Use the which and Whereis commands in Linux to locate and locate files

which Find a file in an environment variable -A finds all content, not the first file -n Specifies a filename length that must be greater than or equal to the longest file name in all files. -p is the same as-n parameter, but here includes

Tutorial on Basic use of UNIQ commands in Linux systems

uniq [Options] File Description: This command reads the input file and compares the adjacent rows. Under normal circumstances, the second and more repeated rows will be deleted, and the row comparison is based on the sort sequence of the character

How to make a Linux grub boot on a USB disk

GNU GRUB (Grand Unified bootloader "Grub") is a multiple operating system startup program from the GNU Project. Grub is an implementation of the multiple-boot specification, which allows users to have multiple operating systems in the computer at

The process of configuring Squid Proxy server under Linux system

A simple record of squid transparent proxy server configuration Environment: VirtualBox + CentOS 6.0 + squid-3.1.4-1.el6.i686 0, check squid is installed by default, no installation of the first installation The code is as follows: [Root@slyar ~]

LINUX View hardware configuration commands

System # uname-a # View kernel/operating system/CPU information # head-n 1/etc/issue # View operating system version # cat/proc/cpuinfo # View CPU Information # hostname # View computer name # LSPCI-TV # list all PCI devices # LSUSB-TV # list

Linux uses rinetd to implement port forwarding

This article to share is a Linux under the simple and easy to use tool rinetd, to achieve port mapping/forwarding/redirection, the need for small partners can refer to. Port forwarding under Windows is typically a self-contained NAT and Porttunnel,

Summary of practical techniques for PASSWD commands in Linux systems

Let's review the basic usage of the passwd command: The Linux passwd command is used to change the user's password Grammar passwd [-K] [-l] [-u [-f]] [-d] [s] [username] Necessary parameters: -D Delete Password -F Enforcement -K updates can

Why and how to solve the Linux server after a serious failure

1. Insert the system installation CD, reboot the machine, press the DEL key when it starts, enter the CMOS, turn the boot order into the CD first, start the Linux installation program, press F5, press the hint to enter the Linux rescue carriage

The Configure option configuration parameter in Linux is detailed

Software installation in a Linux environment, it is not an easy thing to do; If you compile from the source code after the installation, of course, the matter is more complex; now the tutorials for installing a variety of software are very common;

Six ways to get help with Linux commands

One, help Command Apply to internal commands Example: The code is as follows: # Type cd CD is a shell builtin # Help CD # type LS LS is aliased to ' LS--color=auto ' # Help LS -bash:help:no Help topics match ' ls '. Try ' help help ' or '

Method of manual shutdown of Linux system firewall

The so-called firewall refers to a combination of software and hardware devices, between the internal and external network, A protective barrier constructed on the interface between a private network and a public network. is an image of a security

A summary of the considerations for using SSH to manage VPS under Linux

The author uses the key file interactive login way to connect ssh. Therefore, the first step is to generate the SSH key file. 1, Ssh-keygen 2, then, the server's key, the public key to download down. Saved under the. ssh folder of the current user.

The implementation method of excluding one or more directories when the CP directory is under Linux

Description: / home directory with data directory, data directory with A, B, C, D, E Five directories, now copy all directories except the e directory in the data directory to the /bak directory Method One: The Terminal command

How to install RPM packages under Linux

first, the production of RPM package The process of making a rp-pppoe-3.10 column. 1. Download rp-pppoe-3.10.tar.gz [Root@localhost home]# pwd /home [Root@localhost home]# 2. Decompression # tar ZXVF rp-pppoe-3.10.tar.gz 3. #

Several ways to view disk IO overhead for Linux

How can I quickly navigate to concurrent high because of the large disk IO overhead? There are three ways to:  The first: Using CPU information in the top command to observe The CPU information that top can see is: The code is as follows: tasks:2

Ways to view the average system load through Linux commands

This article mainly introduces the Linux command to view the system average load method, for the server administrator is very useful, the need for friends can refer to the   1, the concept of the average load of Linux systems Sometimes we feel

Linux REDIRECT Command application and syntax

1. Control of standard input Syntax: The command file sends the execution results of the command to the specified file. For example: Ls-l > List writes the results of the "ls-l" command to the file list. Syntax: Command >! The file sends the

A method of fast viewing process PID in Linux system

A very simple command, pgrep, can quickly locate the PID of a process that contains a keyword; using this command, no longer use PS aux to go to which process PID Usage: Pgrep-l XXX Description -l parameter, which can display PID and process

Linux Kill command parameters and usage detailed

Linux kill command with detailed Function Description: Deletes the program or work in execution. Syntax: Kill [s ][program] or kill [-l Supplemental Note: Kill can send the specified information to the program. The preset information is sigterm (

Linux Security Introduction SSH service connection when the common problems and answers

What is SSH? The English full name of SSH is secure SHell. By using SSH, you can encrypt all transmitted data so that the man-in-the-middle attack is not possible and can prevent DNS and IP spoofing. An additional benefit is that the data being

Total Pages: 5467 1 .... 991 992 993 994 995 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.