Access to the server through SSH, it is inevitable to use compression, decompression, packaging, unpack, etc., this time the tar command is essential to a powerful tool. The most popular tar in Linux is though small, spite, and powerful.
The tar
The chmod command is used to change access rights for Linux system files or directories. Use it to control the access rights of files or directories. There are two ways to use this command. One is the text-setting method that contains the letters
Environment
RedHat Linux 9 + vwware 8.0 + SSH 3.2.9 + Putty 0.62
Problem
Pack compressed war, unpack war packs, and JAR commands under Linux
Solve
Pack the files in the Project_a folder into Project.war
1. Packing
JAR-XVF
Task requirements
Research and Development Department developers David and Peter belong to group A;
The Administrative department personnel Jack and Mike belong to Group B;
1, the establishment of a shared directory "/project_a", the directory
SU's usage: Switch user
The usage # SU [l] User name [] can be abbreviated or not written.
Change Password
# passwd hit the return ligatures two times new password on the line, pay attention to the complexity of the degree of
Command command
Both the exit and _EXIT functions are used to terminate the process. When the program executes to exit or _exit, the system stops all remaining operations unconditionally, clears various data structures including PCB, and terminates the operation of
Interprocess communication must be provided through the kernel channel, and there must be a way to identify a channel provided by the kernel in the process, which is identified by an open file descriptor. If several processes to communicate with
First, in order to understand the signal, start from our most familiar with the scene:
1. User input command to start a foreground process under the shell.
2. The user presses the CTRL-C, this keyboard input produces a hardware interrupt.
3. If
First, the concept of the terminal
In the UNIX system, the user obtains a shell process through the terminal login system, this terminal becomes the Shell Process Control terminal (controlling Terminal), the control terminal is the information
First, zombie process
When the child process exits, the kernel sends a SIGCHLD signal to the parent process, and the child process exits as an asynchronous event (the child process terminates at any time the parent process runs)
When a child
The following are some steps to help you set the date and time under Linux, and include a little ntpd time synchronization. The special reminder is that in the release version the limit is Red Hat series, including Fedora,centos,redflag,unbreakable
Introduction: This article discusses three main executable file formats under the Unix/linux platform: a.out (Assembler and link editor output assembler and link editor outputs), COFF (Common Object File format Common Object File format), ELF
For network interconnection engineers, it is very important to establish an Internet dynamic routing. Not only do you need to understand the concept of routing, but you must also know how to put it into practice. For now, network equipment is mainly
In many network applications, FTP (File Transfer Porotocol) has a very important position. A very important resource in the Internet is software resources. and a variety of software resources are mostly placed in the FTP server. It can be said that
Recently lazy to do operation Dimension Automation, see the marketing department colleagues in the call public platform interface, feel very interesting ~ want to try this management simple management Linux host, and push alarm information.
It is
Reprint Address: http://www.cnblogs.com/diyunpeng/archive/2009/11/11/1600886.htmlLinux has its own set of complete boot system, seize the Linux boot context, the Linux startup process will no longer mysterious.In this article, it is assumed that the
Iptables/netfilter's Network firewall
The function of the network firewall is simply to say that all incoming messages through this machine are in the local routing decision, the destination address is not the native, need to help forward to
[APUE] Process Control (lower) and apue Process Control1. Change the user ID and group ID
You can use setuid to set the actual user ID and valid user ID. You can use the setgid function to set the actual group ID and valid group ID.
# Include #
Centos7.2 install dcos1. Preface
For the container orchestration system, we mainly studied kubernetes some time ago. Now we need dcos in the lab. Therefore, we have built this system on the lab cluster. the dcos version is 1.8.6.The system used is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service