:off 1:on 2:off 3:off 4:off 5:off 6:offThen execute a command to open 5 services that require self-booting:[Email protected] ~]# chkconfig--list |grep 3:off|egrep "Sshd|sysstat|crond|network|rsyslog" |awk ' {print ' Chkconfig ", $," on "} ' |bash (Turn off all self-service after starting the 5 services that require self-booting)[[email protected] ~]# chkconfig--l
I. Hardware ResourcesMemory: 1G or moreSwap space: At least 1.5G, twice times of memory requiredTemp Space: 400MLinux The temporary space is / tmpWindows The temporary space is as follows:c:\> Echo%homedrive%%homepath%\local Settings\TempHard disk space: Linux/unix needs 1.3~3.5gWindows requires 1~1.5gIi. OFA Best Flexible Architecture (directory naming)1 , Linux
1: Install the operating system. You don't need to write a tutorial. (Omitted) I personally use centos6.5 for minimal installation.
Disable firewall and SELinux after installing the system
[[Email protected] ~] # Service iptables stop // disable the Firewall Service
[[Email protected] ~] # Chkconfig iptables off // permanently disable
[[
The terminal is the window where the user interacts with the shell environment, and most of the interaction results are displayed directly to the user from the terminal, so this is the basis for the friendly display results.1. Overview of CommandsECHO is the basic Terminal output command that directly enters the input parameters and the command format is as follows:echo [options] toBeOutputDetailed description is as follows:2. Description of character
, login to console command line mode.4: The system is not used, reserved for general use, in some special cases you can use it to do some things. For example, you can switch to this mode to do some setup when your laptop's battery is running out.5: graphical mode, after landing into the graphical GUI mode or GNOME, KDE graphical interface, such as the X Window System.6: Restart mode, the default operation level can not be set to 6, otherwise it can not start normally, will always restart the pow
-uroot-p123 shutdown
2, servive mysqld stop Try to avoid using the KILL command Mysqladmin command to turn off MySQL [[email protected] bin]# mysqladmin shutdown-uroot-p123
warning:using a password on the command line interface can Be insecure. perror Command [Email protected] bin]# perror
OS error code : Permission denied The perror command is a MySQL self-command that can query the meaning of the MySQ
Tags: http using strong data art CTIIn some cases, using limit 1 in an SQL statement can improve query efficiency if you know that there is only one query result.For example, the following user table (primary key ID, mailbox, password):CREATE TABLE T_user (ID int primary KEY auto_increment,Email varchar (255),Password varchar (255));Each user's email is unique, i
error code for bash3-126: User-Customizable error codes128-255: A command quits abnormally, but exits because a signal is received, so the status return value is 128+n, where "N" indicates the number of the signal received by the command.Please refer to the following example:[Email protected] ~]# CD-A-BASH:CD:-a:invalid optioncd:usage:cd [-l|-p] [dir](the option for internal commands is wrong here)[Email p
set personalized boot entry and settings
Execute/bin/login program Enter login status
Second, the common start troubleshooting1. Encrypt grub to prevent root password from being cracked[Email protected] ~]# Grub-md5-crypt #加密grub密码Password:Retype Password:$1$yr8im$ri0etbadp9l80jb2bdxpk1[Email protected] ~]# sed-i '
Tags: perform restore man from command to intercept head about err emptying8.10 Shell Special Symbol Cut command8.10.1 Special SymbolsSymbol *: any of any charactersSymbol? : any one characterSymbol #: Comment character, which is the content after # Linux ignoresSymbol \: Escape character, which will be followed by a special symbol (for example "") reverts to normal charactersSymbols | : A pipe character that drops the result of a preceding command to a command following a symbol, usually a comm
The previous blog briefly describes the format of the Linux commands and how to get help, and the familiar use of HELP commands is an effective way to quickly master Linux command-line operations in unfamiliar situations with Linux. Now, let's take a brief look at some common commands under Linux command-line operations.How to use common commands:1.PWD: Internal commandFunction: The command displays the absolute path of the current working directory.F
Tags: mariadb database automatic backup and use of expectWhat this section says:Case 1: Automatic backup MARIADB scriptActual combat:1. Automatic backup mariadb Scriptneed to be prepared: Log on to the serverinstallation Mariadb-server Open mariadb-server[Email protected] ~]# yum-y install mariadb mariadb-serverPackage MARIADB #mariadb数据库Linux下的客户端Package MARIA
Tags: style blog color http int width1, establish test database;2, create test1 data sheet;
The Test1 table properties are as follows:
Where the ID field is set to identity increment, and the increment seed is 1;This instance is implemented starting with the first row of data, adding the last field value of each row to the second field value minus the third field value, and updating the last field value of the current row with the n
-platform, highest performance, highest security certification. Version of Qracle: 1.8i (i:internet) 2.9i 3.10g (G:grid) 4.11g 5.12C (C:cloud) Files in the Oracle root directory: db_1: Software that primarily hosts Oracle systems, including executables, network configuration files Admin: Main store trace files generated during database running Bdump: Eligibility Sub-directory DB for saving background process trace files Cdump: A crash is a kernel transfer file that the operating system process u
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.