The common compressed file format under UNIX is generated by a compression tool with a high compression rate, followed by a compressed file with a. bz2 end bzip2. GZ is a compressed file in a UNIX system, the GNU version of Zip, and features like WinRAR compressed files. bz2 and. GZ are the formats for compressed files in Linux, somewhat like. zip and. rar files under Windows. &http://www.aliyun.com/zixun/aggregation/37954.h ...
Network Time Protocol (NTP) is a protocol that is used to help the Linux system clock synchronize with the exact time source. Allow all sites on the web to sync time. Divided into two categories: * 1th: The NTP site uses the clock timing. * Class 2nd: NTP sites and smaller exact time sources. (NTP sites with slightly pager accurate time sources) This practice has the advantage that at least one server becomes a local server on your network, serving other devices. (This ...
The lack of existing hard disk capacity often bothers Linux http://www.aliyun.com/zixun/aggregation/13879.html "> System administrators, The most common reason is the ever-expanding number of data and increasing numbers of users and the need to perform a large number of tasks before finding a replacement for Linux servers. This article describes how to add a hard disk to a Linux system in two ways. The first way is to move a folder from a full partition to another empty ...
Using Fedora Linux To configure RAID requires careful follow some steps. In the example of this tutorial, you will use a system to configure RAID5, whose hard disk is divided into three areas in advance. The partitions used are as follows:/DEV/HDE1/DEV/HDF2/DEV/HDG1 Please make sure that the steps listed below can be adapted to your particular environment. RAID partitions First, you have to delimit two or more partitions, each on a separate disk. If you build RAID 0 or RAID 5, each ...
The Cfgmaker program in MRTG can only create profiles on the network interface and simultaneously listen for two kinds of object identities: the uplink and downlink traffic statistics for the network card. It then determines what kind of data is recorded in the data directory based on the configuration file. Indexmaker also uses these profiles to create an overview file, or a summary View Web page that is identified by the MIB object you are listening to. The Summary View Web page displays only the daily statistics. You can choose Summary View chart to get ...
Once you've identified a value for your Linux system that you're interested in, you can register it with the Snmpwalk command. In many cases, the text file in the MIB is simply a replacement channel that refers to those "0" or "1" in the OID Directory Branch and the non-OID directory branch, where the data exists at the bottom of the leaf in extra data form. The Snmpget directive cannot be used in a directory branch that the MIB variable cannot find. In the following example, we want to find the replacement channel for the Sscpurawuser OID, but snmpg ...
In many cases, using MTRG's default configuration to monitor your server's http://www.aliyun.com/zixun/aggregation/10374.html "> network traffic is not enough. You may also want to see CPU, hard disk, and memory usage. This section describes how to find the data you want to monitor in the SNMP MIB and how to use that data to configure MRTG. The MIB is a data structure that resides in memory and refreshes the data through the SNMP process. ...
You can use Linux's graphical tools to easily monitor your system's network performance. In this article, you will learn how to use the MRTG (SNMP-based, monitoring http://www.aliyun.com/zixun/aggregation/10374.html "> Network traffic tools) and Webalizer (the tool that analyzes the site hit Ratio). Many servers, routers, and firewalls are insured in their object markers (OIDs) that they ...
To use a computer as an SSH server, you need to do the following steps. 1 login Smallfry with username filecopy. Create a subdirectory named by. SSH in your personal folder and enter the subdirectory with the CD command. [Filecopy@smallfry filecopy]# Lspublic-key.tmp[filecopy@smallfry filecopy]# mkdir. Ssh[filecopy@smallfry f ...
Recently read some Linux command line articles, in the system information to learn a lot of commands. Think of a previously written article in fact, Linux so much easier to find these system information to view the command can also be summed up a small thing to come. # CAT/PROC/MTRR View Mtrrs Memory type range Registers # uhttp://www.aliyun.com/zixun/aggregation/11696.html >name-r view current kernel ...
Telnet is a service that http://www.aliyun.com/zixun/aggregation/18736.html "> allows users to log on to your server and get a command prompt similar to the one you login to the VGA terminal." The Telnet service is installed by default in Fedora but not started. The disadvantage of Telnet is that data can only be sent in plain text. This means that other people can use the web Analytics tool to get your username and password by analyzing the packet. So ...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; In the process of using NetView, the IP address of the NetView server is sometimes modified because of the IP address reallocation or the server changing place. You can refer to the following steps: 1. Configure TCP/IP and hostname information; 2. Run/usr/o ...
KDB Getting Started Guide debugging kernel issues, it is useful to be able to track kernel execution and see its memory and data structures. This functionality is provided by the built-in kernel debugger KDB in Linux. In this article, what do you know about &http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; Use the features provided by KDB and how to install and set up KD on a Linux machine ...
Many Linux network applications do not rely on themselves to provide access restrictions or bindings to specific TCP ports; instead, they often give a large number of such tasks to a suite of programs designed for that purpose; The suite is xinetd. Fedora Linux silently installs xinetd and/etc/xinetd.conf as its primary configuration file. Luckily you don't have to edit this file frequently, so xinetd's daily job is to start and stop xinetd management programs. Control x ...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; Realize the communication between Linux and host 1.cd/etc/sysconfig/network-scripts/2.ls-a view all files in the current directory; and cat Ifcfg-eth0 view Ifcfg-eth0 content ...
Linux OS, is a computer operating system, the Linux operating system's kernel name is also "Linux." The Linux operating system is also the most famous example of http://www.aliyun.com/zixun/aggregation/29607.html "> free software and open source code development." Simply put, Linux is a set of free to use and free to spread UNIX-like operating system, it is mainly used for the Intel x86 series CPU ...
You may want to turn off the existing eth0 Ethernet card after installing the driver, add onboot=no line after the/etc/sysconfig/network-scripts/ifcfg-eth0 file, and then restart or when/etc/init.d/the network card Turn off the NIC after receptacle reboot. Select wireless mode and SSID all profiles are in the/etc/wlan directory, your server allows you to connect a total of 3 network LAN, you have to/etc/...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; The Ifconfig command makes the Linux core aware of some network interfaces such as software loopback and Nic so that Linux can use them. In addition to the usage described above, the ifconfig command is used to monitor and change the state of the network interface, and can also carry many command-line arguments. Here is a IFCO ...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; One: The Solarisroot password forgets processing method: 1, if also can use the ordinary user to log in,%df/etc, determines contains the ETC directory partition the device name%DF/ETC//dev/ds k/c0t0d0s0 ... This ...
&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; With the wide application of Linux operating system, especially the development of Linux in the embedded field, more and more people begin to devote themselves to the development of Linux kernel level. Faced with the increasingly large Linux kernel source code, developers to complete their own kernel code, will face the same problem, that is, how to ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.