SNMP (Simple networkmanagement Protocol): Easy Network Management ProtocolThe case is listed as Linux Environment Construction ( CentOS-6 )Use Yum to install:Yum Install-y Net-snmpReview the network configuration when the installation is
Remote Login for Linux systemsThe configuration file for the SSHD service is/etc/ssh/ssh_config//can modify this profile to implement the SSHD service you want. For example, you can change the boot port to 11587.At present, the more common terminal
View file contents: Cat/etc/shadow All contentsThe cat command is all outputCat/etc/shadow-n output content and line number, empty industry outputCat/etc/shadow-b output content and line numbers, but no spaces are outputTac/tmp/cat.txt file contents
The CP command is used to copy files or directories and is one of the most commonly used commands in a Linux system. In general, the shell sets an alias, and when the file is copied at the command line, if the target file already exists, it asks
Linux CD commands can be said to be the most basic Linux command statements, the other command statements to operate, are based on the use of the CD command. Therefore, to learn the common Linux commands, the first step is to learn how to use the
View MemoryCommandThe free default is K for unitsYou can also specify M unitsOr G is the unit, this is not accurateTotal capacityHow many used are usedFree how much is left to see the second line. The first line is physical memory, plus the virtual
First, the file directory class1. Create directory: mkdir directory name2. Delete Empty directory: RmDir directory name3. Unconditional deletion of subdirectories: RM-RF directory Name4. Change the current directory: CD directory name (go to User
If this era does not have a lot of technology to open up their own source code, how (imagine the WINDOWS,IBM and other monopoly, small and medium-sized companies due to lack of money to buy copyright issues and collapse) The Linux kernel operates a
Linux boot Start program detailedWe assume that you are already familiar with the boot process of other operating systems, and understand the self-test boot steps of the hardware, starting with the boot loader for the Linux operating system (usually
http://blog.chinaunix.net/space.php?uid=20357359&do=blog&cuid=1798479Under Linux detects the network card and the network cable Connection status, uses the IOCTL to send to the socketSIOCETHTOOL命令字。 #include #include #include #include #include
Linux must command Linux to provide a large number of commands, which can be used to do a lot of work effectively, such as disk operations, file access, directory operations, process management, file permission settings and so on. Therefore, it is
The Linux mkdir command is used to create a directory of the specified name, requiring the user who created the directory to have write permissions in the current directory, and the specified directory name cannot be a directory that is already in
Deep understanding of the Linux Kernel (Third edition pdf)In-depth analysis of the Linux kernel source code tutorial PDF full VersionLinux from beginner to proficient tutorial PDF full versionLinux Rookie special data PDF full versionLinux Network
1. Install iptables FirewallIf no installation of iptables is required first, CentOS executes:Yum Install IptablesDebian/ubuntu Execution:Apt-get Install Iptables2. Clear existing iptables rulesIptables-fIptables-xIptables-z3, open the specified
First , take a look at the file's properties on time before naming touch. the following files are viewed through the stat command:[Email protected] test]# stat F1 File: ' F1 ' size:34 blocks:8 IO block:4096 regular Filedevice: fd00h/64768d inode:7275
During system maintenance, it may be necessary to review the CPU usage at any time, and to analyze the system condition according to the corresponding information. In CentOS, you can view CPU usage by using the top command. After running the top
How to Set IonCube Loaders in Ubuntu
IonCube Loaders is a PHP encryption and decryption tool with the function of accelerating page running. It can also protect your PHP code from viewing and running on unauthorized computers. To use the PHP file
Iredmail installation script analysis (iii) --- conf/global DISTRO value source and operating system judgment, iredmaildistro
When introducing the conf/global file, the author has determined the type of the operating system and assigned a value to
LNMP common 502 Bad Gateway Problems
When we configure LNMP, we always encounter 502 problems. Whether it is in the browser or using the curl command, it is easy to see "502 Bad Gateway ", so what is the cause of the error and how to solve it. I
Set the network for Linux virtual machines and implement host name ssh access
To install a virtual machine, you must set the Internet access permission to use the host name for ssh remote access control.
1. Set the hostname in linux and access the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service