Linux Base command (MB) gzip command

Reducing file size has two obvious benefits, one is to reduce storage space, and the other is to transfer files over the network, you can reduce the transmission time. Gzip is a regular use of Linux in the file compression and decompression of the

Linux Base command (1) LS command

The LS command is the most commonly used command under Linux. ls command is the abbreviation of List  save LS used to print out the list of the current directory  if LS specifies a different directory  then the list of files and folders in the

Problem with the sudoers file when using sudo command under Linux

Environment: VirtualBox4.1 + RedHat Linux 6 Question: When using the sudo command prompt "xxx is isn't in" Sudoers file. This incident'll bereported. where xxx is your username, which means your username does not have permission to use sudo command.

Linux+apache Implement user authentication

I. Preamble Now many web sites have strict restrictions on the access rights of users, users need to give "username/password" to confirm their identity when accessing certain resources. Currently, the most common authentication method is to use

How to install and uninstall the. Run file under Linux

the installation of the. Run file is simple, and you can perform the installation simply by adding an executable property to the file Take the VirtualBox installation file Virtualbox-3.1.6-59338-linux_x86.run as an example, just enter the command:

Method of detecting whether U disk is connected on Linux system

Linux file system is asynchronous, that is to write a file is not immediately saved to the media (hard disk, u disk, etc.), but stored in the buffer, and so accumulated to a certain extent and then saved to the media. Linux file system is

Basic configuration of Samba server in Linux

When the security level is user, then the user we set up on this machine must be joined to the SMB server, and the command is to add Linux users to the SMB server for smbpasswd-a users, smbpasswd username to modify the password of the user in the

The explanation of SendMail Server forwarding function under Linux

1, why can not configure the mail server for open relay? If your system administrator sets your mail server to open relay, will cause some spammers to use your mail server as a relay station for forwarding spam messages, which will cause spammers to

FTP clients in the Linux operating system

First, Introduction: Packaged in most distributions, please go to the FTP list for each major release, or you can get it on the installation disk of the distribution. Lftp is a command-line-style FTP client. Good support for Chinese. If you are in

Linux firewall configuration entry-level

RedHat Linux provides firewall protection for increased system security. Firewalls exist between your computer and your network to determine which remote users on your network have access to the resources on your computer. A properly configured

Linux Firewall program Design

Famous commercial websites such as Yahoo, EBay, CNN.com, Amazon, Buy.com and E*trade have been attacked continuously by hackers, causing a loss of 1 billion of billions of dollars, and once again sounded the alarm that the network is unsafe. As a

phpMyAdmin Installation: Linux decompression installation phpMyAdmin

Linux Decompression Installation phpMyAdmin phpMyAdmin is a MySQL management tool that directly manages MySQL from the web. Because my Apache is installed in the source code, so the root directory of the hosting page is/usr/local/apache2/htdocs. 1.

Install the graphics driver under Linux

Program {The first problem that most people encounter when installing Linux is that Linux doesn't recognize your graphics card. It is difficult to enter X Window if the graphics card is not installed correctly or a driver is selected randomly. Even

How to do not enter password SSH direct login Aliyun Linux Host

Server environment: Ali Server, Linux version-CentOS Client environment: MAC OS X Terminal In terminal with the SSH command login to the server each time to enter a password, although you can copy/paste the password, but after a period of time

Linux under Mail Notification maintenance

Enter mail in Linux and enter your inbox. D Deletes the current message, and moves the pointer down. D 3 Delete the message with the number 3. D 1-100 Deletes the number 1th to 100th message. When you exit, be aware that you must use the Q

Redhat Enterprise Linux 6 Update 4 Fast network installation on Z/VM 6.2

There are several ways to deploy Zlinux on Z/VM, and this article describes a quick way to install Redhat Enterprise Linux 6 Update 4 on Z/VM 6.2. 1 Preparation work 1.1 Basic requirements Before reading this article, you need to master the basic

Using helix to set up a video server under Linux

With the increasingly rich network applications, more and more netizens like to watch movies on the internet, listening to music. Have you ever thought of setting up a video server and sharing your own good, nice, audio-visual files? As we all know,

Introduction to Linux MRTG system monitoring

One, MRGT configuration case Description, here to monitor the card as an example #通过public监控localhost上的192.168.1.68 address Flow target[eth1_lan]:/192.168.1.68:public@localhost #图片右对齐方式 Options[eth1_lan]:growright #生成图片存放目录 directory[eth1_lan]:eth1

SecureCRT Configure SSH key to access Linux

The first step is to generate a public/private key pair Using the SECURECRT tool-> create the public key, the cryptographic algorithm chooses RSA because the RSA algorithm is selected in the sshd configuration file This step generates two files,

Linux in the tar command to use the detailed

Tar Used to package multiple files or directories into a large file 1. Pack/tmp and use BZIP2 compression [Root@localhost ~]# TAR-CJVF./tmp.tar.bz2/tmp Tar:removing leading '/' from member names /tmp/ /tmp/man.config1.gz /tmp/man.config /tmp/

Total Pages: 5467 1 .... 770 771 772 773 774 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.