Want to know unix and linux system administration handbook pdf? we have a huge selection of unix and linux system administration handbook pdf information on alibabacloud.com
Common Linux System administration commandsWhoAmI shows the user of the current operation, such as:650) this.width=650; "src=" Http://p3.pstatp.com/large/19210001778d80f7b8c8 "alt=" Linux Learning ~linux System
includes a file system of size 0 blocks
-B,--block-size= size block with specified
-H,--human-readable file system size in an easy-to-understand format (e.g. 1K 234M 2G)
-H,--si similar to-H, but takes 1000 of the time instead of 1024
-I,--inodes displays inode information instead of block usage
-K is--block-size=1k
-L,--local only displays the native file
(1) Process management1. Determine the server health status2. View the processA. Viewing all processes in the system: PSExample: PS aux (using BSD OS command format)A show all foreground processesX Show all background processesU shows which user generatedPs-le (using the Linux Standard command format)-L display more detailed information-E Show All processesResult descriptionVSZ: Occupies virtual memory size
simply enters the command man and the name of the command shell will list a complete description.Standard usage:Name of the man commandTo query the description page of the LS command, enter the command: Man lsTo flip through the manual page, you can use the page UP and PAGE DOWN keys, or use the spacebar to turn back one page and use B to flip forward. To exit the manual page, enter the command Q. To search for keywords in the manuals page, enter a command/and keyword or phrase to search for, a
80/tcpBased on C/S modelLoading httpd/var/www/html/ETC/HTTPD/CONF/HTTPD.CONF Master configuration fileSELinuxAn access model developed by the U.S. Security ServiceEnableDisabledEnforing: Mandatory mode if our actions violate selinux, force a refusalPermissive: If you violate SELinux, you will only be warned that you can still accessFiles can be set up with permissions called DAC active access controlSELinux mac for files or directories, mandatory access controlTwo important elements related to S
example: useradd-d/home/bird bird2 ---bird2 is the account name,/home/Bird is the main directory of Bird2 -the general user of the system's main directory is generally built in/home/this pathpasswd Set User password -- in Linux, Superuser can use the passwd command to set or modify the user's password for a normal user. Users can also use the command directly to modify their own passwords without having to use the user name after the command. --pa
also useful when creating a RAM disk.Module classLsmodDegree of importance: MediumLists all installed kernel modules.InsmodDegree of importance: MediumForce the installation of a kernel module (instead of using modprobe if possible) must be called as root.RmmodDegree of importance: MediumForces the uninstallation of a kernel module. Must be called as root.ModprobeDegree of importance: MediumThe module loader, in general, is automatically called in the startup script. Must be called as root.Depm
Installing Pdftotext to Redhat/rhel/fedora/centos/ubuntuInstall Pdftotext (CentOS) in a different Linux distribution version using the Poppler-utils package:# yum Install Poppler-utilsor use the following command in Debian/ubuntu:$ sudo apt-get install Poppler-utilsPdftotext using syntaxPdftotext {pdf-file} {Text-file}How do I convert a PDF to text?Convert Php-ma
Find a very detailed Linux shell script tutorial, in fact, not only the shell script programming, but also introduced the system of various commandsHttp://vdisk.weibo.com/s/yVBlEojGMQMpvThis book is divided into five parts, in detail the shell programming skills, a variety of UNIX commands and syntax, but also related to UNIX
Linux File System administration commandsCommon Commands1. DF command to view the usage of the partitionCommon options-H More Humane-m displays partition usage in megabytesDisplay information:Mounted on: Mount pointFilesystem: The specific hardware name that corresponds to2, du command to view the file/directory size, by default in K unitsCommon options:-H "Human
: Modify which NIC to follow which, only one can be omitted) x.x.x.x/y (M.M.M.M)//modify IP information; x:ip address, Y: Mask length, M: mask. such as =225.225.255.0Shutdown-h now or Poweroff or init 0//shutdown operation.Shutdown-r now or reboot or init 6//restart operation.Shutdown-r +15 ' The system would be rebboted!! '//Send a notification to each user who is currently logged on to the Linux host ' th
Chapter 23rd UNIX File SystemNamed pipe Mkfifo:mkfifo [-M mode] pipe. Named pipes must be created explicitly and will not disappear (the RM command can be removed).The proc file is a pseudo-file used to access kernel information. For example, if a process ID is 1952, the process-related information can be found in a file in the/proc/1952 directory.The VFS (virtual file system) implements the details of file
[Linux Unix -- exec and fock System Call], linux operating system
If you have any shortcomings, please kindly advise. Reprinted Please note: @ CSU-Max
Series of blog posts:
Linux and Unix
[Linux Unix -- open/close/write/read System Call], linux operating system
If you have any shortcomings, please kindly advise. Reprinted Please note: @ CSU-Max
Series of blog posts:
Linux and
2016.8.12 23:20-23:501.2 Suggested BACKGROUND1.2 Reader's knowledge backgroundWe assume in this book so you have a certain amount of Linux or UNIX experience. In particular, you should has a general concept of what the system looks and feels from the user's perspective since we do N ' t review this material. Several good books can get to speed; See the Reading li
is, the programmer's development efficiency and the code's clear readability. Computational efficiency should not be the focus, but it should not be an excuse to act rashly, but to realize that there is little need to care if a script runs out in half a second or two seconds. Optimization scripts get very low returns, even for scripts that run regularly through Cron. For a long time, the standard language for administrative scripts is the one defined by the shell. Most systems ' default shell w
From now on, to set a task for themselves, every day to see a section of the "Unix/linux System Management Technology Handbook 4th Edition", the Chinese and English comparison to see, in order to strengthen their English reading ability!2016.8.8 16:30-17:30Section One BASIC administration1 Where to StartThe first part of basic management technologyWhere to start
Because of the well-known stability and reliability of Unix operating systems, the computers used to provide a wide range of Internet services run a large percentage of Unix and Unix-like operating systems, requiring a large number of skilled UNIX-type operating system appli
systems, Linux is a legally, developmentally, and historically distinct entity that CA Nnot properly is referred to as "Unix" or as a "version of UNIX." To-do-is-slight the work and innovation of the Linux community. At the same time, it's somewhat misleading to insist that Linux
2016.8.19 17:20-17:50HP-UX is based on System V and are tied to Hewlett-Packard ' s hardware platforms. It ' s closer to the ancestral source tree than either Solaris or AIX, but HP have kept pace with developments in the OS worl D and have added a variety of its own enhancements. Now that HP have begun supporting Linux as well, the future of HPUX was somewhat less clear.HP- UX is based on
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.