current location:Home > Technical Articles > System Tutorial > LINUX
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Detailed explanation of CentOS anti-intrusion through logs
- 1 View the log file Linux View /var/log/wtmp file View suspicious IP login last-f /var/log/wtmp This log file permanently records the login and logout of each user and the startup and shutdown of the system. Therefore, as system uptime increases, the size of this file will increase, and the rate of increase depends on the number of user logins to the system. This log file can be used to view the user's login record. The last command obtains this information by accessing this file and displays the user's login record in reverse order from back to front. Last can also display the corresponding information based on the user, terminal tty or time. Record. Check the /var/log/secure file to find the number of suspicious IP logins 2
- LINUX 893 2024-06-01 18:25:01
-
- Focus: Summary of common Xshell running commands under Linux systems
- First of all, we want to start with the simplest thing. After we enter the Xshell interface, we connect to the Linux server. When we first enter, we don’t know what files we have. At this time, we can use the ls command to display what files we have. Or use ls-l, the easiest is ll. The ls command will display the files horizontally, which is uncomfortable to look at. ll and ls-l have the same effect. It is recommended to use ll because it is the simplest. After we already know what files there are, we need to know how to enter the file we want to enter. In a graphical system like windows, we can use double-click to open the file we need to open. In Xshell, what we need to use is: cd command. After we enter,
- LINUX 958 2024-06-01 18:02:54
-
- Linux file permissions Speaking of permissions, Linux file calling permissions are divided into three types of permissions
- 1. Linux file permissions Speaking of permissions, Linux file calling permissions are divided into three types of permissions for all objects: user, group, and other people. Each object has three permissions: r: read, w: write, x: execute. Madmen like to use numbers to represent them, such as: rwx is the two's complement 111, which is the ten's complement 7. For example, we view the information of all files in the current directory ls-l: 1. The first digit in the circle 1 indicates the type of the file, - indicates an ordinary file, d indicates the directory, and l indicates the link; the next nine digits can be divided into three groups rwx, each group corresponds to all objects with each permission. This means that user has rwx read, write and execute permissions, group has r-x read and execute permissions, o
- LINUX 669 2024-06-01 17:34:33
-
- Simple method to uninstall software under Linux Uninstallation on Linux is not used
- A simple way to uninstall software under Linux Linux is an open source operating system that can run Linux server maintenance on almost all types of computers. It has been widely used today. Sometimes, we need to install some applications on Linux to meet different needs. And Linux uninstall software command, sometimes we also need to uninstall such programs, especially when they are no longer used. Uninstalling software under Linux is easy, and there are many ways. Here are some of the most commonly used techniques. 1. Use the dpkg command: You can use the dpkg command to uninstall a file. The most commonly used format is as follows: sudodpkg-r2. Use the apt-get command: apt-get is De
- LINUX 1169 2024-06-01 17:27:43
-
- Detailed explanation of Linux file attributes and permissions
- In Linux, any file has three identities: "User, Group, Others" (user, user group, others). One of the most useful functions of user groups is when you develop resources in a team, and each Accounts can have multiple user groups supporting Linux file attributes: 1. After logging in to Linux as root, execute "ls-al" (ls:list, which displays the file name and related attributes of the file; -al: indicates listing all Detailed permissions and attributes of the file (including hidden files)); first column: file type and permissions. The first letter represents the file type: d directory-file l link file b interface device available for storage in the device file c Represents the serial number in the device file
- LINUX 548 2024-06-01 17:06:00
-
- linux kernel explained in detail kernel explained in detail kernel kernel kernel
- linux kernel explanation linux kernel explanation linux kernel explanation linux kernel explanation and explanation Download the USB+ device driver of the Linux Bluetooth contract stack immediately Summary: Based on the analysis of the BlueZ source code of the Bluetooth contract stack under Linux, the organizational structure and characteristics of BlueZ are given. Analyze the Bluetooth USB transmission driver mechanism and data processing process, provide the important data structures and processes for implementing Bluetooth device drivers, and summarize the common techniques and key technologies for developing Bluetooth USB device drivers under Linux. Keywords: Linux system; Bluetooth contract stack; device driver USBDeviceDriverforLinuxBluetoothStackLIANGJun
- LINUX 618 2024-06-01 16:50:03
-
- Operating system: the core program that manages computer hardware and software resources
- Operating System ***Operating System How to check what linux is System adobe airlinux, OS*** for short, is a computer program that manages and controls computer hardware and software resources. It is the most basic system software that runs directly on "bare metal" How to check what linux is This is how you should learn Linux as any system. Any other software must be able to run with the support of the operating system. Do you know this? What follows is collected by the editor for you. You are welcome to read: Introducing the viewing methods of Windows and Linux systems respectively. Viewing under Windows *** The following uses the Xp system and Windows 8 system as examples *** As shown on the right View system image showing XP
- LINUX 963 2024-06-01 16:27:11
-
- Ubuntu16.04 uses VNC to connect to the GNOME desktop
- 0x01 Before starting, because in some cases, it is necessary to use the graphical interface of remote desktop to connect to the server, so here is a brief introduction on how to install VNC and desktop environment under Ubuntu16.04LTS. Be sure to confirm that your server has 2GB or more of memory to better use the graphical interface, otherwise it will be stuck or even crash. 0x02 Install the desktop environment. If you do not install the desktop environment, you will see a gray screen and nothing can be seen after VNC connection. 1. You must use the root account to log in to the server using SSH. 2. Update the source and system and enter the following command: aptupdateaptupgrade-y3. Install the desktop environment. Here is an introduction to installing and using the unity desktop and using it for remote connection.
- LINUX 1178 2024-06-01 15:37:17
-
- How torrents work
- Torrents: Everything You Need to Know About Torrents - Every time I hear the word, the only things that come to my mind are free movies, games, and cracked software. But we don't know how they work, and there are various concepts involved in "seeds". So, through this article we understand what torrenting is from a technical point of view. What is a "seed"? A "seed" is a link to a file location on the Internet. They are not a file, they just dynamically point to the original file you want to download. For example: If you click GoogleChrome[1], you can download the GoogleChrome browser from Google's servers. like
- LINUX 807 2024-06-01 14:22:30
-
- Linux whereis basic commands
- In this article, we will explain the basics of this command with some easy-to-understand examples. But before that, it's worth pointing out that all the examples below have been tested under Ubuntu16.04LTS. Linuxwhereis command The whereis command can help users find the binary file, source code and help page of a certain command. The following is its format: whereis[options][-BMSdirectory...-f]name... This is the explanation given by the man page of this command: whereis can find the binary file, source file and help file of the specified command. . When the found file is displayed, the main path name will be removed, and then
- LINUX 690 2024-05-30 10:18:47
-
- List all Bash Shell built-in commands
- A shell built-in command is a command or a function that is called from the shell and is executed directly in the shell. bashshell executes the command directly without calling other programs. You can use the help command to view information about Bash's built-in commands. Below are several different types of built-in commands. The types of built-in commands are as follows: BourneShell built-in commands: Built-in commands inherit from BourneShell. Bash built-in commands: A table of Bash-specific built-in commands. Modify Shell Behavior: Built-in commands that modify shell properties and optional behaviors. Special built-in commands: Built-in commands specially classified by POSIX. How to view all bash built-in commands that have
- LINUX 961 2024-05-09 09:10:24
-
- Cloud computing will become the core driving factor for the development of enterprise big data business
- Nowadays, business managers will inevitably see words such as “big data” or “cloud services” almost every day. To stay competitive in today's marketplace, companies must make smart business decisions that will produce real results, whether those results are helping to increase revenue, retain customers, or improve the quality of their products. Big data analytics projects are a key factor in achieving these goals. IDG defines big data as “the large amounts of information collected by enterprises from a variety of sources, including transaction data from enterprise applications/databases, social media data, mobile device data, unstructured data/documents, and machine-generated data. Wait. "IDG said: Various high-capacity, high-speed data information
- LINUX 1244 2024-05-09 08:31:11
-
- Teach you how to set up a Japanese environment in Arch Linux
- In this tutorial, we will discuss how to set up a Japanese environment in ArchLinux. In other Unix-like operating systems, setting up a Japanese layout is not a big deal. You can easily select Japanese keyboard layout from settings. However, it is a bit difficult under ArchLinux and there is no proper documentation in ArchWiki. If you are using ArchLinux and/or its derivatives such as Antergos, ManajaroLinux, please follow this guide to use Japanese in ArchLinux and its derivatives. Set up the Japanese environment in ArchLinux First, in order to view Japanese characters correctly, install the necessary Japanese fonts: sudopacman-Sad
- LINUX 1162 2024-05-08 09:20:15
-
- How to boot into the Linux command line
- There may be times when you need or want to start Linux without using the GUI (graphical user interface), that is, without X, but choose the command line. Whatever the reason, fortunately, booting directly into the Linux command line is very simple, and it requires a simple change in the boot parameters after the other kernel options. This change boots the system to the specified runlevel. Why do we do this? If your system is unable to run Xorg due to an invalid configuration or a corrupted display manager or any situation that would prevent the GUI from booting properly, booting to the command line will allow you to troubleshoot by logging into a terminal (assuming you know how to do that). and can do whatever you need it to do. Booting into the command line is also a good terminal to familiarize yourself with
- LINUX 1364 2024-05-08 09:13:11
-
- cURL vs. wget: Which one is better for you?
- When you want to download files directly through the Linux command line, two tools immediately come to mind: wget and cURL. They have many of the same features and can easily accomplish some of the same tasks. Although they have some similar features, they are not exactly the same. These two programs are suitable for different situations and have their own characteristics in specific situations. cURL vs wget: Similarities Both wget and cURL can download content. This is how they are designed at their core. They can both send requests to the Internet and return requested items. This can be a file, image, or something else like the raw HTML of the website. Both programs can make HTTPPOST requests. This means they can all send
- LINUX 1702 2024-05-07 09:04:17