Under the Linux operating system, almost all software is installed, uninstalled and managed by RPM. The RPM is all called Redhat Package Manager, which is proposed by the Redhat company to manage software packages under Linux. When Linux is
Recently because of learning needs, and then Linux installed VMware, reference to some online tutorials, here only to do the basic installation, follow-up in-depth use for each person, the benefits of such operations are:1, first installed on the
Brendan Gregg once shared the experience of a system performance problem, how to use the first 60 seconds of login to the performance of the system to do a quick tour and analysis, mainly including the following 10 tools, which is a very useful and
1. IntroductionThis article describes the function tracking procedures for TTY open, TTY read, and TTY write operations2. ExampleHere is a simple Linux TTY open and read-write process3. OpenWhen the device node/dev/ttys0 is opened, the kernel calls
Configuration of the 1.DNS server
1.1 Domain Name resolution: The client initiates a domain name request and the DNS server resolves it. Protocol://host + domain name
1.2 ip-Domain Name analysis:
(1.) by local when the Hosts file parsing
Hello everyone, I am ZYJTF lonely cloud Twilight Rain, long time no blog, today brought to you is " how to get the use of Linux commands help information "Query Internal command : Help command...?? Help is an internal command that outputs all of the
# # # #firewalld和iptables # #A firewall is a plugin on the kernelThere are two types of firewall: Firewalld and iptablesWrites data to the kernel via iptables I. FIREWALLDFirewall domain:Trusted home internal work public external DMZ block drop
534438635.1 Linux namespace and Cgroup lxcDecember 03, 2016 12:53:32Hits: 2065
Namespace: The first layer of isolation technology ensures that processes within Docker containers do not see and affect processes outside of Docker.
The key
grep, SED and awk are three very powerful file processing tools for Linux.Gerp Find, sed edit, awk analyzes and processes it based on content.Now let's find out how these three file processing tools are different (certainly different, or why there
The switching between graphical and command-line interfaces in Linux systems can be divided into two types, temporary switching and permanent switching.Temporary switching is only valid for this time after switching, the system restarts the
1,fstab File DescriptionThe Fstab file contains information about the storage device and its file system on your computer. It is a file that determines how a hard disk (partition) is used or integrated into the entire system. Specifically: Using
1,apt-get commandApt-get is a Debian,ubuntu release package management tool, very similar to the Yum tool in Red Hat, for the Deb package managed operating system, which is used to automatically search, install, upgrade, uninstall software or
One. To view the system Pam version:[Email protected] ~]# Rpm-qa | grep pampam-1.1.1-4.el6.x86_64Two. Download the corresponding version of the PAM modulehttp://www.linux-pam.org/library/Three. Unzip & Modify PAM_UNIX_AUTH.C fileTAR-XZVF linux-pam-1.
Basic SELinux Security ConceptsSELINUX (Security-enhanced Linux) is an additional mechanism to protect your system's security.SELinux (security-enhanced Linux) is the United States National Security Agency (NSA) implementation of mandatory access
Sar-n Dev #查看当天从零点到当前时间的网卡流量信息sar-n Dev 1 #每秒显示一次, showing 10 times sar-n dev-f/var/log/sa/saxx #查看xx日的网卡流量历史sar-Q #查看历史负载sar -B #查看磁盘读写1, view network card historical traffic focus#sar-N DEVIFACE indicates the device name rxpck/s the number of
Nis:linux Centralized Certification ServicesIn the previous article, we resolved the configuration and use of services for NFS, and in this post we look at the configuration and use of NIS services that are used frequently with NFS. NIS (Network
Directory
Start with understanding the operating system
Operating system Introduction
Simple classification of operating systems
On Linux
About Linux
Introduction to the Birth of
First, from a question.Believe that many people play mobile phone or PC, have encountered such a situation, the installation of software more system performance is slow, but to see the CPU utilization has been lower than 10%, memory is also very
? ? After compressing files to improve data transmission efficiency, reduce transmission bandwidth, management of backup data has a very important function, so file compression decompression skills become the necessary skills. Compared to the file
1. User and user group filesIn Linux, user accounts, user passwords, user group information, and user group passwords are stored in different configuration files.In a Linux system, the user accounts created and their associated information (except
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service