current location:Home > Technical Articles > System Tutorial > LINUX
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to solve the problem of permission denied when executing .sh file under Linux
- ###Answer 1: This kind of situation is generally caused by insufficient file permissions. Under Linux, you can use the chmod command to modify file permissions. If you want to add executable permissions to the .sh file, you can use the following command: ```chmod+xfilename.sh``` where filename.sh is the name of the .sh file you want to execute. After executing this command, you should be able to execute your .sh file with linux execution permissions. If you still cannot execute the file with linux execution permissions, it may be because you do not have sufficient permissions to execute the file. You can use the sudo command to execute the file as an administrator. Such as:```sudo./filename
- LINUX 437 2024-07-22 06:13:31
-
- 13 Practical Git Tips
- In honor of Git's 13th birthday, here are 13 tips and tricks to make your Git experience more useful and powerful. Start with some basics you might have overlooked and expand to some real power user tips! 1. Your ~/.gitconfig file When you try to use the git command to submit a change to the repository for the first time, you may receive this welcome message: ***Pleasetellmewhoyouare.Rungitconfig--globaluser.email"you@example .com"gitconfig--globaluser.name"YourN
- LINUX 844 2024-07-21 20:21:41
-
- Use Memcached as session server to maintain session
- Three ways to maintain sessions: Sessionsticky session binding: By implementing a unified session in the configuration of the front-end scheduler and sending it to the same back-end server. Sessioncluster Session cluster: By configuring Tomcat to keep the information of all Tomcat sessions consistent. Sessionserver session service: Hand over all sessions to specialized session service management. Here we explain the third type, using Memcached as session server. 1. Architecture diagram. System environment. All servers use CentOS7.3. All required software packages. The following files must be placed on the tomcat server host.
- LINUX 1198 2024-07-21 20:03:32
-
- Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?
- Recently, a buffer overflow vulnerability was exposed in the gethostbyname function of the Linux GNU glibc standard library. The affected versions are Glibc 2.2 to 2.17, including versions 2.2 and 2.17. If you are using a Linux server, check to see if your Linux server has this vulnerability. The following is a simple Linux glibc version checking technique. How to check the glibc version in centos using linuxfind. The following editor will take centos6.3 of the Linux system as an example to teach you how to check the glibc version. First use the putty tool to log in to the Linux server, and then type the command: rpm-qa|grepglib
- LINUX 843 2024-07-21 13:56:39
-
- Linux file permission settings and functions: Learn more about file classification and permissions
- File permission settings and their effects under Linux File permissions and ownership (read, write, execute permissions) Everything in the Linux system is a file. To talk about permissions, it is necessary to first understand the classification of files. File classification in Linux Everything in the Linux system is It is a file, and the file types are different, as follows: Symbol representation represents file type ordinary file directory file link file block device file character device file pipeline file network device door (Solaris) It provides a new way to socket linux execution permissions, File used for communication between client and server application processes. You can hear the read, write, and execution permissions of some file types from the picture below. The picture below shows that the file type is an ordinary file. The user
- LINUX 743 2024-07-21 10:24:31
-
- Centos7.3 Mariadb database export and import commands
- There are many solutions for exporting mariadb database, generally using phpmyadmin or Navicat for MySQL, etc. I will demonstrate the commonly used command line mode. They are; -u user, -p password, database name, > export path. Ending with .sql. /usr/local/mysql/bin/mysqldump-uroot-prenwole>/home/renwole.sql Enter the user password after pressing Enter. The export is successful and the file is under home. Note: If you only export the table structure, add -d after -p. There are 2 solutions for importing the database. Solution 1 MariaDB[(none)]>
- LINUX 379 2024-07-21 10:20:58
-
- Embedded bootloader development: practice from Shangguan Video to Friendly Arm development board
- I was watching the embedded bootloader development video released by Shangguan. It sounds very good and I can basically do it. However, I only have the Linux installation on the Friendly Arm TIny6410 development board. Fortunately, the u-boot has already been transplanted on this development board. But the SOC is similar to what is said in the video, one is 2410 and the other is 6410. It’s just that the former is based on ARM11, while the latter is the older ARM9. First set up the development environment, centos6.4x64 version, the system is relatively new minicom installation: yum -yinstallminicomminicom settings: minicom -s removes the hardware control bits and sets the bit rate and data transfer mode, but note
- LINUX 853 2024-07-20 15:56:01
-
- First introduction to Google Kubernetes Engine (GKE)
- However, so far there are very few cloud service providers that can provide k8s full hosting services. Even AWS, which currently dominates the cloud provider market, does not fully provide k8s hosting services and only provides limited customized services. In this regard, Not mature. However, Google's k8s hosting service, GKE, has taken the k8s hosting service to the extreme (at least for now). It not only provides a full set of k8s hosting services, but what is even more striking is that Google has integrated Autoscaler and k8s to achieve The automatic scaling mechanism of k8s nodes can automatically add or delete nodes according to the needs of pods. When existing nodes cannot carry new services, nodes will be automatically added to meet the demand. When existing nodes are idle enough
- LINUX 795 2024-07-20 10:52:01
-
- Getting started with DockerHub
- You can also use the publicly released official Docker image. I use a lot of these images, including for my experimental WordPress environment, KDEplasma applications, and more. Although we learned how to create your own Docker image last time, you don't have to. Thousands of images are published on DockerHub for you to use. DockerHub is hard-coded into Docker as the default repository, so when you run the dockerpull command on any image, it will be downloaded from DockerHub. Download the image from DockerHub and run it locally to get started. Check out the previous articles in this series to get started. Then, once Docker is running on your system
- LINUX 619 2024-07-20 09:09:19
-
- Relevant introduction and operation framework analysis of high-precision timers
- The sudden mention of high-precision timers is confusing, and at least beginners will be frustrated. And if you understand it literally, it is very simple. If the timer is less precise, then there will be no more. Although that's pretty much it, it just involves some other details. If you want to do your job well, you must first sharpen your tools. Before we start, let’s sharpen the tools first: 2. Several related source code files and their paths are as follows: Hrtimers.txt (linux-3.2.12documentationtimers) Hrtimer. c(linux-3.2.12kernel)Hrtimer.h(linux-3.2.12includelinux)
- LINUX 457 2024-07-20 08:36:00
-
- Linux gunzip command example explanation
- For starters, the gzip tool is mainly used to compress or expand files. When decompressing, just add the -d option after the gzip command. The usage example is as follows: gzip-d[compressed-file-name] However, when decompressing or expanding the compressed file created by gzip, there is another completely different tool. for use. The tool in question is gunzip. In this article, we will explain the usage of gunzip command using some simple and easy-to-understand examples. All examples and guides in this article are tested in Ubuntu16.04 environment. Linux gunzip command We now know that compressed files can be decompressed using gzip-d or gunzip command. basicg
- LINUX 1076 2024-07-20 08:00:49
-
- Do you know the simple way to check IP in Linux system?
- A simple way to check IP in Linux system In Linux system, we generally know that IP is the network address Linux space on the computer, and it is not easy to know how to check IP. Sometimes, we need to check the IP either logged in to the local machine or the remote server. So, next we will introduce a simple way to check the IP in the Linux system. 1. Use the ifconfig command. The ifconfig command is the most commonly used tool in Linux for viewing IP addresses. This command comes with most distributions of Linux. Through the ifconfig command, we can see the network of all network cards on the machine. information, as well as associated status, such as IP, subnet segment, etc., and you want to check
- LINUX 523 2024-07-20 06:32:51
-
- Mariadb learning summary (5): database table constraints and three paradigms
- The three major database paradigms (NF): When designing a relational database, follow different normative requirements to design a reasonable relational database. These different normative requirements are called different paradigms. Various paradigms present sub-norms, the higher the The less redundant the paradigm database is. However, sometimes blindly pursuing paradigms to reduce redundancy will actually reduce the efficiency of data reading and writing. At this time, it is necessary to reverse the paradigm and use space to trade time. It can be roughly understood as the level of a certain design standard that the table structure of a data table conforms to. 1NF means that the columns of the table are atomic and cannot be decomposed, that is, the column information cannot be decomposed, as long as the database is a relational database (mysql/oracle/db2/informix/sysbase/sq
- LINUX 377 2024-07-20 03:00:00
-
- Detailed steps to solve slow SSH login in Linux system
- When we installed the Linux system, we did not close a service. As a result, we had to wait for a while before entering the password after entering the user name when logging in to SSH. The following solutions can be summarized to solve this problem. Modify the following two places in sshd_config and restart ssh. #vi/etc/ssh/sshd_configGSSAPIAuthenticationnoUseDNSnoRestart ssh#systemctlrestartsshd The above can be solved perfectly.
- LINUX 1104 2024-07-19 20:58:51
-
- toss! Running DOS on Raspberry Pi
- Different CPU architectures mean that running DOS on the Raspberry Pi is not easy, but it is not much trouble. FreeDOS may be familiar to everyone. It is a complete, free and well-compatible operating system for DOS. It can run some older DOS games or commercial software, and can also develop embedded applications. As long as the program can run on MS-DOS, it can run on FreeDOS. As the initiator and project coordinator of FreeDOS, many users will ask me questions as an insider. The question I get asked most often is: "Can FreeDOS run on a Raspberry Pi?" This question is not surprising. After all, Linux runs very well on the Raspberry Pi
- LINUX 1030 2024-07-19 17:23:10