How to Build RPM Packages

How to Build RPM Packages

Saving time and effort on installing files and scripts across multiple hosts. — David Both Useful original links Please visit the “Original Link” at the end for clickable in-text links, full-size original images, and related articles. Acknowledgments Compiled from | https://opensource.com/article/18/9/how-build-rpm-packages Author | David Both Translator | Liang Chen (Flowsnow) 🌟🌟🌟🌟 Total translated: 28.0 Contribution … Read more

Linux Server Lag Savior: Release Cache Memory to Boost Performance by 30%

Linux Server Lag Savior: Release Cache Memory to Boost Performance by 30%

To speed up operations and reduce disk I/O, the kernel typically caches as much memory as possible, which is known as Cache Memory. By design, pages containing cached data can be repurposed as needed (for example, by applications). Cache memory is not automatically released after a program finishes running. This can lead to a situation … Read more

Comprehensive Guide to Common Linux Commands

Comprehensive Guide to Common Linux Commands

1. Nginx Related Commands Check Nginx Status ps -ef|grep nginx Start Nginx cd /usr/local/nginx/sbin/ ./nginx Restart Nginx After Modifying Configuration File cd /usr/local/nginx/sbin/./nginx -s reload 2. Common Docker Commands View All Containers, Including Running and Stopped docker ps -a View All Running Containers docker ps Start a Stopped Container docker start ContainerNameOrID Restart a Container … Read more

Udev Hotplug Rules in Linux

Udev Hotplug Rules in Linux

Word count: 1104, reading time approximately 6 minutes Udev Hotplug Rules in Linux Background Udev is a tool used in Linux systems to manage device nodes. It can dynamically create device files based on the attributes of the devices and execute specific commands, typically used for handling hotplugging. Udev rules are used to specify these … Read more

Resetting Root Password in Linux: A Comprehensive Guide

Resetting Root Password in Linux: A Comprehensive Guide

In the world of Linux, the root password is like a master key to unlock the system’s treasures, holding supreme privileges. However, if this “key” is lost, it can lead to significant trouble. Imagine being excited to log into the server and showcase your skills, only to be met with the unyielding “Password incorrect” message, … Read more

Essential Linux Server Scripts

Essential Linux Server Scripts

Follow+Star Public Account Number, don’t miss exciting content System Settings Common Mirror Sources Mirror site addresses Official list provided: https://www.debian.org/mirror/list Some domestic ones: ftp.cn.debian.org mirror.bjtu.edu.cn mirror.lzu.edu.cn mirror.nju.edu.cn mirrors.163.com mirrors.bfsu.edu.cn mirrors.hit.edu.cn mirrors.huaweicloud.com mirror.sjtu.edu.cn mirrors.tuna.tsinghua.edu.cn mirrors.ustc.edu.cn Usage: (generally similar) Tsinghua Source –mirror 'https://mirrors.ustc.edu.cn/debian/' Tencent Source –mirror 'https://mirrors.aliyun.com/debian/' Aliyun Source –mirror 'https://mirrors.aliyun.com/debian/' Huawei Source –mirror 'https://mirrors.huaweicloud.com/debian/' SWAP & … Read more

How to Manage Access Control Lists in Linux

How to Manage Access Control Lists in Linux

In Linux systems, Access Control Lists (ACL) are a powerful tool for managing file and directory permissions with finer granularity. Traditional permission management uses a combination of user, group, and other with r (read), w (write), and x (execute). However, as system complexity increases, this method no longer meets the needs for complex permission control. … Read more

Summary of 150 Most Common Linux Commands

Summary of 150 Most Common Linux Commands

(Click the official account above to quickly follow) Source: Banana Tong www.cnblogs.com/bananaaa/p/7774467.html If you have good articles to submit, please click → here for details Command Description Online Query and Help Commands (2) man View command help, a dictionary of commands, more complex is info, but not commonly used. help View help for built-in Linux … Read more

In-Depth Analysis of Linux Permissions for Flawless System Management

In-Depth Analysis of Linux Permissions for Flawless System Management

Linux | Red Hat Certification | IT Technology | Operations Engineer 👇 1000 people technical exchange QQ group, note [public account] for faster approval Shell Linux is an open-source, Unix-based operating system that is widely used in servers, embedded systems, supercomputers, and desktop computing due to its flexibility, stability, and high performance. The Linux Kernel … Read more

Setting Up Sudo Passwordless Access in Linux

Setting Up Sudo Passwordless Access in Linux

In a Linux system, to set up sudo passwordless access, follow these steps: Open the sudoers file as an administrator: In the terminal, enter the command sudo visudo. This command will open the sudoers file in a safe manner, ensuring the file syntax is correct and preventing system issues due to incorrect edits. Add the … Read more