Find some common examples of some commonly used parameters and some specific usage and considerations.
1. Use the name option:
The file name option is the most commonly used option for the Find command, either by using this option alone or with
Environment: Ubuntu 12.04 Server.
sudo permission assignments are managed using Visudo. Examples are available under/usr/share/doc/sudo/examples/sample.sudoers. Baidu Encyclopedia has a detailed introduction of sudo and the use of Visudo
We run the following command to see a list of the Linux supported signals:
$ kill-l1) Sighup 2) SIGINT 3) sigquit 4) Sigill 5) Sigtra P 6 SIGABRT 7) Sigbus 8) SIGFPE 9) SIGKILL &N Bsp 10) SIGUSR1 11)
Ifconfig eth0 192.168.1.102 netmask 255.255.255.0//Add IP Address
Route add default GW 192.168.1.1//Add Gateway
Start in effect:
Vim/etc/sysconfig/network-scripts/ifcfg-eth0//(Some versions may not have vim this editor such as CentOS, you may
methods for using the Assert function under Linux systems.
The steps are as follows:
The stereotype of an Assert macro is defined in "Assert.h", which terminates the execution of a program if its condition returns an error, and the
First install the vsftpd-2.0.1-5.i386.rpm on the first CD in the Linux Enterprise Edition
#rpm –ivh/media/cdrom/redhat/rpms/vsftpd-3.0.1-5.i386.rpm
Start the VSFTPD service
#service vsftpd Start
Refreshing the firewall
#iptables-F
Such a
I. Preamble
Now many web sites have strict restrictions on the access rights of users, users need to give "username/password" to confirm their identity when accessing certain resources.
Currently, the most common authentication method is to use
"Guide" This article focuses on installing a Web server--apache with proxy and override rule features on the corporate firewall, as well as concrete steps for compiling and setting up Apache. After a successful installation, flexible virtual host
Now, if you buy a computer pre-installed with Windows, it's usually Windows8 or Windows8.1. Starting with WINDOWS8, Microsoft replaced the BIOS with UEFI. Although UEFI was not invented by Microsoft, it already existed before Windows8. For example,
View the file systems supported by the current kernel system under Linux:
Typically included in the/lib/modules/kernl-version/kernel/fs/directory are file systems supported by the current kernel version:
ls/lib/modules/kernl-version/kernel/fs/
eg
Linux system monitoring has the following commands:
Uptime: Display system load condition
Mpstat: Show CPU performance
Free: Displaying memory usage
Vmstat: Displaying virtual memory usage
Iostat: Show System I/O activity
Netstat: Displays the
A bare device is a special character device that is not formatted with a partition or disk, also known as a bare partition (the original partition), and is not read by UNIX through the file system. It is the responsibility of the application to read
Why Linux log servers are installed:
As we all know, Linux is a perfect log system operating system. When the system administrator is running the maintenance server, it is unavoidable to view the log file, when the server is wrong, the error is not
In a Linux environment, a widely popular bind server is provided, which is the most common server software for building DNS servers. Introduction to the installation of bind now a lot of articles, now we will talk about the maintenance of the topic.
The security of the server has always been the primary consideration of the site. There are a variety of solutions for security. Linux Server firewall, the most commonly used to the number of iptables firewall. Iptables is commonly used in Linux
First, what is a document
Before we talk about file operations, we first need to know what files are. You may feel ridiculous to see this problem, because the file is the simplest concept for someone who has used a computer, for example, a text is
Whether you're a regular Linux desktop user or a system administrator who manages multiple servers, you're faced with the same problem: a growing variety of threats. Linux is an open system that can find a lot of off-the-shelf programs and tools on
To test the iSCSI service is normal
[Root@focusbackup ~]# service iSCSI Restart
Stop iSCSI: [OK]
[Root@focusbackup ~]# Chkconfig iSCSI on
[Root@focusbackup ~]# iscsiadm-m discovery-t sendtargets-p 10.5.83.131
Starting iscsid: [OK]
10.5.83.131:3
First, the working principle of OpenVPN
VPN technology establishes a private tunnel on the public network through key exchange, encapsulation, authentication and encryption, which guarantees the integrity, privacy and effectiveness of the
FastCGI and PHP, FastCGIPHPWhat is CGI?
CGI is short for "Common Gateway Interface". It is a tool used for communication between HTTP servers and program services on other machines. CGI programs must run on network servers.
The main disadvantage of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service