Feature Description: Displays the module that is loaded into the system. Syntax: lsmod Additional note: Executing the lsmod instruction lists all modules that are loaded into the system. The core of the Linux operating system is modular, so when compiling the core, it is important to put all the functions into the core. You can compile these functions into separate modules and load them separately as needed.
Function Description: Turn off the user's projection password. Syntax: Pwunconv added: Execute pwunconv instruction can turn off the user projection password, it will be the password from the shadow file, back to the passwd file.
Function Description: Set core load, boot management program. Syntax: Liloconfig Supplemental NOTE: Liloconfig is a program that Slackware distributions are designed to adjust the Lilo settings. It through the interactive interface, so that users can use the keyboard keys, etc., easy to control the installation of Lilo, set the job, without having to release various parameters or write configuration files.
Function Description: Open the user's projection password. Syntax: Pwconv added: User and group passwords in Linux systems are stored in files named passwd and group, which are located in the ETC directory. Anyone can read them because of the operation of the system, creating a safety flaw. The projection password changes the password in the file to the shadow and Gshadow files under the ETC directory, only allows the System Manager to read, and replaces the original password with the "x" character, the effective strong ...
Feature Description: Set password. Syntax: passwd&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [-DKLS] [-u <-f>] [User name] Supplemental Note: The passwd directive allows the user to change his or her password, and the system administrator can use it to manage the user's password for the system. Only the manager can specify the user name, the general user can only change their password ...
Feature Description: Sets the keyboard type. Syntax: kbdconfig&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [--back] [--test] Supplemental Note: kbdconfig (Red Hat linux only Directive) is a program used to set up the keyboard, providing a graphical interface to the operation. Kbdconfig is actually modifying e ...
Function Description: Set up the system of various services. Syntax: ntsysv&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [--back] [--level < grade 5643.html >] Supplemental Note: This is the program developed by Red Hat Company under the GPL rule, it has interactive operation interface, you ...
Function Description: Load module. Syntax: insmod&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [-FKMPSVXX] [-o < module name] [Module file] [Symbol name = symbolic value] Supplemental explanation: Linux has many functions that are in the form of modules and are loaded kernel when needed. This can make ker ...
Function Description: http://www.aliyun.com/zixun/aggregation/18860.html "> Automatic processing can load modules. Syntax: modprobe [-acdlrtvv][--help][module file] [Symbol name = symbolic value] Supplemental Note: modprobe can load a specified individual module or load a dependent set of modules. Modprobe will be produced according to Depmod ...
Function Description: Turn off the group's projection password. Syntax: Grpunconv added: Execute grpunconv command to turn off the group projection password, which will store the password from the Gshadow file and back into the group file.
Function Description: Displays the information of the kernel module. Syntax: modinfo&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [-ADHPV] [Module file] Supplemental Note: modinfo Displays the kernel module's object file to display information about the module. Parameters:-A or--author display module development ...
Function Description: Open the group's projection password. Syntax: Grpconv added: The user and group passwords in the Linux system are stored in the passwd and group files in the ETC directory respectively. Anyone can read them because of the operation of the system, creating a safety flaw. The projection password changes the password within the file to the shadow and Gshadow files in the ETC directory, allowing only the system Manager to read and replace the original password with the "x" character. The function of the projection password can be turned on or off at any time ...
Function Description: Set the view box buffer. Syntax: fbset&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [-AHINSVVX] [-db < information file] [-FB < peripheral equipment Code] [--test] [Show mode] Supplemental Note: Fbset instructions can be used to set the size of the view box buffer, but also to adjust the painting ...
Feature Description: Displays the parameters of the MS-DOS file system. Syntax: </>minfo&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [-V] [Drive 5643.html > Code] Supplemental Note: minfo for Mtools tool instructions, can display MS-DOS system disk parameters, including the number of magnetic field, the number of heads ... And so on. ...
Feature Description: Sets or displays environment variables. Syntax: export&http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; [-FNP] [Variable name]=[variable set value] Supplemental NOTE: When executing a program in a shell, the shell provides a set of environment variables. Export can add, modify, or delete environment variables for use by subsequent programs. The effect of export only to this landing exercise ...
You should know how NTP is affected by your network security policy. Here are some areas of common concern. Firewalls and NTP servers use UDP's 123 destination port traffic. Unlike most UDP protocols, the source port is not a high end (over 1023). You must allow UDP source/destination port 123 on your server and straum1/217853.html "> Communication between class servers. NTP authentication is possible in situations where you not only want to limit NTP synchronization to a specified network, but also to ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.