In this chapter we will combat how to use Geth, how to build the private network of the etheric square.
Previously said Geth is one of three tools to achieve the Ethernet square agreement, because Geth is officially respected and personal energy is limited, for the other two tools to build a private network, please refer to the online data.The following geth, implemented on a MacBook, is similar to Windows.
File/modify file Mtime and Atime (YYMMDDHHMM), CTime for current time
Umask
Umask Default Creation permissions (lost permission values)
Umask 022 Modify default Create permission to Rwxr-xr-x
Lsattr
lsattr XXX List Hidden properties
Chattr
Chattr +s Add hidden properties each time the modification will automatically sync
Chattr-a minus hidden properties can only be added cannot be deleted cannot be modified by the root dedicated
Chattr =i Se
database to find files, so it's fairly fast . The Linux operating system records all the file information in a database file, and the Whereis and locate commands are used to locate the file using this database file. Although this approach is fairly fast, the database file update is not real-time (different distribution, CentOS updates the data file once a day), so when you use the Whereis or locate command to find a file You may have found a file that has been deleted, or the newly created file
Format
Name
Description
PKCS #7
Cryptographic Message Syntax Standard
A PKCS #7 file can be used to store certificates, which is a signeddata structure without data (just). The file name extension is usually. p7b,. p7c
PKCS #8
Private-key Information Syntax Standard.
Used to carry
validation (unsuccessful or otherwise) back to the passwd program. NBSP;6.PASSWD the next action based on the return information of Pam. (ref. P437) 11. User's information transfer query:w,who,last,lastlog User talk:write,mesg,wall Write user account [user's terminal port] Write Root tty2 infomation crtl-d end input nbsp When you do not want to have a message immediately interrupted, can execute MESG N, will not receive any messages, except the root user. Vi
represent a reference to the parent class object space contained in the current object.6. What does rewriting mean? What precautions do you have?A: When the method name of a method written in a subclass is the same as the method name of a method that inherits from the parent class, the new method overrides the old inherited method.Note: (1) The subclass method overrides the parent class method and must ensure that the permission is greater than or equal to the parent class permission.(2) Note:
javascript1 and javascript3 scripts, while javascript2 cannot, so as to prevent other webpages from being tampered.
Ii. Why does selenium server exist in this form of proxy server?As mentioned above, what is the relationship between the selenium server of the same-origin policy ?? Haha, as mentioned in the previous article, selenium core is a collection of JS functions, which is the basis for browser operations. When the same-origin policy exists, some problems may occur. See:
Because the "Sou
After a private Nvadia video card driver is installed on both Windows 7 and Ubuntu systems, the shutdown screen turns into a low resolution. To pursue perfection, we recommend that you modify the resolution in the following ways: Modify the grub configuration file first, then generate grub again. cfg: Step1: sudogedit/etc/default/grub change GRUB_CMDLINE_LINUX_DEFAULT = "quietsplash" to GRUB_CMDLINE
After
" meaning, and-not is the same.
11. Find the files below/etc with a capacity greater than 1500KB and a capacity equal to 0.This is the word "and", according to the meaning of the topic to understand, should be "or" meaning, otherwise there is no more than 1500KB and equal to 0 of the document it? So here you can use the-o parameter.[Email protected] ~]# find/etc-size +1500k-o-size 0k/etc/environment/etc/selinux/targeted/modules/active/netfilter _contexts/etc/selinux/targeted/modules/active
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.