I. Oracle 11g R2 self-booting1. Modify the/etc/sysconfig/oracle file:Oracle_base=/oracle//Here instead of the Oracle directory you installedStart_oracle_db= "No" to "no" instead of "yes"Start_oracle_db_listener= "No" to "no" instead of "yes"2.
[Badblocks]Badblocks disk Bad Check tool, can actually use mke2fs-c to replace this command-S shows progress on the screen-V can see the text message progress on the screen-W is tested in write mode. (This parameter is not recommended when you see
Write in front:1, "You must know about the Linux file directory operation of the 12 common commands" is the landlord collected on the Linux file directory operations most commonly used commands, including the file or directory of new, copy, move,
Compression and decompression tools commonly used in Linux systems:Compression: An operation that takes time to change space;Implementation of compression: Tag + ReplaceCompression ratio: The ratio of a file to the size of a file after the compress
Linux Namespace&bridge Popular Romance Linux interface typeBR0 eth0: an interfaceVeth: A pair of interfaces, similar to a network cable, one end has an address, the other end connected to another,Linux 2 namespace connectivityThe different namespace
Today the discovery server on the Tomcat 8080 port does not come, the old prompt port has been occupied.Use the command:Ps-aux | grep TomcatA tomcat process with no 8080 ports found.Use command: NETSTAT–APNView all process and port usage. Discover
Single-User mode1. Restart, in the following interface options, press EPress E to enter this Grub interface (boot tool)2. Locate the linux16, change the ' ro ' (read-only) to ' RW ' (read-write), and add init=/sysroot/bin/shPress Ctrl+x to start
Executes. sh script in Linux, exception/bin/sh^m:bad interpreter:no such file or directory. This is caused by different system encoding formats: the. sh file that is edited in the Windows system may have invisible characters, so the above exception
1.9.1 do snapshots, snapshots can be in your experiment when the failure is to revert to your original location, the snapshot of the space is relatively small can often do. Click the right mouse button = snapshot > Take snapshotGive the snapshot a
? security-enhanced Linux-----Equivalent to a security– The NSA National Security Agency led development, a set of enhanced Linux systemsFull-force access control system– integrated into the Linux kernel (2.6 and above) running–RHEL7 based on
Operation on the real machine, restoring the environment[[Email protected] Desktop]# rht-vmctl Reset Classroom[[Email protected] Desktop]# rht-vmctl Reset Server[[Email protected] Desktop]# rht-vmctl Reset DesktopConfigure the following static
I. Updating the system1.1 Add Update Source Address[Email protected]:~# vi/etc/apt/sources.listAdd the update source address at the end of the file and enter : Wq SaveDeb Http://mirrors.ustc.edu.cn/kali kali-rolling main Non-free contribDEB-SRC Http:
The VisualVM is an all-in-one performance monitoring and failure analysis tool from the JDK, including CPU usage, JVM heap memory consumption, real-time monitoring of threads, class loading, memory dump file analysis, and visual analysis of garbage
The first step is to set up IP-related information for Linux. Using Setup to enter the IP settings interface, select Device configuration IP in the following interface, in the settings IP interface use DHCP in the * Change to space, other IP normal
The 17th Chapter equipment and module one, equipment type? In addition to the above 3 typical devices, in fact, there are some other types of equipment in Linux, which see more should be considered "pseudo-device." The so-called "pseudo-device", is
I. Public Web siteWe can collect information about the target domain through the public Web site so that we do not have to send data directly to the target network, thus avoiding making the target aware of our actions.Self-Baidu, no longer
Two virtual machines, all to be detected1. is yum available2. Firewall default zone modified to trusted3. Whether the IP address is configured####################################################Samba file Share (shared folder)? Samba Software
If you want to know what your server is doing, you need to know some basic commands, and once you've mastered these commands, you're a professional Linux system administrator.Some Linux distributions provide GUI programs to Monitor the system, for
Embedded System watchdog implementation, embedded system watchdog
The work of the embedded system is often affected by external electromagnetic fields, causing the program to run and run into an endless loop. the normal operation of the program is
The simplest DHCP Service and the simplest DHCP Service
In the past few days, you have prepared to install the linux operating system on the network. Finally, we decided to use pxe + kickstart. After the principles and solutions are completed, the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service