Direction) → move the cursor to the left a character j or backward (direction) → move the cursor down to a character k or forward

Activation of GPRS-PDP context (external protocol stack)

GPRS-PDP context activation process (external protocol stack) GPRS-PDP context activation process www.2cto.com GPRS wireless data transmission terminal using the network to achieve full duplex data communication with the host computer. The terminal

Remote Automatic deployment

The following section describes the scripts used after automatic Jenkins Compilation: add to Build-> Execute Shell, [plain] sshpass-p pwd ssh-t root@192.168.1.55 'service my_web stop' sshpass-p pwd scp bin/my_web root@192.168.1.55:

Add sudo permission

In linux, general users must use commands that require special permissions, but do not want to disclose the password of the root user. Therefore, with sudo, users are allocated with some specific commands or software that can run with root

Linux tools notes

Linux tools Notes 1. ubuntu Input Method Problems. Problem description: Environment: ubuntu 10.4 is installed on XP VMWare. the user's graphical logon screen can work on the keyboard. However, after entering the desktop, the key value of the

Set boot auto-start items in ubuntu

Set the boot auto-start item in ubuntu. You can use some gadgets to manage the startup options of Ubuntu: tool rcconf: # sudo apt-get rcconf # sudo apt-get install rcconfroot. Run the following command: # sudo rcconf: sysv-rc-conf # sudo apt-get

How to Use cron for scheduled task execution in linux

In linux, the name of the method for executing tasks with cron: crontab permission: All users use crontab file [-u user]-to replace the current crontab with the specified file. Crontab-[-u user]-replace the current crontab with the standard input.

Linux system security and Optimized Configuration

Linux system security and Optimization Configuration 1. openssh Security Configuration this section focuses on SSH-related security configuration 1.1. prohibit the root user from logging on only to normal users, and then switch to the root user

Total Pages: 5467 1 .... 5440 5441 5442 5443 5444 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.