What is the difference between Linux 775 and 777 permissions who give an example
Reply to discussion (solution)
Read permission R = 4Write Permission W = 2Execute Permissions x = 1775 these three digits represent the rights of the owner,
Introduction of Nagios
Nagios is an open source computer system and network monitoring tool, can effectively monitor Windows, Linux and UNIX host State, switch routers and other network settings, printers and so on. When the system or service
Source: chinaunix blog Date: 2006.08.28
GNU cross tool chain (ARM-Linux-GCC 3.4.4)Modified by litroncn (Litroncn@163.com)Based on Sunhe (msunhe@gmail.com)
1. Working users and environments in Linux1.1 Software EnvironmentLinux Ubuntu 6.06
After a long time studying Linux SNMP, you may encounter a Linux SNMP problem. Here we will introduce how to solve the Linux SNMP problem RRD database update instance.
In Quick Start 1), we have introduced the update command: it uses one or more
Oracle11g RAC construction in linux (III)2. Configure the installation environment (node1 and node2) to create a group, user, directory, and modify permissions (node1 and node2) to create a group, user, and initial password on node1.
Create a group:
Maintaining the longest normal system running time is increasingly important for the on-demand computing success. Unfortunately, many off-the-shelf high availability (HA) solutions are expensive and require specialized technologies. Five articles in
1.http://www.kernel.org,linux Kernel (source code) download2.http://www.oldlinux.org/index_cn.html,"Linux kernel 0.11 (0.95) Full comment"3. List of books:101-In-depth understanding of the Linux Kernel (third edition English version)-1030 pages. PDF
Chapter 6 file and File System
There are five file types in LINUX:
Normal File
"
Character Device File
Block Device Files
Symbolic Link fileFile
Refer to the file for ls commands
-A lists all files in the directory, including hidden files starting. /
Linux samba source code installation (non-RPM package)-Linux general technology-Linux technology and application information, the following is a detailed description. First, learn some basics.
The core of samba is the two daemon processes smbd and
to the permission. In the previous section on Linux Users and user master management, in fact, their nature (or the user and user groups appear in the original intention) are convenient rights management. The importance of rights management for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.