Shutdown: Poweroff or shutdown-h now or init 0
Reboot: Reboot or Shutdown-r now or init 6
Close X-window:init 3
Start X-window:init 5 or start X
View IP Address: ifconfig
Linux kernel version: Uname-r
Basic command
1, view a port number,
The tar command in Linux
The TAR (tape archive) command is a command that is often used in Linux systems to deposit files into an archive file.
The common file extensions include:. tar.gz and. tar.bz2, respectively, to express the further
Below Yan you to introduce an article about Linode VPS Iptables encountered iptables:protocol wrong type for socket. Wrong solution, I hope the article will help you
To Linode VPS CentOS 6.4 iptables Add a rule that limits the number of IP
Common Linux file permissions:444 r--r--r--RW-------644 rw-r--r--666 rw-rw-rw-RWX------744 rwxr--r--755 Rwxr-xr-x777 RwxrwxrwxFrom left to right, 1-3 digits represent the permissions of the file owner, 4-6 digits represent the permissions of the
1, through the ISO to create a bootable U disk system.
1.0, format the U disk for FAT32 format
Linux can use the command
Mkfs.vfat u disk's device path
For example:
Mkfs.vfat/dev/sdb
where the U disk path can be viewed by command DF
1.1, the
With the continuous development of the Internet industry, a variety of monitoring tools are countless. Here is a list of the most complete monitoring tools on the Web. So you can have more than 80 ways to manage your machine. In this article, we
1. Download Firefox Adobe Flash PlayerUse the Firefox browser on Linux to access the following download URLs:https://get.adobe.com/flashplayer/Select Download ". tar.gz for Linux" and click "Download Now" as shown2, unzip the downloaded compressed
The first one is a note of the Linux video that I wrote about the Hanshunping teacher's commentary, which was originally 21. But I still did not find the 17, 18 said. But the other parts I feel and record are pretty serious. This set of video
Reprint: http://my.oschina.net/sundq/blog/203600There are two kinds of event notification methods on Linux, one is thread condition variable, one is implementing event notification with EVENTFD, and the method of implementing asynchronous queue by
Guide
One of the difficulties that new Linux users face when switching from Windows is to find a good download manager. If you are or used to be a Windows user, you may be familiar with the download manager such as Internet Download Manager
During system maintenance, it may be necessary to review the CPU usage at any time, and to analyze the system condition according to the corresponding information. In CentOS, you can view CPU usage by using the top command. After running the top
Each file or directory in Linux contains access rights that determine who can access and how to access these files and directories.By setting permissions, you can restrict access by only allowing users to access them, allowing users in a
Record system output sound on Linux with Pacat (Pulseaudio)When PulseAudio was used as the sound server of the system, there was a simple-a-to-record the output sound to file on the Command line using the Pacat-command. This short article describes
Linux Command Execution monitoring and software installation, linux Command Software InstallationMonitoring command Run time command
$ Time sleep 5 real 0m5. 003 s # End Time of the program, including the time slice occupied by other processes and
Java Web Development Environment preparation for Linux, Java Web development for linux01 Linux environment preparation(This article uses VMware12 + Ubuntu14.04 on win10)Steps:1. JDK installation and related configuration 2. Tomcat installation and
Linux getting started Tutorial: gnu c and semi-automated IDE that makes Vim C/C ++
The importance of C language in Linux is naturally unparalleled and irreplaceable. Therefore, it is impossible for me to write the Linux series without mentioning the
Anti-database theft-Web Front-end slow Encryption0x00 Preface
The world's martial arts, only fast. However, different passwords are encrypted. The faster the algorithm, the easier it is to break.
0x01 brute force cracking
Password cracking means
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.