Familiar with the Linux partners know that in the open-source Linux environment, the main idea is that everything is a file, anything in Linux can be seen as files, then we use these files when we face a problem how to find a file, Here I take
(iv) Operation of directories and files#mkdir/test//Create a Test directory (folder) under the root directory#mkdir-P/test/test//Recursive creation of directories (without the Test directory under the previous root), also known as the creation of
Note that if the user's shell is/bin/sh, it needs to be modified to/bin/bash!! Usermod-s/bin/bash User NameKali Linux System corresponding configuration file is/ETC/BASH.BASHRC, different release version may be differentStep one: VI/ETC/BASHRC added
Since Ubuntu is a Debian-based Linux operating system, in the default case, there is no Superuser (superuser, root), but some system operations must have superuser privileges to do so, such as manually freeing memory.Under other Linux operating
1, add Users
New user named "Wang"
[Root@vdevops ~]# useradd Wang #添加账户 [root@vdevops ~]# passwd Wang #设置密码 changing password for user Wang.
New Password:retype New Password:passwd:all authentication tokens updated successfully. [Root@vdevops ~
Sudo is a very useful tool on the Unix/linux platform that allows system administrators to assign reasonable "rights" to ordinary users to perform tasks that only superuser or other privileged users can accomplish, such as running some commands like
operating Environment:CentOS 7Database:mariadbProblem Description: run the/var/lib/mysql_install_db command after the Yum installation mariadb database runs, which causes the MARIADB database to fail to start or restart.Fault resolution:[[email
1. Case 1:linux Basic protection measures2. Case 2: Assigning administrative rights with Sudo3. Case 3: Improve SSH service security4. Case 4:selinux Safety Protection1 Case 1:linux Basic protection measures1.1 QuestionsThis case requires practicing
1. When performing certain operations that require higher permissions, you can use (sudo + raw commands) for higher permission operations, but you will need to enter a password each time you use it for the first time, which is 2 more hassle. Change
In 2000, researchers at William Mary College in the United States, Serge, and others at the Usenix 4th annual Linux Showcase &conference Conference, published the title "Domainand Type Enforcement for Linux "article. The first time this article used
In the previous two sections, we introduced the basic knowledge of users and user groups and how to manage users and user groups. Next let's take a look at other user-related commands.Finger tool for viewing user informationChfn tool for changing
Thanks to the excellent network functions of the Linux operating system, most website servers on the Internet use Linux as the main operating system. However, because the operating system is a multi-user operating system, Hackers often choose Linux
Set up the PHP5.6 environment in WIN8.1. Many people prefer to use linux to build the php environment under WIN8.1. However, because linux is highly customized, you often need to run the root command, which is somewhat high-end, build the PHP5.6
Ubuntu is a popular Linux system recently. Because ubuntu does not start the root user by default, we will introduce how to enter the root user.
(1) switch from user to root user
Whether logging on to Ubuntu in graphical mode or logging on in
ArticleDirectory
Security
1: Set the root passwordAfter Ubuntu is installed, the root user does not have the default password, because you have not set the password for the root user.
Sonce @ sonce-desktop :~ $ Sudo-I
[Sudo]
Error Log
Install nginx-1.0.5 and php-5.3.6 (php-fpm) Can't Wait To test info. php? Php phpinfo () ;?> ), However, only blank pages are returned and nothing is output. The following is an error log.
192.168.6.82--[01/Aug/2011: 13: 54: 20 + 0800]
CentOS and Ubuntu use sar to monitor performance and instructions for use, centossar
Under CentOS
Yum install-y sysstatsystemctl start sysstatsystemctl enable sysstatUnder Ubuntu
# Install sudo apt-get install-y sysstat # modify the configuration
Running this command on a Linux laptop can change the device bricks permanently.
A user posted a question on the Arch Linux Forum last month, why is it that his notebook cannot be started after running a simple "rm-rf-no-preserve-root/" command. If
Run the following command as the root user:Sudo passwd rootYou will be prompted to enter the root user password, enter the root password continuously, and then use: $ su1. After executing the sudo passwd root command on the terminal, the system will
1. TFTP protocol Simple File Transfer Protocol Trivial file Transfer Protocol ( tftp " is a simple, low-overhead file Transfer protocol based on the UDP protocol that allows a client get or put file to be on a remote host. Because of its
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.