SCP [Email protected]:/tmp/zxl/root/#查看主机SN号Dmidecode-t 1#查看服务器网卡固件和驱动Ethtool-i eth0#开机自动挂在monut-ANano/etc/fstab/DEV/HDC6/MNT/HDC6 ext3 defaults 0 0#可是 Read Only form 忞Mount-n-O REMOUNT,RW/#挂载ISO文件Mount-o Loop/hp/hp2003.iso/mnt/iso# See if the NIC is linkedMii-tool# View Linux Group Cat/etc/groupAdd Group Groupadd HGBWUSERADD-G Group name User name# View all users in Linuxcat/etc/passwd# How to modify the access rights of a fileChmod-r 777# view commands used in the pastHistory#后台管理查看Jobs#启用后台程序
LicenseLgpl:lesserGPLv2GPLv3BsdApacheOpen Source : Open Source codeFree : Free access, free revision, free learningEmacs: Text EditorGcc:gnu C complierBash:LINUX:GLIBC, GCCRelease: DistributorRedHatSlsDebianSusePackage Management:Debian:dptredhat:rpmBasic principles of Linux:1, consisting of a small program with a single purpose, combined with a small process to complete complex tasks;2, all documents;3, try to avoid capturing the user interface;4, the configuration file is saved in plain file
, using awk to fetch the passwd file, the third column of line three to redirect to/tmp/oldboy/ In the Test.txt file. 5, on the basis of the title 3, the request to delete the file with the command RM prompts the following to prohibit the use of RM , and make the effect permanent effect. [Email protected] oldboy]# rm-f passwdDo not use RM command.6, on the basis of the title 3 , delete /tmp/oldboy/ under passwd other than the file. 7, on the basis of the title 3 , please print the/etc/passwd fil
Use your own virtual machine (image file for redhat7.0) bold try, give everyone a rest assuredRM-RF/650) this.width=650; "title=" English version "style=" Float:none; src= http://s5.51cto.com/wyfs02/M02/7F/D9/ Wkiol1cwfxac5v1jaagzonc-5qo412.png "alt=" Wkiol1cwfxac5v1jaagzonc-5qo412.png "/>650) this.width=650; "title=" Chinese Version "style=" Float:none; "src=" http://s2.51cto.com/wyfs02/M02/7F/DC/ Wkiom1cwfj3ypct1aah92lfnyp0476.png "alt=" Wkiom1cwfj3ypct1aah92lfnyp0476.png "/>This article is fr
benefits of good operation and maintenance ---- Efficiency --- method;Ten: Thanksgiving ---heard the last thought of a friend in Beijing, every month, in Nantong to see her first side, she asked me to say later can help me, the Year 8 months said that the weekend to take me in Beijing to turn around, I hope that I have the opportunity to invite her to dinner, thank you! the benefits of good operation and maintenance :To meet their own love of technology;To achieve financial freedom, honor the
://s3.51cto.com/wyfs02/M02/72/5F/wKiom1XhxM2Se05mAACuJ0RWhoU423.jpg "/>6. Add User bash, Testbash, basher, and Nologin user (Nologin user's shell is/sbin/nologin), then find out/etc/ A row in the passwd file that has the same user name as its shell name650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/72/5B/wKioL1XhxurS81jMAACo3vS6Y-o251.jpg "/>7 , display the default shell and UID for root, CentOS, or User1 users on the current system "Please create these users beforehand, if not prese
The fourth chapter is about the shell variable knowledge advanced and practice;The fifth chapter is about the numerical calculation practice of variables;The annex includes the source code, please download.The two chapters should pay attention to the relevant matters when studying:1. Note the use of punctuation: for example, single quotes, anti-quotes, double quotes, etc.;2. Note the blank spaces for the spaces you want to leave blank;3. Attention to the role of special variables;4. Use of built
require the minimum password age of 3 days, the maximum is 180 days, warning for 3 days;[Email protected] ~]# echo Slackware | PASSWD–STDIN-N3-X180-W3 SlackwarePasswd:only one user name may specified.[Email protected] ~]# Cat/etc/shadow | Tail-1slackware:!! : 17098:0:99999:7:::(10), add user OpenStack, whose ID number is 3003, the basic group is clouds, the additional group is Peguin and Nova;Useradd-u 3003-g clouds-g Peguin OpenStack(11), add the system user MySQL, request its shell for/sbin/n
This section is about two commands su and sudo are all about getting root permissionsThe parameters of the sudo band are-l-c-m-v, etc.-L gives Sudo permission for the current user-C Execute Command-V time stamp-M Delete timestampAnd then there's the Setup command for sudo.Usually use regular visudo.And then step by step, this doesn't easily cause a big mistake.You can also edit the configuration file/etc/sudoersAbout configuration formatsRoot AllThat's probably all I remember.20161128l04-08 old
First, homework (exercise) content:1, elaborated the Linux HA cluster use background;2. Summarize the system composition of Linux ha cluster and the working model of HA cluster;3, through the lamp combination, based on heartbeat V2 CRM implementation ha; requirements, deployment wordpress, any data used in the edited article can be accessed normally after the node is switched;Second, completion time:Before October 24, 2015.Third, the way of submission:Please submit your job's post link address i
OPS script: Python for bulk IP port scanningFocus on network operation and maintenance, only send practical dry goodsScan QR code to pay attention to the publicToday do not want to update, send an inventory, share a small piece of Python code to everyone, can achieve a simple batch port scanning, nonsense said, first on the code:===========================================================#-*-Coding:utf-8-*-Import socketImport timeImport xlrdImport thre
/var
/var/log/message
System Information default log file, very important
/var/log/secure
Records log in system access information files, weekly automatic cycle, for example, POP3,SSH,TELNET,FTP, etc. will be recorded in this
/proc
/proc/cpuinfo
Information about the processor, such as type, manufacturer, model, and performance
/proc/interrupts
Create a hard diskcd/dev/Fdisk-l: Viewing the capacity of a disk partitionFdisk-l/dev/sda/: View the capacity of the first SCSI hard disk partitionFdisk-l/dev/hdb/: View the capacity of the second IDE hard disk partitionMan fdiskll/proc/: Storage process, hard disk informationCat/proc/partition: Viewing hard disk partitionsDF: Viewing partitionsdf-th: View partition size, in m/g unitsDu-sh *: Check the size of all files in the directoryNew Hard diskIn VMware:Hardware--HDD--addFdisk-l: See if you
parentheses line;# GREP-E-o "^[_[:alpha:]]+\ (\)"/etc/rc.d/init.d/functions5, use echo to output a path, and then egrep find its path base name; Further use Egrep to remove its directory name (note that the directory name, not the directory path);# echo "/etc/network" | Egrep-o "[^/]+?$"6. Find all files that are not root, bin or hadoop under the/usr directory;# find/usr-not \ (-user root-o-user bin-o-user hadoop \)7, one day the system was invaded, hackers in your system to leave the Trojan fi
Note: This assignment is applicable to employment classes and package classes.I. Homework (exercise) content:First, the actual case (practice) content1, describe the CENTOS6 system boot process;2, Description/etc/rc.d/sysinit script function;3. Summarize the usage of the Text Processing tool sed and awk (must accompany the example)4, write a script, generate 10 random numbers, and according to the order from small to large (requires at least 2 Chinese law);5. Execute the script/data/get_username
;. NET CLR 2.0.50727;. NET CLR 3.0.4506.2152;. NET CLR 3.5.30729) "59.33.26.105--[08/dec/2010:15:43:56 +0800] "get/static/images/photos/2.jpg http/1.1" 200 11299"Http://oldboy.blog.51cto.com/static/web/column/17/index.shtml?courseId=43" "mozilla/4.0 (compatible;MSIE 6.0; Windows NT 5.1; SV1;. NET CLR 2.0.50727;. NET CLR 3.0.4506.2152;. NET CLR 3.5.30729) "59.33.26.105--[08/dec/2010:15:44:02 +0800] "get/static/flex/vedioloading.swf http/1.1" 200 3583"Http://oldboy.blog.51cto.com/static/flex/adobe
* * */data/mysqlbak/backup_mysql.sh6. Write a script: If a path does not exist, it is created as a directory, otherwise it is present, and the content type is displayed;#!/bin/bash#If [-Z $];thenecho "Usage:$0 Exit 1Fiif [!-D $];thenMkdir-p $Elseecho "is exists."File $Fi7, write a script, print 9x9 multiplication table;#!/bin/bashFor I in 1 2 3 4 5 6 7 8 9;d oFor j in 1 2 3 4 5 6 7 8 9;d oprintf "%2d" $ ((i*j))DoneEchoDone8, describe the work flow of DNS, as well as a complete set of DNS master
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.