use a common user to verify whether the logon is successful.
Log out of the root account and you can see that the password-free login to the local computer has been set.
6. Copy the public key to all Slave machines.
7. log on to the Slave machine to complete the remaining SSH configurations. Create a. ssh folder on Slave1 and change it to 700 (only the owner has read, write, and execute permissions)
Note:
Set all files in the current directory and
I have been learning jquery recently, so I will record it by the way.HTMLCopy codeThe Code is as follows: CSSCopy codeThe Code is as follows:. Scroll {Background: url (../image/scroll.gif) no-repeat center top transparent;Bottom: 100px;Cursor: pointer;Height: 67px;Width: 18px;Position: fixed;_ Position: absolute;/* compatible with IE6 */_ Top: expression(eval(document.doc umentElement. scrollTop) + 700);/* 700
add java optional configuration items (this is a dpkg utility ).
$ sudo update-alternatives --install /usr/bin/java java /opt/jdk/jdk1.7.0_71/bin/java 700$ sudo update-alternatives --install /usr/bin/javac javac /opt/jdk/jdk1.7.0_71/bin/javac 700$ sudo update-alternatives --install /usr/bin/jar jar /opt/jdk/jdk1.7.0_71/bin/jar 700700 is the priority value. I use a random number here.
Check our config:
$
called
For example, environment:
Base:
Copy codeThe Code is as follows:/Data/salt/base/Data/salt/base/sls
Will execute the sls file in/data/salt/base, because it is in the previous line
The basic sls file format is as follows:
Example 1
Copy codeThe Code is as follows:/Tmp/ttt20:File. managed:-Source: salt: // files/tst-Mode: 700-Backup: minion-Makedirs: True
Example 2
Copy codeThe Code is as follows:Testfile:File. managed:-Name:/tmp/ttt20-Source: sa
Now, Apple is in the heyday, not to decline, in fact, whether Apple is closed tomorrow or 50 years after the collapse, they will become the greatest business, please note that I did not add any modifier in front of the enterprise, nor add one, that is to say, At the very least, a handful of people like the author think that Apple has long gone beyond the science and technology, and is going to the world to export positive energy and valuable things, will become or have become a world-changing en
or folder Permissions
Chmod
No1. set your notes to be read only by yourself.
[Root @ rehat root] # chmod go-rwx test.txt
Or
[Root @ rehat root] # chmod 700 test.txt
NO2. Modify permissions for multiple files at the same time
[Root @ rehat root] # chmod 700 test1.txt test2.txt
NO3. modify the permissions of a directory, including its subdirectories and files
[Root @ rehat root] # chmod
0) = number of hosts
The following are two examples:
A. Divide Class B IP address 168.195.0.0 into 27 subnets
Solution 1) 27 convert to binary = 11011
2) the binary is 5 digits, so n = 5
3) set the subnet mask of the Class B address to the first 5 locations 1 of the host address of 255.255.0.0 to obtain 255.255.248.0. This is the subnet mask of the Class B IP address 168.195.0.0 that is divided into 27 subnets.
B. Divide the IP address 168.195.0.0 into several subnets. Each subnet has
Common Unix Virtualization Technologies include hard partitions and soft partitions.
In the hard partition, HP corresponds to NPAR, IBM corresponds to lpar, and Sun corresponds to the dynamic system domain;
In the soft partition, HP corresponds to vpar, IBM corresponds to micro-parition, and Sun corresponds to N1 Grid iner or zone.
Here is a specific instance of creating a zone in solaris10 on x86.
The environment of solaris10 is as follows:
Bash-3.00 # uname-SunOS sol10x865.10GenericI86pc i38
be defined in the Res/anim/directory of your android project. This file must have a separate root element: This element can be a separate
The following XML is from a view object in apidemo that is used for stretching and rotating at the same time:
Android: interpolator = "@ Android: anim/accelerate_decelerate_interpolator"
Android: fromxscale = "1.0"
Android: toxscale = "1.4"
Android: fromyscale = "1.0"
Android: toyscale = "0.6"
Android: Required Tx = "50%"
Android: Ty = "50%"
Android: filla
Introduction to PC-Lint2.2.1 error message No.For most error messages, PC-Lint provides an associated error number. If the error number is less than 1000, it is assigned to the C language. If the error number is greater than 1000, it is assigned to the C ++ language. What about 1000? It is retained. First read a table.C ++ Warning LevelSyntax error (syntax errors) 1-199 1001-1199 1Internal error (internal errors) 200-299 0Fatal errors 300-399 0Alert (warnings) 400-699 1400-1699 2Prompt (Informa
allocated by the High-Speed Buffer Used in file system io (in 4096 bytes page ).Previous HP-UX versions typically used 10% of physical memory for this task, but recent versions have implemented dynamic memory allocation. In version 10. X, ifBufpages is a non-zero value, which becomes the maximum value of the pages available in the high-speed buffer zone. It actually becomes a limit. Although it is rarely used, it will not exceed this value. In version 10. X, bufpages is often set to 0, which in
discount rate of the area in which the price range is delivered, and then calculate the discount mileage for each section,* This is the mileage that generates the fee and is used for calculating the next fare.**/Private Static int getfavourabletolldistance (INT km ){
// Determine the mileage rangeIf (km> 0 ){If (km gt; 200 ){If (km gt; 400 ){If (km gt; 700 ){If (km gt; 1100 ){If (km gt; 1600 ){If (km gt; 2200 ){If (km gt; 2900 ){If (km gt; 37
Original from: Original addressBecause this error causes a lot of wasted time to find out why, so hurry up and record it.The process is this, when using Android to read pictures, is the use of Bitmapfactory.decoderesource (This.getresources (), r.drawable.base) whenThe size of the returned picture is not the same as the real picture size, for example, the picture is 700*450, but read out is 525*337. If you have encountered this kind of situation, plea
) Obtains the class subnet mask of the IP address, the first n position of its host address Part 1 that is the subnet mask of the IP address division subnet.The subnet mask of Class B address 255.255.0.0 the host address of the first 5 position 1, get 255.255.248.0 2) Use the number of hosts to calculateIf you want to divide Class B IP address 168.195.0.0 into several subnets, there are 700 hosts in each subnet:(1) Convert the number of host to binar
be written (write)x indicates that the file can be executed (if it is a program)Where: Rwx can also be replaced by numbersR------------4W-----------2X------------1-------------0Let's go:Represents the Add permission-Indicates delete permission= indicates a permission to make it uniqueWhen we all understand the above, then we often have some of the following permissions are easy to understand:-RW-------(600) Only the owner has read and write permissions-rw-r--r--(644) Only the owner has read and
.② file belongs to group: a user can belong to more than one group, but it can only have one default group . So when a file is created, its owning group can only be the default group that the user belongs to(2) Umask command
Command name
Umask (The user file-creation mask)
Command path
Shell built-in commands
Execute permissions
All Users
Grammar
Umask [-S]-S Displays the default permissions for new files in rwx for
Introduction to the principle of algorithmsBilinear interpolation is a first-order interpolation, which is often used for image rotation and scaling processing.It uses the pixel values of the corresponding four points in the original image to determine the pixel values in the target images.For the sake of understanding, let's look at two images that are different in size:OriginalTransform diagramAssuming the width of the original image is yw , the height isxhThe width of the transform graph is t
, and then the creation of a file or directory, its permissions are changed to 000, and so on. Usually the root account with the Umask command value is 022, 027 and 077, the average user is 002, so that the resulting permissions are 755, 750, 700, 775. A digital representation of the permissions, which is explained later.When the user logs on to the system, the user environment automatically executes the Rmask command to determine the default permissi
This article is mainly about jquery back to the top implementation method, see the code below.HtmlThe code is as follows:
CssThe code is as follows:
. scroll{
Background:url (.. /image/scroll.gif) no-repeat Center top transparent;
bottom:100px;
Cursor:pointer;
height:67px;
width:18px;
position:fixed;
_position:absolute; /* Compatible ie6*/
_top:expression (eval (document.documentelement.scrolltop) +700); /*
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.