By default, PHP sessions are saved through files. This has the following disadvantages:
Session files are usually very small, but there are many files. it is a waste of space to save many such small files in the file system, and the efficiency is
In most cases, you can use test commands to test the conditions. For example, you can compare strings, determine whether a file exists, and whether the file is readable. The following article describes how to use BashShell to check whether a file
Sometimes we need to copy a file in batches using linuxshell. The same principle applies to batch users. The knowledge used: test or [: can be used to compare the arithmetic comparison-equal eq-ne-gt greater than-ge is greater than or equal to-lt...
Article Title: How to make your Linux operating system more secure. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
One, apue the various obscure nouns in this chapterI was reading this chapter encountered a variety of ID, according to the name is completely unclear what meaning, fortunately see this article, http://blog.csdn.net/ccjjnn19890720/article/details/699
First, create the start user and directory permissions[Email protected] ~]# Useradd user[[email protected] ~]# passwd User (passwd)Use root shutdownChown-r user/tomcat (front user name, followed by directory)chmod U+x/tomcatSu-userThen go to the
Linux Special permissions: SetUid, setGid, sticky bit (sticky) (1) x permission (execution) of the directory The executable permission of a file is simple, that is, can execute its meaning, but what does the directory Execute permission mean?of
To create a user information table:
Copy CodeThe code is as follows:
CREATE TABLE Tbl_auth_user (
USER_ID VARCHAR (Ten) is not NULL,
User_password CHAR (+) not NULL,
PRIMARY KEY (user_id)
);
INSERT into Tbl_auth_user (user_id, User_password) VALUES
The following is a list of Linux system calls, including most common system calls and functions derived from system calls. This may be the only Linux system call list with Chinese notes that you can see on the Internet. Even a simple list of English
In linux, the chmod command for changing file permissions 1. chmod is the command for changing file permissions in linux. common commands include: (1) sudochmodu + x (2) sudochmodg + x (3) in sudochmodo + x, u, g, and o represent user, group, others,
Control statement
The following three methods are commonly used. A lower-case string represents a control command, while a lower-case string represents other meanings.1. If test then commands Elif test then commands fi2. for VAR in list do
Primary
Meaning
[- File]
True ifFileExists.
[-B File]
True ifFileExists and is a block-special file.
[-C File]
True ifFileExists and is a character-special file.
[-D File]
True ifFileExists and
Well, when reading a book, I can't remember what the ID corresponds to, so ~~
User ID
1. User ID: the user ID in the logon entry of the password file is a numerical value, which identifies different users to the system. The system administrator
About file attributes, process attributes and file permissions on Unix/Linux
System.
1. current working directory, environment variables, umask value are all
Attributes of a process.
The real User ID, real group ID, valid tive user ID, valid
1. Introduction to core files
When a program crashes, it generally generates a core file under the specified directory. The core file is only a memory image (with debugging information added) and is mainly used for debugging.
2. enable or disable
1. Password Security
The/etc/passwd file in UNIX systems contains information about each user that all systems need to know (the encrypted password may also be stored in the/etc/shadow file ).
/Etc/passwd contains the user's login name, encrypted
A few days ago, I encountered a strange problem in the management system. Today I have the opportunity to install the MySQL environment to reproduce this problem. Because it is not the most primitive environment, it may not be completely reproduced,
[-A file] true if the file exists.
[-B file] If the file exists and is a special block file, it is true.
[-C file] If the file exists and is a special word file, it is true.
Device Files: block device files with a single character. The unit of
Author: gnuhpcSource: http://www.cnblogs.com/gnuhpc/
1. Sticky Bit
1) Act on files: Some Old UNIX systems were used to put executable files in SWAp after the first execution to improve the running speed of the program. It is outdated now.
2) Act on
Directory
Part 1. Warm up
Why use shell programming?
Start with a sha-bang (Sha-bang refers #!)
Call a script
Preliminary exercises
Part 2. Basics
Special characters
Introduction to variables and parameters
Variable
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.