Other methods are required to switch to a Super User in Ubuntu: www.2cto.com 1) sudo-I or su root sudo is an enhanced version of su, do something as the supervisor. You can get the root permission without a password. However, it also has many
Shared Memory settings recently used the shmget function, and found that the returned value is-1, and the perror result is Invalid argument www.2cto.com. It turned out that the shared memory value was too large, after Ubuntu is installed, the
Visual SourceSafe (VSS) is familiar to most developers.Version ControlTool. It provides basic version control functions and facilitates team collaboration. However, Visual SourceSafe (VSS) is somewhat inadequate in terms of remote control, security,
In linux, the gcc and g ++ compilers gcc and g ++ are installed on the linux server today. The following two commands are run: www.2cto.com 1 yum install gcc 2 yum install g ++ and then find that gcc can be correctly installed, but the prompt is
I usually use some common commands to add to favorites. 1. I use Xshell client to upload local files/download files. It seems like this is common. Www.2cto.com 2. scp fileNanme 10. XX:/home/username: copy the uploaded file to the specified directory.
Differences between memory buffer and cache in Linux operating system & free parameter descriptionLet's start with the Free command. Www.2cto.comCompared with top, the free command provides a more concise view of the system memory usage:$ FreeTotal
[User management] Set Password Aging method 1 www.2cto.com [plain] [root @ Rocky ~] # Cat/etc/login. defs # Password aging controls: # PASS_MAX_DAYS Maximum number of days a password may be used. # PASS_MIN_DAYS Minimum number of days allowed
1. Concepts encountered during linux installation linux is composed of kernel, Shell, file system, and linux tools. 1) All data in linux is presented as files. 2) mounting means to use a directory as the entry point and place the data in a disk
Iii. linux File System permissions and hardware and software links 2. Any device in linux is a file when the linux kernel is loaded. Files include files in windows, directories in windows, and devices in windows. 1. Significance of file permissions
Iptables configuration backup iptables configuration is quite troublesome, but you must also learn iptables configuration backup. The following describes how to do this! Firewall settings require * shield all ports * set the default SSH port to 2222
Debian and centos are configured with multiple IP addresses for a single Nic. debian and contos are bound with multiple IP addresses for a single Nic. For remote operations (such as ssh ), remember to restart the NIC | ifup eth0; otherwise, if there
Ping: unknown host solution if the ping command returns the following error, the primary possibility is that the system's DNS settings are incorrect. [Cpp] [root @ CentOS5 ~] # Ping www.sina.com.cn ping: unknown host www.sina.com.cn can be solved
Linux commands and tools 1. view the processes running in the system # ps auxw2 and netstat commands view the services monitored by the system # all valid connection information lists of netstat-ln-, this includes ESTABLISHED connections
To copy files between different users in Linux, consider the following scenario: A file.txt file is stored in the foouser home directory. copy the file to the home Directory of the bar user. Linux has strict permission restrictions on the user's
Scp in linux is short for secure copy, and scp is a secure remote file copy command based on ssh login in linux. 1. scp command usage: scp Copies files between different hosts on the network. It uses the ssh security protocol to transmit data and
The iptables command uses iptables [-t table] command [match] [-j target/jump] [-t table] to specify the rule table-t parameter, there are three built-in rule tables: nat, mangle, and filter. If no rule table is specified, the table is regarded as a
The script for counting the number of lines in the code shows someone sending a script for counting the number of lines. The python version is extremely complicated. In line with the kiss principle, I will write one: cat $ (find. -type f-name '*
Build a samba file server environment: fedora 12 i386 Server IP Address: 192.168.3.202 1 install the software package using yum network root @ ns1 ~] # Ping www. baidu. comPING www.a.shifen.com (61.135.169.125) 56 (84) bytes of data.64 bytes from 61.
./Configure: error: the HTTP rewrite module requires the PCRE library solves the problem. Sometimes, we need to install nginx separately to process a large number of download requests.The rewrite and HTTP cache errors encountered when installing
Configure ftp over TLS in proftpd. Install proftpd first and find proftpd. conf file and add the following lines TLSEngine onTLSRequired onTLSRSACertificateFile/usr/local/etc/proftpd. pemTLSRSACertificateKeyFile/usr/local/etc/proftpd.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.