saving changes
R Recovery and Transformation options (experts only)
s sort partitions
t change a partition ' s type code
V Verify Disk
W Write table to disk and exit
X extra functionality (experts only)
? Print this menu
Enter r to enter recovery mode
Recovery/transformation Command (? For help):?
Recovery/transformation Command (? For help):?
b Use Backup GPT
single-user mode]Before starting, press ESC to enter the bottom screenSelect "CentOS (2.6.18-92.EL5)" and press the E key to enter the bottom screen.Select "Kernel/vmlinuz-2.6.18-92.el5 ro root=label=/rhgb quiet", press the E key, add a space 1 on the last side.Press ENTER to return to the bottom screenPress the B key to enter the bottom screen (single user mode)sh-3.2# Rear Input Vi/etc/inittabModify Id:6:initdefault: = = Id:5:initdefault:, saveEnter reboot and you will be able to enter the
Tutorial target: DD Wipe command disk empty shell script, notebook desktop Mac UniversalDate: August 20, 2015Contact e-mail: [Email protected]Q q Group: 1851 1570151CTO Blog Home: http://990487026.blog.51cto.comProduction demand:The number of companies reached a certain number, there will be people flow, and then the attached PC or SERVER,MAC, of course, to completely empty the data inside, install the new
Analyzer or packet sniffer program-to capture or filter TCP/IP packets received or transferred from a specific interface on the network. It also saves the captured package to a folder. Tcpdump can be used on all major Linux distributions.5.netstat--Network StatisticsNetstat is a command-line tool for monitoring incoming and outgoing network packet information and interface information statistics. It is useful for system administrators to use it to mo
command performs the reverse function of the dump. A full backup of the file system can be restored first, and subsequent incremental backups can be overwritten on top of the restored full backup. You can restore a separate file or directory tree from a full or partial backup.Both dump and restore can be run on the network, so users can back up or restore from a remote device. Dump and restore use tape drives and file devices that provide a wide range of options. However, both are limited to ex
Linux intrusion check utility command 1 can get the process where filename is running # pidof filename2 can see the process through the file or tcp udp protocol # fuser-n tcp port3 can see the file modification time, size and other information # stat filename4 check the loading Module # lsmod5 check the rpc service opening # rpcinfo-p6 check whether the NIC is in mixed mode (promiscuous mod) # dmesg | grep
Function -- in VI input mode, the user can use BACKSPACE (BACKSPACE) to delete the contents of the front of the cursor, you can also use the DELETE key to delete the current character. In addition, a few keys are available in the VI command mode to delete a character or to delete the "x Key "for the entire line: Delete the character that the current cursor is in. " D-Key double-click " : Delete the line where the cursor is located " R Key ": Modifies the character that the cursor contains
Linux system monitoring utility Glances
Install GlancesGlances installation requirements: python> = 2.6 and psutil> = 0.4.1# pip install psutil# pip install pysensors# pip install hddtemp# git clone https://github.com/nicolargo/glances.git# cd glances# python setup.py install
Use of Glances# glances -hGlances version 1.7a with PsUtil 0.7.1Usage: glances [opt] with opt:-bDisplay network rate in Byte per s
:650) this.width=650; "class=" Fit-image "src=" http://s9.51cto.com/wyfs02/M01/74/4B/ Wkiol1yyukbgsv-haadq8dtcog4350.jpg "border=" 0 "height=" "width=" 498 "/>"3.ncduThe NCDU command can be used to view and analyze the disk space usage of each directory in Linux, using the following command to install:Apt-get Install NCDUAfter installation, execute the following command to start the analysis from the root d
command performs the reverse function of the dump. A full backup of the file system can be restored first, and subsequent incremental backups can be overwritten on top of the restored full backup. You can restore a separate file or directory tree from a full or partial backup.Both dump and restore can be run on the network, so users can back up or restore from a remote device. Dump and restore use tape drives and file devices that provide a wide range of options. However, both are limited to ex
Tags: Tom run tor/etc/web = = Linux shutdown aceFor Linux commands, I have a gradual process in the learning and use process. Suitable for small white learning to use quickly. LaughJump directory: cd + path for example: Cd/home/workspaceView a file, commonly used to view the log: Tail-f + file nameFor example tail-300f Server.xml see the last 300 rowsYou can also use more + file names such as more server.xm
not prompt for interactiveChage Changing password expiration propertiesSudo-l See what permissions the current user has, if the Visduo does not edit the user rights, it will be an error650) this.width=650; "src=" http://note.youdao.com/yws/res/1370/WEBRESOURCE3f386e18b3ad65a135f02da552199190 "style = "float:left;"/>Hwclock Viewing local timeNeed to use parted format file when Linux system files are larger than 2TThe current environment becomes-bash-4
1 Ubnutu Remote access shared folder (for win only)
1. Below the command line
Mount//192.168.1.100/user-o User=admin\\xxx,pass=xxx/mnt/user
Note: 192.168.1.100 is the name of the Windows host and the user is the name of the shared folder. Admin is the Windows host domain name and must be capitalized.
2. Desktop mode
The main folder, press CTRL+L, input such as: smb://192.168.1.100, according to the prompts to enter the account, and then you can access, here, and the command mode, in the desktop
and files in the/home/sunky/mydir directory/home/sunky/mydisk.iso, and the disc volume is labeled: Mydisk
3, CD-ROM image file Hook (mount)
#mkdir/mnt/vcdrom
Note: Create a directory for hanging contacts (mount point)
#mount-O loop-t iso9660/home/sunky/mydisk.iso/mnt/vcdrom
Note: Use/mnt/vcdrom to access all files in the disk image file Mydisk.iso.
1.7.3.2 mounted removable hard driveFor Linux sy
. The following are the file system formats that are supported on my system mkfs:The VFAT format is supported in both Windows and Linux, so you can use this format for USB drives that you share in Windows and Linux. When using the mkfs command, you can specify the file system's volume label, block size, inode size, and so on, in addition to specifying the file system type.MKFS is a
mkfs.The following is the file system format supported by mkfs on my system:
The vfat format can be supported in both Windows and Linux. Therefore, you need to share the USB flash drive in Windows and Linux to use this format. When using the mkfs command, in addition to specifying the file system type, you can also specify the file system's volume label, block size, inode size, and so on. Mkfs calls the m
/home directory). Therefore, you also need to delete partition 4, which is consistent with the step described in section 8th.
10. enter the fdisk-l command again (verify the hard disk space partition every time, because the hard disk partition needs to be operated with caution, only to ensure that the previous operations have been correctly executed, subsequent operations may not cause any problems). We fou
, the end number of/dev/sda3 can be calculated (3661 ).
11. If a desktop application is installed in Linux, you can also use a graphical Disk Utility. Here, we will briefly introduce how to allocate swap partitions. Select the disk utility in the application, open the inter
kernel is very small, because Linux is mostly used on servers, so Linux vendors integrate too many services into their Linux systems.
VMWare: Virtual Machine. We can run ourLinuxSystem.
Only dozens of simplified versions are required.MB, Generally 3, five hundredMBAnd can also be found on the Internet. It is pasted here.
Bytes ---------------------------
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.