which
Find a file in an environment variable
-A finds all content, not the first file
-n Specifies a filename length that must be greater than or equal to the longest file name in all files.
-p is the same as-n parameter, but here includes
uniq [Options] File
Description: This command reads the input file and compares the adjacent rows. Under normal circumstances, the second and more repeated rows will be deleted, and the row comparison is based on the sort sequence of the character
GNU GRUB (Grand Unified bootloader "Grub") is a multiple operating system startup program from the GNU Project. Grub is an implementation of the multiple-boot specification, which allows users to have multiple operating systems in the computer at
A simple record of squid transparent proxy server configuration
Environment: VirtualBox + CentOS 6.0 + squid-3.1.4-1.el6.i686
0, check squid is installed by default, no installation of the first installation
The code is as follows:
[Root@slyar ~]
System
# uname-a # View kernel/operating system/CPU information
# head-n 1/etc/issue # View operating system version
# cat/proc/cpuinfo # View CPU Information
# hostname # View computer name
# LSPCI-TV # list all PCI devices
# LSUSB-TV # list
This article to share is a Linux under the simple and easy to use tool rinetd, to achieve port mapping/forwarding/redirection, the need for small partners can refer to.
Port forwarding under Windows is typically a self-contained NAT and Porttunnel,
Let's review the basic usage of the passwd command:
The Linux passwd command is used to change the user's password
Grammar
passwd [-K] [-l] [-u [-f]] [-d] [s] [username]
Necessary parameters:
-D Delete Password
-F Enforcement
-K updates can
1. Insert the system installation CD, reboot the machine, press the DEL key when it starts, enter the CMOS, turn the boot order into the CD first, start the Linux installation program, press F5, press the hint to enter the Linux rescue carriage
Software installation in a Linux environment, it is not an easy thing to do; If you compile from the source code after the installation, of course, the matter is more complex; now the tutorials for installing a variety of software are very common;
One, help Command
Apply to internal commands
Example:
The code is as follows:
# Type cd
CD is a shell builtin
# Help CD
# type LS
LS is aliased to ' LS--color=auto '
# Help LS
-bash:help:no Help topics match ' ls '. Try ' help help ' or '
The so-called firewall refers to a combination of software and hardware devices, between the internal and external network, A protective barrier constructed on the interface between a private network and a public network. is an image of a security
The author uses the key file interactive login way to connect ssh. Therefore, the first step is to generate the SSH key file.
1, Ssh-keygen
2, then, the server's key, the public key to download down. Saved under the. ssh folder of the current user.
Description: / home directory with data directory, data directory with A, B, C, D, E Five directories, now copy all directories except the e directory in the data directory to the /bak directory Method One: The Terminal command
first, the production of RPM package
The process of making a rp-pppoe-3.10 column.
1. Download rp-pppoe-3.10.tar.gz
[Root@localhost home]# pwd
/home
[Root@localhost home]#
2. Decompression
# tar ZXVF rp-pppoe-3.10.tar.gz
3.
#
How can I quickly navigate to concurrent high because of the large disk IO overhead? There are three ways to:
The first: Using CPU information in the top command to observe
The CPU information that top can see is:
The code is as follows:
tasks:2
This article mainly introduces the Linux command to view the system average load method, for the server administrator is very useful, the need for friends can refer to the
1, the concept of the average load of Linux systems
Sometimes we feel
1. Control of standard input
Syntax: The command file sends the execution results of the command to the specified file.
For example:
Ls-l > List writes the results of the "ls-l" command to the file list.
Syntax: Command >! The file sends the
A very simple command, pgrep, can quickly locate the PID of a process that contains a keyword; using this command, no longer use PS aux to go to which process PID
Usage:
Pgrep-l XXX
Description
-l parameter, which can display PID and process
Linux kill command with detailed
Function Description: Deletes the program or work in execution.
Syntax: Kill [s ][program] or kill [-l
Supplemental Note: Kill can send the specified information to the program. The preset information is sigterm (
What is SSH?
The English full name of SSH is secure SHell. By using SSH, you can encrypt all transmitted data so that the man-in-the-middle attack is not possible and can prevent DNS and IP spoofing. An additional benefit is that the data being
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service