Docker installation and common commands
1, docker installation
2. Install required packages
Yum util provides the yum config manager function, and the other two are dependent on the devicemapper driver
yum install -y yum-utils device-mapper-persistent-data lvm2
3. Set yum source
yum-config-manager --add-repo ht ...
Posted by NFWriter on Sun, 22 May 2022 00:50:52 +0300
1, Experimental purpose
Master multi process programming technology under Linux;
Visualize the concept of process by tracking the running track of process;
The algorithm can be further compared with the actual scheduling process on the basis of quantitative data, so as to further understand the scheduling algorithm and obtain the actual operat ...
Posted by jmandas on Sat, 21 May 2022 11:10:40 +0300
There are three kinds of device file systems under linux: devfs, udev and mdev.
devfs was introduced by Linux 2.4 kernel, which was highly praised by many engineers. Its emergence enables device drivers to manage their own device files independently.
Specifically, devfs has the following advantages:
1. You can create a device file in t ...
Posted by glennn3 on Sat, 21 May 2022 07:48:07 +0300
hash type and operation
The hash type in Redis can be understood as a map container with String Key and String Value, so the hash type is suitable for storing value object information. Such as Username, Password or Age. Even if there are only a few fields in the hash, its data only takes up a small amount of disk space. Each ha ...
Posted by daniel_grant on Sat, 21 May 2022 04:01:06 +0300
Common Linux operations
1. Run sh file
The first method:
First you have to open a terminal.
Then enter sudo su
Then enter the password. This has achieved root User permissions.
Then find the fileFirst, check whether the file has execution permission. If not, change the execution permission of the file, and then carry out the remaining op ...
1. Conditional test operation
(1) document test[file or directory]-d: Whether the directory is directory (test) -e: Test whether the directory or file exists (Exist) -f: Test whether it is a file -r: Test whether the current user has permission to read, -w: Test whether the current user has permission to write -x: T ...
1, Environmental installation
The first is the installation of MySQL, which is directly installed only with apt get command (this method is recommended here, because it does not need to link the relevant path when compiling later programs)
sudo apt-get install mysql-server
After my installation, the relevant header files and dynamic lib ...
Posted by posidon on Fri, 20 May 2022 01:31:35 +0300
In this tutorial, we will discuss how to restrict SFTP users to their home directory or specific directory. This means that users can only access their respective home directories, not the entire file system.
It is important to restrict users' home directories, especially in a shared server environment, so that unauthorized users will not pee ...
1. Shutdown, restart and logout commands
1.1. Shutdown, restart and logout commands
shutdown [OPTION]... TIME [MESSAGE]
shutdown [option]... time [news]
Parameter description of Shutdown command
Explanation (focus on those with *)
Restart the system instead of shutdown. T ...
Posted by AndyMoore on Wed, 18 May 2022 12:06:09 +0300
Several common ways to install software on Linux:
Source code compilationDecompress the compressed package (generally tar.gz)Compiled installation package (RPM, DPKG, etc.)Online installation (YUM, APT, etc.) The convenience of the above methods increases in turn, but the versatility decreases in turn
Delete the development ...
Posted by parkej60 on Wed, 18 May 2022 02:16:56 +0300