The mkdir (make directory) command is used to create a directory. For example, to establish a datal subdirectory in the system: [Root@teacher tmp] #mkdir datal
Linux has 3 kinds of tunnels. They are: IP-in-IP tunnels, GRE tunnels, and non-kernel tunnels (such as PPTP). 1. Some comments about the tunnel tunnel can be used to implement many very unusual and interesting features. But if you have a problem with your configuration, there will be terrible mistakes. Do not point the default route to a tunneling device unless you know exactly what you are doing. Furthermore, the tunneling increases the protocol overhead because it requires an additional IP header. Generally it should be 20 bytes per packet, so if the MTU of a network is 1 ...
To move the file, use the MV command. Common options for MV include:-i-interaction. If the file you select will overwrite the existing file in the target, it will prompt you. This is a practical option because, like the-i option in CP, it gives you an opportunity to confirm the replacement of the saved file. f coercion. It goes beyond the interactive mode and moves the file without prompting. This option is dangerous unless you know what you're doing. Use this option carefully before you have confidence in your system. -v-details. Displays the progress of the file's movement. e.g.
The CP (copy) command can copy files or directories to other directories, just as the copy command in DOS is very powerful. When using the CP command, you only need to specify the source file name and destination file name or destination directory. Format: CP < SOURCE > < target >
The kernel has many parameters that can be adjusted in different environments. Typically, the default defaults can meet 99% of the environmental requirements, we don ' t call the http://www.aliyun.com/zixun/aggregation/3415.html ' >advanced HOWTO for The fun of it! There is a very interesting place:/proc/sys/net, you should see. Here in the beginning did not put all the ...
Hopefully this document will help and inspire you to better understand the linxs2.2/2.4 route. What most users do not know is that the tools you use can actually do quite a lot of work. Route and Ifconfig, for example, actually secretly invoke the very powerful Iproute 2 underlying basic functionality. What Linux can do for you a small list: • Control the bandwidth of a particular computer • Control the bandwidth to a particular computer • Help you to share bandwidth equitably • Protect your network from Dos attacks • Protect I ...
The chmod command changes the access rights of a file or directory. Let's take a look at this document first. At the shell prompt, type: LS sneakers.txt the previous command shows this file information:-rw-rw-r--1 Test test 39 March 12:04 Sneakers.txt provides a lot of detail here. You can see who can read (R) and write (w) files, and who created the file (test), the group where the owner is located (Te ...).
As explained in a section of the classification queue, the filter is categorized with the packet and placed in the corresponding child queue. These filters are called within the queue rules of the classification. Here is the classifier (part) We can use: FW determines how the packet is labeled by the firewall. If you don't want to learn TC's filter syntax, this is a shortcut. For details, see the chapter on queues. U32 based on the various fields in the packet, such as the source IP address, and so on. Route is judged by which route the packet will be routed. RSVP,...
The grep command is useful for locating a specified string in a file. For example, if you want to find every place in the Sneakers.txt file that mentions "coffee," You can type: grep coffee sneakers.txt You will see each row with "coffee" in the file.
So far we have learned how Iproute works, and have mentioned netfilter many times. Here, you can just take the opportunity to see Rusty's notoriously unreliable guide. NetFilter itself can be found here. NetFilter allows us to filter packets or tamper with the packet header. A special feature is that we can put a digital tag on the packet. You can use the--set-mark mechanism. For example, this command has all the packets sent to 25/TCP (outgoing mail) ...
This is the rookie must be 96 kinds of Linux operating skills of the next chapter, if you do not understand the content of the next article, you can click on the "rookie must have 96 Linux operating skills (on)" link to view! 51. display file type use command file to let you know whether a file is an elf-formatted executable, a shell script file, or any other format. File filehttp://www.aliyun.com/zixun/aggregation/11696 ...
The opposite of the head command is the tail command. With the tail command, you can view the 10 lines at the end of the file. This helps you view the last ten lines of the log file to read important system messages. You can also use tail to observe the process of updating log files. With the-f option, tail automatically displays new messages from the open file to the screen in real time. For example, to instantly observe/var/log/messages changes, type the following command at the shell prompt as root: tail ...
There are several ways to achieve this function. One of the simplest and most straightforward methods is "TEQL"-True (or "normal") link equalization. Like most things done with queues, http://www.aliyun.com/zixun/aggregation/13996.html "> Load balancing needs to be implemented in both directions." Both ends of the link must be involved to have a complete effect. Imagine the following: A and B are routers, and we certainly assume that they are all Linux machines. If you send from Network 1 to ...
Today, the editor of the Wind network for Linux rookie to bring 96 kinds of practical operation of Linux, the necessary skills, hard to learn, you can make Linux rookie also mastered some must kill skills! For details, let's look down. 1. View man file ... Nroff-man man/libnet.3 | Pager Sometimes the man file is not in the system directory. This is the way to view the nonstandard man file 2. Run the program as a different user ... su-userhttp://www ...
You can use the Head command to see the beginning of a file. This command is: Head <filehttp://www.aliyun.com/zixun/aggregation/11696.html ' >name> Head is a useful command, but since it is limited to the first few lines of the file, You can't see how long the file actually is. By default, you can only read the first 10 lines of the file. You can change the number of rows to display by specifying a number option ...
Now, when I figure it out, I'm really surprised. Linux 2.2/2.4 can manage bandwidth as well as the highest-end dedicated bandwidth management systems. Even better than frame Relay and ATM. To avoid conceptual clutter, TC uses the following rules to describe bandwidth: mbps = http://www.aliyun.com/zixun/aggregation/12560.html ">1024 kbps = 1024 * 1024 bps = ...
The clear command clears the terminal window. Cat is a shorthand for concatenate (chain), meaning merging files. This command can display the contents of a file (often used with more), or combine multiple files into one file.
Multicast-howto is already very old (relatively), and inaccurate and even mistaken for 21136.html "> Reader. Before you start multicast routing, you need to reconfigure your Linux kernel to support the type of multicast routing you want to implement. This step requires you to decide what type of multicast route to use. There are basically four kinds: DVMRP (multicast version of the RIP Unicast Protocol), MOSPF (similarly, just OSPF), PIM ("Pr ...").
Sometimes you know that a file or directory exists, but you don't know where to find it. You can use the Locate command to search for files or directories. Using the Locate command, you will see each directory or file that includes the search criteria. For example, if you want to search for files with the word finger in all names, type: The Locate finger locate command uses a database to locate files and directories with the word finger in the directory name. This search result may include a name called ...
It is easy to create a file in Liunx so that there are any files that are at any time in the system, and users can delete them with the RM command. This command deletes the file or directory itself from the directory, and for the linked file, only the link is deleted and the original file remains unchanged. http://www.aliyun.com/zixun/aggregation/18137.html > options for deleting files and directories include:-i-interaction. Prompt you to confirm the deletion. This option will help you avoid accidentally deleting files ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.