Initial RAM Disk
The Linux initial RAM disk (INITRD) is a temporary root file system that is mounted during system boot to support two-stage boot processes. The Initrd file contains various executables and drivers that can be used to mount the
Today, when you re upgrading gcc on a new machine, the following problems occur:
# yum Install devtoolset-2-gcc devtoolset-2-binutils devtoolset-2-gcc-c++-yLoaded Plugins:fastestmirrorDetermining fastest Mirrors* Base:mirror.as24220.net*
First, look at the iptable solution.
To solve the SYN flood and DDoS and other recommended use iptable, lighter, is also iptable more good at.Looking up on the internet, Iptable's recent module can solve the problem,First look at the parameters of
The first thing to understand is two special devices:
/dev/null: Recycle Bin, bottomless pit/dev/zero: Generating charactersØ Test Disk Write ability
Time DD If=/dev/zero of=/test.dbf bs=8k count=300000
Because/dev//zero is a pseudo device that
Here's how Linux systems generate certificates through the OpenSSL command.First, execute the following command to generate a 4,096-bit key
The code is as follows
Copy Code
OpenSSL genrsa-des3-out hupohost.key 4096
For example, to find the AAA string in the ABC catalogue.
Grep-rn "AAA"/wwwroot/abc/the current directory.
-R indicates recursive lookup-n for displaying line numbers
VI How the open document displays line numbers
Set:number
Do not show line
Linux Delete file or directory command RM (remove)
Feature Description: Deletes a file or directory.
Syntax: RM [-dfirv][--help][--version][file or directory ...]Supplemental Note: Perform RM directives to delete files or directories, and if you
We already know the importance of file permissions for the security of the system, and also know the relationship between file permissions and users and user groups, then, how to modify the permissions of the file? How many file permissions can we
View processProcesses in Linux can be viewed using the PS, pstree commands.PS aux is generally used (note that there is no dash-; Although the addition does not affect execution, but will prompt), you can also use Ps-le, is to see all processes, the
Namewget-Non-interactive Web download toolGeneral overviewwget [Options] ... [URL] ...DescribeThe GNU wget is a non-interactive free tool for downloading files on the Web, supporting the HTTP,HTTPS and FTP protocols, and the way HTTP proxies are
Configure Remote DesktopPermanently turn off the fire wall.Service Iptables StopChkconfig iptables offModifying the boot kernel level# VI Etc/inittabId:5:initdefault;Modify Configure Remote Desktop#
Http://www.cnblogs.com/yanlingyin/archive/2012/04/23/2466141.htmlThere are two ways to manipulate files under Linux: System call and library function call (library functions). can refer to "Linux Programming" (the original English version of
automatically restarts tomcat after monitoring tomcat down on Linux
First step edit:monitor.sh file (file contents see below)
Step Two install crontab (see below for installation steps)
The third step is to add a timed task: CRONTAB-
Less View File contents1 , command formatLess [options] file ... 2 command function linux less commands are used primarily to browse the contents of a file, and more command is similar in usage, unlike more command, less
Install jenkins on centos
1. Install JDK 7
1.1 download JDK7
You may not be able to directly use wget for download. You can use thunder for download.
Http://download.oracle.com/otn-pub/Java/jdk/7/jdk-7-linux-i586.tar.gz
Copy to directory/usr/local1.
Difference between redis and memcachedGuideBoth Redis and Memcache are memory-based data storage systems. Memcached is a high-performance distributed memory cache service; Redis is an open-source key-value storage system. Similar to Memcached, Redis
In-depth analysis of differences between Linux and WindowsBefore getting started with Linux, should we first get started with windows? However, when we get familiar with Linux and get used to linux management and usage, we will go back and use
Reason for dual-boot Linux?One of the most important components of a computer is the operating system. In fact, a powerful operating system should have software compatibility and be able to smoothly implement interaction between hardware and
Wireshark related tips, wireshark relatedThe Packet size limited during capture prompt indicates that the marked packages are not fully captured. In some operating systems, only 96 bytes are captured by default, the "-s" parameter in tcpdump can be
This site has been missing a similar tutorial. I will add it today. Rsync is a remote data synchronization tool. You can refer to the previous article Rsync remote data synchronization commands in linux and how to use them. however, after the data
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service