Installation and uninstall of RPM commands for Linux RPM packages __linux

Under the Linux operating system, almost all software is installed, uninstalled and managed by RPM. The RPM is all called Redhat Package Manager, which is proposed by the Redhat company to manage software packages under Linux. When Linux is

Linux installation VMware

Recently because of learning needs, and then Linux installed VMware, reference to some online tutorials, here only to do the basic installation, follow-up in-depth use for each person, the benefits of such operations are:1, first installed on the

How to quickly analyze a Linux server that is having performance problems

Brendan Gregg once shared the experience of a system performance problem, how to use the first 60 seconds of login to the performance of the system to do a quick tour and analysis, mainly including the following 10 tools, which is a very useful and

Linux TTY function tracking

1. IntroductionThis article describes the function tracking procedures for TTY open, TTY read, and TTY write operations2. ExampleHere is a simple Linux TTY open and read-write process3. OpenWhen the device node/dev/ttys0 is opened, the kernel calls

Linux command detailed-DNS server configuration and management

Configuration of the 1.DNS server 1.1 Domain Name resolution: The client initiates a domain name request and the DNS server resolves it. Protocol://host + domain name 1.2 ip-Domain Name analysis: (1.) by local when the Hosts file parsing

Linux get help information for commands

Hello everyone, I am ZYJTF lonely cloud Twilight Rain, long time no blog, today brought to you is " how to get the use of Linux commands help information "Query Internal command : Help command...?? Help is an internal command that outputs all of the

Linux from getting started to mastering--firewalld and Iptables

# # # #firewalld和iptables # #A firewall is a plugin on the kernelThere are two types of firewall: Firewalld and iptablesWrites data to the kernel via iptables      I. FIREWALLDFirewall domain:Trusted home internal work public external DMZ block drop 

[Reprint]linux namespace and Cgroup Lxc

534438635.1 Linux namespace and Cgroup lxcDecember 03, 2016 12:53:32Hits: 2065 Namespace: The first layer of isolation technology ensures that processes within Docker containers do not see and affect processes outside of Docker. The key

Linux three big file processing tools (Grep/sed/awk)

grep, SED and awk are three very powerful file processing tools for Linux.Gerp Find, sed edit, awk analyzes and processes it based on content.Now let's find out how these three file processing tools are different (certainly different, or why there

Graphical interface and command line interface switching in virtual machine-linux system

The switching between graphical and command-line interfaces in Linux systems can be divided into two types, temporary switching and permanent switching.Temporary switching is only valid for this time after switching, the system restarts the

Linux Configuration Boot mount: fstab file details

1,fstab File DescriptionThe Fstab file contains information about the storage device and its file system on your computer. It is a file that determines how a hard disk (partition) is used or integrated into the entire system. Specifically: Using

Apt and dpkg command usage for Management Packs in Linux

1,apt-get commandApt-get is a Debian,ubuntu release package management tool, very similar to the Yum tool in Red Hat, for the Deb package managed operating system, which is used to automatically search, install, upgrade, uninstall software or

Linux system security Pam Backdoor installation use detailed

One. To view the system Pam version:[Email protected] ~]# Rpm-qa | grep pampam-1.1.1-4.el6.x86_64Two. Download the corresponding version of the PAM modulehttp://www.linux-pam.org/library/Three. Unzip & Modify PAM_UNIX_AUTH.C fileTAR-XZVF linux-pam-1.

Linux (Radhat) Basic Learning-Understanding SELinux

Basic SELinux Security ConceptsSELINUX (Security-enhanced Linux) is an additional mechanism to protect your system's security.SELinux (security-enhanced Linux) is the United States National Security Agency (NSA) implementation of mandatory access

Linux Base--sar View network card traffic

Sar-n Dev #查看当天从零点到当前时间的网卡流量信息sar-n Dev 1 #每秒显示一次, showing 10 times sar-n dev-f/var/log/sa/saxx #查看xx日的网卡流量历史sar-Q #查看历史负载sar -B #查看磁盘读写1, view network card historical traffic focus#sar-N DEVIFACE indicates the device name rxpck/s the number of

NIS service setup for Linux

Nis:linux Centralized Certification ServicesIn the previous article, we resolved the configuration and use of services for NFS, and in this post we look at the configuration and use of NIS services that are used frequently with NFS. NIS (Network

Backend Prerequisites for Linux knowledge

Directory Start with understanding the operating system Operating system Introduction Simple classification of operating systems On Linux About Linux Introduction to the Birth of

[Embedded development] Linux performance Analysis-context switching

First, from a question.Believe that many people play mobile phone or PC, have encountered such a situation, the installation of software more system performance is slow, but to see the CPU utilization has been lower than 10%, memory is also very

Linux Basic Tutorial 32-Unzip command

? ? After compressing files to improve data transmission efficiency, reduce transmission bandwidth, management of backup data has a very important function, so file compression decompression skills become the necessary skills. Compared to the file

Detailed to no friend, a article to help you clear Linux user and user group relationship ~

1. User and user group filesIn Linux, user accounts, user passwords, user group information, and user group passwords are stored in different configuration files.In a Linux system, the user accounts created and their associated information (except

Total Pages: 5467 1 .... 816 817 818 819 820 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.