linux basic tutorial

Alibabacloud.com offers a wide variety of articles about linux basic tutorial, easily find your linux basic tutorial information here online.

Quick Start Linux Play typical application video tutorial Linux Basic tutorial Php/java/python environment configuration

monitoring status is required to be notified in advance through a health check. Zabbix as an operational monitoring evergreen tree, it is easy to monitor thousands of servers. This section explains the installation of Zabbix, the basic configuration item monitoring of the server. The 16th chapter of the course summaryReview the key knowledge of the course.: Baidu Network Disk downloadOriginal address: http://linyunbbs.com/thread-2186-1-1.htmlQuick St

Lu Xin vc6.0-vs2015 All-in-C + +, MFC Beginner's starter tutorial, Linux video Tutorial the best basic Introductory tutorial

This course includes:"1" C language (1 months)"2" C + + syntax and data structure (1 months))"3" MFC project Development (1 months)"4" Linux project development (1 months)Previous sessions of the video have been uploaded to Baidu Network, please follow the video tutorial in advance to master the progress of the course.VS2015 Series Video tutorials include:"VS2015---0 ba

Lu Xin vc6.0-vs2015 All-in-one, MFC beginners tutorial, Linux video Tutorial the best basic Introductory Tutorial No

This course includes:"1" C language (1 months)"2" C + + syntax and data structure (1 months))"3" MFC project Development (1 months)"4" Linux project development (1 months)Previous sessions of the video have been uploaded to Baidu Network, please follow the video tutorial in advance to master the progress of the course.VS2015 Series Video tutorials include:"VS2015---0 ba

Linux Basic Tutorial 26-Basic Network configuration

Uuid Identification code of the network device Onboot Whether the device is activated when the system boots DEVICE Number of the physical NIC IPAddr IP Address GATEWAY Gateway Address NETMASK Subnet mask DNS1 DNS server address PREFIX The number of bits of the subnet mask HWADDR The MAC address of the physical network card

Basic knowledge of Linux file permissions--linux Tutorial

all the files in the folder and its directory.Now, suppose you have a folder test with some scripts, all of which (including the TEST folder) have permission-rwxrwxr-x. If you want to remove the Write permission from the user group, you can run the command:Chmod-r g-w TESTRun the command ls-l, and you can see that the permission information for the TEST folder listed is drwxr-xr-x. The user group is removed from the Write permission (as is the case with all files in its directory).SummarizeYou

Basic knowledge of Linux file permissions--linux Tutorial

folder test with some scripts, all of which (including the TEST folder) have permission-rwxrwxr-x. If you want to remove the Write permission from the user group, you can run the command:Chmod-r g-w TESTRun the command ls-l, and you can see that the permission information for the TEST folder listed is drwxr-xr-x. The user group is removed from the Write permission (as is the case with all files in its directory).SummarizeYou should now have an in-depth understanding of the

Basic Linux Tutorial: Automatic Installation of Linux Kickstart

Basic Linux Tutorial: Automatic Installation of Linux Kickstart Starting from system installation In systems such as RHEL, CentOS, and Fedora, the program used to install the system is named anaconda. It is a FedoraProject developed by Python and can provide graphic or text interfaces for system installation. Before in

Linux Basic tutorial linux password-free SSH login settings

Linux Basic tutorial Linux password-free ssh login SettingsBrother LianOverviewin some common devices ssh, SCP, do not enter the password can save a lot of time. Generate keySee if there is a local key, if there is, do not generate, otherwise it will affect the previous device.Copy the code code as follows :(brother e

Basic Linux tutorial ---- install software in Linux

Basic Linux tutorial ---- install software in LinuxIntroduction This article introduces several methods for installing software in Ubuntu and the use of apt and dpkg tools.1. Install software on Linux There are usually three methods for installing software on Linux: Online

Linux Basic Tutorial Linux under the Cat command use detailed

log.log1 2012-012 2012-02345 ======[Email protected] test]#Example four: Using here doc to generate filesOutput:Copy CodeThe code is as follows:[Email protected] test]# Cat>log.txt > Hello> World> Linux> pwd=$ (PWD)> EOF[Email protected] test]# Ls-l Log.txt-rw-r--r--1 root root 3710-28 17:07 log.txt[Email protected] test]# Catlog.txtHelloWorldLinuxPwd=/opt/soft/test[Email protected] test]#DescriptionNote that the Bold section, here Doc, can be used f

Linux Basic Tutorial Linux system bulk Delete files with empty file Removal command introduction

, you can use the Shred command to implement,shred is a part of the coreutils , so Linux basically will have this command.  Shred How to delete files completely :The code is as follows  $ shred-u File  Shred will overwrite the node and data block where the file resides with some random content, and delete the file (-u parameter ).If you want to clear a bit more thoroughly you can add the- z parameter, which means to fill with random data, and then fil

Basic tutorial for Embedded Linux (version 2nd)

Basic tutorial for Embedded Linux (version 2nd) Edit recommendations Authoritative book on Embedded LinuxAmazon five-star ratingComprehensive Analysis of Embedded Linux development, revealing a large number of technical Insiders Basic Information Original Title: Embedded

Linux Basic tutorial linux password-free SSH login settings

OverviewIn some common devices ssh, SCP, do not enter the password can save a lot of time.Generate keySee if there is a local key, if there is, do not generate, otherwise it will affect the previous device.Copy the code code as follows :(brother even Linux training www.lampbrother.net)  LS ~/.ssh/id_rsa.pubDo not use Ssh-key-gen to create public keys and keys on localhostCopy the code code as follows :  SSH-KEYGEN-T RSAReturnCopy the public key to the

Linux Basic tutorial How to query the history operation time under Linux

To view the operation time of the history record in the Linux operating system, you can do this in the following steps:Learn Linux  1, modify the /etc/profile file, add at the end:exporthisttimeformat= "%f%t ' WhoAmI '"  2, or in the user directory, modify the file . bash_profile, add export histtimeformat= "%f%t ' WhoAmI '"Exit the terminal and log back in.example, check The history operation time:Copy t

Linux Basic Tutorial Linux uses the Find command to find file usage based on system time

  LinuxfindBrother even Linux training summary these timestamps includeCopy the code code as follows:Mtime file content Last modifiedThe time that the Atime file was read or accessedCTime File Status Change timeThe meaning of Mtime and atime is easy to understand, and ctime needs more explanations. Because the inode maintains the metadata on each file, the Inode data also changes if the file-related metadata changes. This can be caused by a series of

Linux Basic tutorial linux password-free SSH login settings

Linux Basic tutorial Linux password-free ssh login SettingsBrother LianOverviewin some common devices ssh, SCP, do not enter the password can save a lot of time. Generate keySee if there is a local key, if there is, do not generate, otherwise it will affect the previous device.Copy the code code as follows :(brother e

Mago linux basic O & M + intermediate + advanced video tutorial full set of video downloads (nearly 50G), linux50g

Mago linux basic O M + intermediate + advanced video tutorial full set of video downloads (nearly 50G), linux50g Mago linux O M beginner + intermediate + advanced video tutorial full set of video downloads (nearly 50 GB)Directory details:18_02_ssl protocol, openssl and cre

Linux Basic Tutorial Linux system bulk Delete files with empty file Removal command introduction

, you can use the Shred command to implement,shred is a part of the coreutils , so Linux basically will have this command.  Shred How to delete files completely :The code is as follows  $ shred-u File  Shred will overwrite the node and data block where the file resides with some random content, and delete the file (-u parameter ).If you want to clear a bit more thoroughly you can add the- z parameter, which means to fill with random data, and then fil

Linux Basic Tutorial Linux using the Find command to search for files common method records

to find files that have been modified for a certain day, for example , today is a lunar month, to find out the revised document, change 0 to 2 . As follows:  $ find/home Mtime 2Find files that have changed within 2 days  $ find/home mtime-2The interval is expressed as ( -2,0], apparently only -1 and 0 two numbers, respectively, representing yesterday and today.Find files that were changed 2 days ago  $ find/home Mtime +2  c. Find files by user or user groupThis type of option is relatively c

Linux Basic Tutorial Linux uses the Find command to find file usage based on system time

LinuxfindBrother even Linux Training Summarizing these timestamps includesCopy the code code as follows :  mtime file content last modified  The time that the atime file was read or accessed  ctime file status change time  The meaning of mtime and atime is easy to understand, and CTime needs more explanations. Because the inode maintains the metadata on each file, the inode data also changes if the file-related metadata changes. This can be caused by

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.