After you have installed the website service management system wdcp, you may have questions like this or that during use. Below are some points for you to learn. If you do not know anything, go to the wdlinux forum to find related tutorials.1Some
Linux Process Management, common signals between process processes 1 SIGHUP if the process is terminated, then the process 2 SIGINT will be hung up from the keyboard ctrl-c interrupt process 9 SIGKILL force terminate process 15 SIGTERM normal
The simple split text script was called by the teacher today to help me. A file is too large to be split. Leave a backup here. 01 #! /Usr/bin/perl-w02use strict; 03use warnings; 04 # split text file 05 # You can create folders 06 # csv07 08my $ csv =
Assume/var/log/. log is the log file of a program. Its content is: 18:12:17, 788 INFO [com. kmsocial. search. websearch. weiboPool: 229]-Weibo pool running! A script is required. If no new log is generated more than 2 minutes, the mail is sent to
[Linux] One of the Shell Study Notes-install and prepare the system version: CentOS 6.4 how to open the command window: application, system tools, how to obtain the root permission: Under the terminal, enter su and then enter the password (the
Linux auto-Start Service 1. put the startup command in/etc/rc. local, EDIT:/etc/rc. the local file is as follows: you can add a direct service startup or add a SHELL script bash/etc/init. d/webstart start bash/etc/init. all programs running above
In Linux, the difference between which, whereis, locate, and find is that we often look for a file or command in linux, but do not know where it is, you can use the following commands to search. Which view the location of the executable file whereis
Using putty to log on to Linux putty with a certificate is a small and free remote connection tool in windows, which is favored by administrators. However, putty cannot record passwords, which makes many people feel uncomfortable. Of course, there
Linux nc command Function Description: powerful network tool Syntax: nc [-hlnruz] [-g ] [-G ] [-I ] [-o ] [-p ] [-s ] [-v...] [-w ] [host name] [communication port...] parameter quantity:-g sets the router hop communication gateway. You can set up
/Etc/passwd &/etc/shadow details 1. the passwd file is stored in the/etc directory. This file stores information about all user accounts, including the user name and password. Therefore, it is critical to the system. Run the following command to
Introduction to pmap in Linux 1. Introduction to pmap (1) Name: pmap-report memory map of a process (view the memory image information of a process) (2) usage pmap [-x |-d] [-q] pids... pmap-V (3) Option meaning-x extended Show the extended format.
In linux, adjusting the priority of a process determines whether the process is preferentially processed by resources allocated by the cpu. When the cpu resources are sufficient, every running process can be allocated enough resources for processing.
Varnishadm simple cache cleanup settingsRequirements:1. Specify the url page cache to be cleared immediately2. Specify the url list and clear it every 5 minutes.Environment: ubuntu server 64-bit 13.04For requirement 2, use shell. bash shell is used
Git uses ssh to manage user permissions on ubuntu: $ ssh-keygen Generating public/private rsa key pair. enter file in which to save the key (/home/djy /. ssh/id_rsa): (Press enter to generate the default file/home/djy /. ssh/id_rsa) to generate the
A bit of detail about FS in awkWhen learning objective awk Program. Although shell is a conventional weapon at work, it is not very familiar with the use of shell, so I cannot understand it deeply, or record what I did not notice, after all, each
Precautions for Linux installation and system initialization precautions for Linux installation 1. partition learning purpose:/boot: 200 M/swap: 1 to 2 times of memory/: allocate size as needed. For example, the total space in a virtual machine is 15
Ubuntu12.04 start the root user and set the root password in either of the following ways: 1 sudo passwd root and then enter the new password twice. However, I encountered a new system. After reboot, the system prompts a wrong password upon Logon:
Vim converts the end-to-end format of a file to the end of a line in a different system. Sometimes we write scripts in a windows system or a unix system, and then replace different system Scripts may become invalid. For example, if a python script
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.