Disclaimer: This blog post from Baidu Experience http://jingyan.baidu.com/article/642c9d34dcba80644a46f72d.html, thank you to share!Linux Delete directory is very simple, many people are still accustomed to use rmdir, but once the directory is not
Direct RM is OK, but to add a parameter-F: Rm-f file path
-F is simply forced to delete, without any hint of the meaning
To delete a file using an instance:
Rm-f/var/log/httpd/access.log
Will force deletion of/var/log/httpd/access.log this file
RM Command Usage
Use this RM-RF to delete files with extreme caution, Linux does not have a recycle Bin.Direct RM is OK, but to add a parameter-F: Rm-f file path-F is simply forced to delete, without any hint of the meaning
To delete a file using
apache| Virtual host VI, using Apache to implement virtual host service
6.1 What is a virtual host service
The so-called virtual Host service means to virtual a machine into more than one Web server. For example, a company wants to engage in
Introduction of Fail2ban
Fail2ban can monitor your system log, and then match the log error message (regular match) to perform the appropriate shielding action (usually firewall), and can send e-mail notification system administrator, is not very
Operation Files:1. Build directory: mkdir directory name2. Copy: CP source (can be absolute, can be relative) target (can be file, can be directory)Cp-r source (can be absolute, can be relative) the target (can be a file, can be a directory) if not
Introduction to grep commands in CentOSGrep command Introduction
Grep is a command line tool originally used for Unix operating systems. After a file list or standard input is provided, grep searches for the text that matches one or more regular
Masquerade is also a source address translation, but the firewall will automatically find the available public IP address according to the policy, adapt to the situation of changeIf the interface uses ppp+, it means matching ppp0, ppp1 ... Any
Objective: to build a Redhatlinux6.2 firewall, connect the leased line to Chinanet, connect the LAN segment 192.168.11.024, enablePHP4 and Mysql databases, and have another Apache server 192.168.11.2 on the LAN, to provide services to external users,
This time to bring you PHP accelerator eaccelerator configuration using the steps in detail, the PHP accelerator eaccelerator configuration Use of the considerations are what, the following is the actual case, together to see.
In order to better
1. the connection time log of the connection time is generally recorded by the/var/log/wtmp and/var/run/utmp files, however, neither of these files can be directly viewed using the tail or cat command. The file is automatically updated by the system.
I. Log splitting of Apache1. Configure Apache to use Cronolog:The following configuration is carried out in the virtual host because Apache is enabled for the experiment, so it is also convenient for multi-site analysis operations.Vim/etc/httpd/conf.
1. Connection time logs The connection time log is generally recorded by the/var/log/wtmp and/var/run/utmp files. However, neither of these files can be directly viewed using the tail or cat commands. The file is automatically updated by the system.
How to query Apache server logs using MySQL statements: mysqlapache
Linux has a notable feature. Under normal circumstances, you can analyze system logs to understand what is happening in your system or what is happening. Indeed, system logs are the
PhpMyAdmin (http://www.phpwizard.net/projects/phpMyAdmin/) is a PHP tool for managing MySQL databases, with WEB-based interface. However, it is found to have a vulnerability. You can choose to install a new stable version:PhpMyAdmin 2.2.0.1.
File operationsX=open ('/etc/hosts ') # # #默认读的方式打开X.readline ()X.read ()X.seek (0)Y=open ('/root/new.txt ', ' W ')Y.writelines (' abcd\n ')Y.flush () SaveY.close ()Functiondef function name (x,y=11):CommandFunction name (' Tom ', ' Jerry
Linux has a significant feature that, under normal circumstances, you can analyze the log to see what is happening in your system or what is happening. Indeed, system logs are the first-hand resources that system administrators need most to solve
How to query Apache logs using SQL statements in Linux
Linux has a notable feature. Under normal circumstances, you can analyze system logs to understand what is happening in your system or what is happening. Indeed, system logs are the first-hand
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.