Detailed operation commands for CentOS user, group permissions, add delete user, etc.
The 1.Linux operating system is a multi-user multitasking operating system, including user accounts and group accounts, user accounts (ordinary user account,
1.Linux operating system is multi-user multitasking operating system, including user accounts and group accounts of two
Segment user account (ordinary user account, Super User account) in addition to the user account for a group account is a set of
Idea: Uninstall Redhat with yum, then download the CentOS yum, install and modify the configuration file1 , first to Http://mirrors.163.com/centos Download Packagex86 Address: http://mirrors.163.com/centos/6/os/i386/Packages/x86_64 Address:
CentOS common file operation commands and centos commandsSummary of common CentOS file operation commands
I can say that I am a newbie in linux, and I often forget some commands, especially some operations on files. I often need to read the previous
This knowledge point, blurred for a long time.In production, the habit is as follows:Useradd, the default is to add a new user to the user group with the same name. For example, Useradd zhouls, after this command is executed, is added to the Zhouls
In production, the habit is as follows:Useradd, the default is to add a new user to the user group with the same name. For example, Useradd zhouls, after this command is executed, is added to the Zhouls user group with the same name by
Common centos commands are frequently used in our use. Therefore, we have thoroughly organized some frequently-used and important centos commands. The following describes common centos commands. I: use common centos commands to view CPU
One, LINUX (ubuntu/centos) Users add delete Modify 1, build users:[Plain]View PlainCopy
AddUser Web//New Web user
Useradd web-m #添加web Users
passwd Web//Set password for Web users
Useradd web-g Admin-n-m//Create a new Web
Generally, you can log on as the root user to configure the system as Administrator by executing the "Su-" command and entering the correct root password. However, in order to further enhance the security of the system, it is necessary to establish
In general, a typical user can log on to the system administrator-level configuration by performing the "Su-" command and entering the correct root password for the root user. However, in order to further enhance the security of the system, it is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.