With the development of Linux open source system platform, more and more open-source software can be provided to linuxhttp://www.aliyun.com/zixun/aggregation/6579.html "> users, so as to make more files" Devouring "The hard disk space. As an excellent open source operating system, how to efficiently manage the software in the system is a very important problem. Therefore, Linux provides a variety of methods, users can easily manage the software according to the actual situation. Be more than ...
The personal comparison recommends ReiserFS, the speed is fast, the effective space is big, ext3 also can, but the relative waste hard disk space. In addition, there are JFS, XFS and so on. Ext2 is not recommended, because there is no log file, accidental power loss will not be able to recover data. The following is a brief description of each partition: ReiserFS is a new file system that accommodates data, including file data, file names, and log support, in a unique way-a completely balanced tree structure. ReiserFS also supports massive disks and http://www.al ...
By default, the root user cannot connect to the Linux operating system in Telnet and is also unsafe. But technically, it can be achieved. There are two ways: &http://www.aliyun.com/zixun/aggregation/37954.html >nbsp; (1) #mv/etc/securetty/etc/securett ...
A hard disk has up to four primary partitions, or three primary partitions + one extended partition (contains n logical partitions). Linux can be installed in primary or logical partitions. In general, only the points/and swap two areas is sufficient, in addition, it is recommended to filesystem separate partitions, after reloading will not have to reset a lot of things. Swap is the swap partition, if the memory <=256, please set to 512MB in the partition, memory >=512MB to a 512MB is enough (if you want to sleep, I am afraid, or >= memory comparison insurance). ...
As a multi-user, multitasking operating system, Linux files are difficult to recover once they are deleted. Although the delete command is a deletion mark in the file node and does not really erase the contents of the file, other users and some processes with write-up actions will quickly overwrite the data. However, for home stand-alone Linux, or mistakenly deleted files after timely remediation, or can be restored. 1. A brief introduction to EXT2 file system architecture in the Ext2 file system used by Linux, files are stored in block units, by default ...
A directory is a special file of Linux system organization files. To enable users to better use the catalog, we introduce some basic concepts about the catalog. Working directory and user home directory logically, users are in a directory every moment after they log on to the Linux system, which is called the working directory or the current directory (sharable directory). The working directory can be changed at any time. When a user initially logs on to the system, its home directory becomes its working directory. Working directory with "....
The majority of Linux's 802.11a/b required toolkit has been installed by default, and its main advantage is that you don't have to be like linux-http://www.aliyun.com/zixun/aggregation/29942.html ">wlan That way, reinstall the kernel every time it is upgraded. After installing Linux compatible NICs, you need to configure your NIC's IP and wireless settings before using wireless tools. You ...
Simply put, Linux is a set of http://www.aliyun.com/zixun/aggregation/17944.html "> free to use and freely propagated Unix-like operating systems, which are mainly used for intel-based x86 series CPU computer. This system is designed and implemented by tens of thousands of programmers around the world. The aim is to establish UNIX-compatible products that are freely available to the world without the copyright of any commercial software. Linux ...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; Number 23rd received a customer call, the Linux server can not log on, because the server is placed in China Unicom's hosting room, so can not be processed on-site. After the network detection, the server could not ping, the server network segment gateway can ping. Started thinking that the server managed room network problem, causing the server can not access, ...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; First, you should know that the letter below Windows corresponds to partition one by one. So, we used to see the C disk, D disk, and so on, often corresponds to the first partition, the second partition. Below Linux, these partitions appear in the form of devices, such as/dev/hda1/dev/hda2 ...
1. The Fstab file fstab store the file system information in the system. When the file is set correctly, you can load a file system with the "mount/directoryhttp://www.aliyun.com/zixun/aggregation/11696.html" >name command. Each file system corresponds to a separate row, and the fields in each row are separated by spaces or tab keys ...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; In the computer world, "user-friendly" refers to a very wide range, even a good network of comics called this name. But the word is a misnomer. The basic implementation sounds like a good idea: the design of the software starts with the user's ideas and needs. People always expect to achieve a "best" interface when it comes to reality, but the facts are not simple to imagine ...
This article mainly faces the new novice, does not have any high difficulty question discussion, including the double network card, the normal compilation driver also cannot use the strange network card and so on. The main purpose of this article is to tell the new novice, Linux under the network card is how to drive. This article does not discuss installing Linux, Assume that the user has successfully Linux, and so on driver network card. The first step--Don't ask Linux can install XXX card? Such a problem, Linux is an open system, with the help of countless experts on the network, almost all hardware can find support. First ...
Q: Is there any software under Linux that has no breakpoint? A: Linux is more excellent, commonly used breakpoint extension software has download 4 x and Prozilla, can be to http://www.krasu.ru/soft/chuchelo/and http://prozilla.genesys.ro/, respectively Download. Q: I used to do Windows System management, and now go to Linux some are not accustomed to the full character interface, but the company does not allow the server to upload ...
In Linux, configure redhat9+http://www.aliyun.com/zixun/aggregation/14417.html ">apache+mysql+php+gd2+perl, install the article steps, I believe you can configure your system installation environment to describe the operating system: Linux RedHat AS4.0 Web services software: Apache httpd-2.2.4 Download: http ...
As a multi-user, multitasking operating system, Linux files are difficult to recover once they are deleted. Although the delete command is a deletion mark in the file node and does not really erase the contents of the file, other users and some processes with write-up actions will quickly overwrite the data. However, for home stand-alone Linux, or mistakenly deleted files after timely remediation, or can be restored. 1. A brief introduction to EXT2 file system structure in the Ext2 file system used by Linux, files are stored in block units, by default ...
This article from the notes, not original, the source has been found, sorry. &http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; To look at the previous post of Cu, the solution to this problem is to add: for T in 1 2 3 4 5 6 7 8 ... in/etc/rc.d/rc.local.
Linux can boot Linux from a floppy disk or hard drive. When booting Linux from a floppy disk, the boot sector contains code that reads only the first hundreds of blocks of data (of course, depending on the kernel size) to a predetermined memory location. On a Linux boot floppy, there is no system and the kernel has contiguous sectors because it simplifies the boot process. After the floppy disk Boots Linux Linux is loaded, it initializes the hardware and device drivers and then runs Init. Init can start other processes to Http://www.aliyun ....
Netdump requires at least one server and any number of clients. Server configuration: 1. Verify Netdump server is installed: Rpm-q netdump-server if not installed, execute command: up2date netdump-server for installation. 2. After the server package is installed, use the command: passwd netdump to change the user's password. 3. Open the server: Chkconfig netdump-server ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.