Linux就该这么学 第2版return recode-sr-latin repquota rev red request-key [root@linuxprobe~]# reb[root@linuxprobe~]# reboot 在上面的实验中,先输入了两个字母 re,随后敲击了两下 Tab Checkkeys.sh,提示用户输入一个字符并将其赋值给变量 KEY, 然后根据变量 KEY 的值向用户显示其值是字母、数字还是其他字符。 [root@linuxprobe~]# vim Checkkeys.sh #!/bin/bash read -p "请输入一个字符,并按 Enter 键确认:" KEY case "$KEY" in [a-z]|[A-Z]) 192.168.10.10 The authenticity of host '192.168.10.10 (192.168.10.10)' can't be established. ECDSA key fingerprint is SHA256:5d52kZi1la/FJK4v4jibLBZhLqzGqbJAskZiME6ZXpQ. Are you sure you want to continue 0 码力 | 552 页 | 22.25 MB | 1 年前3
Ubuntu Desktop Guideabout using Unity and your Ubuntu desktop. First we will take a moment to look at some of Unity's key features, and how you can use them. Getting started with Unity The Launcher The Launcher appears using the Ubuntu Desktop Guide. Use the Launcher to start applications The Launcher is one of the key components of the Unity desktop. When you log in to your desktop, it will appear along the left-hand Launcher. This icon has the Ubuntu logo on it. For faster access, you can just press the Super key. To hide the Dash, click the top icon again or press Super or Esc . Search everything from the0 码力 | 1709 页 | 5.81 MB | 1 年前3
ubuntu server guidenew users How-to guides Step-by-step guides covering key operations and common tasks Explanation Concepts - discussion and clarification of key topics Reference Technical information - package specifications updates 3 changing-package-files Changing package files 2 Network 3 network-introduction Networking key concepts 3 network-configuration Configuring networks 3 network-dhcp About DHCP 3 network-ntp Time starts telling you what key to press for settings or a boot menu. Depending on the manufacturer, this could be Escape, F2, F10 or F12. Simply restart your computer and hold down this key until the boot menu0 码力 | 486 页 | 3.33 MB | 1 年前3
Ubuntu Server Guide 18.04Download the appropriate ISO file from the Ubuntu web site4. • Boot the system from media (e.g. USB key) containing the ISO file. • At the boot prompt you will be asked to select a language. • From the type ASCII characters, so if the layout you select does not allow that, you will be prompted for a key combination to switch between a layout that does and the one you select. The default keystroke for Download the appropriate ISO file from the Ubuntu web site7. • Boot the system from media (e.g. USB key) containing the ISO file. • At the boot prompt you will be asked to select a language. • From the0 码力 | 413 页 | 1.40 MB | 1 年前3
Ubuntu Desktop Training 2009Development and the Community ......................................... 8 1.4. Ubuntu and Microsoft Windows: Key Differences ............................................... 10 1.4.1. Installation .............. OpenOffice.org Math ................ 96 4.2. Using OpenOffice.org Writer ............... 97 4.2.1. Key Features of OpenOffice.org Writer ....................... 97 4.2.2. Performing Basic Word-Pro- cessing ................................. 98 4.3. Using OpenOffice.org Calc ................ 111 4.3.1. Key Features of OpenOffice.org Calc ........................ 111 4.3.2. Performing Basic Spreadsheet Tasks0 码力 | 428 页 | 57.45 MB | 1 年前3
User guide to IPC/DEBIAN10-81A-64 – a 64-bit Debian Linux
by Syslogicscreen. GRUB will list the installed kernel versions in a blue menu, one per line. Press the return key or wait 5 seconds to launch the default kernel. The preinstalled Kernel is the 4.19.0-6-rt-amd64, dictionary for ispell …. The first row is the packet action: u=unknown, i=install, r=remove (delete without config), p=purge (delete with config) The second row is the current packet status: n=not0 码力 | 24 页 | 468.63 KB | 1 年前3
Cilium v1.8 DocumentationLinux Distribution Compatibility Matrix Linux Kernel Required Kernel Versions for Advanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running cilium-health cilium-operator cilium-operator-aws cilium-operator-azure cilium-operator-generic Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.5 DocumentationExtensions Administra�on System Requirements Summary Linux Distribu�on Compa�bility Matrix Linux Kernel Key-Value store clang+LLVM iproute2 Firewall Rules Privileges Upgrade Guide Running a pre-flight DaemonSet Command examples: Kubernetes examples: Command Reference cilium-agent cilium cilium-health Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presenta�ons Podcasts allowing to validate the iden�ty at the receiving node. Security iden�ty management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 740 页 | 12.52 MB | 1 年前3
Cilium v1.10 DocumentationDistribution Compatibility & Considerations Linux Kernel Required Kernel Versions for Advanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running cilium-health cilium-operator cilium-operator-aws cilium-operator-azure cilium-operator-generic Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 DocumentationLinux Distribution Compatibility Matrix Linux Kernel Required Kernel Versions for Advanced Features Key-Value store clang+LLVM iproute2 Firewall Rules Mounted eBPF filesystem Privileges Upgrade Guide Running cilium-health cilium-operator cilium-operator-aws cilium-operator-azure cilium-operator-generic Key-Value Store Key-Value Store Layout Leases Debugging Further Reading Related Material Presentations Podcasts to validate the identity at the receiving node. Security identity management is performed using a key-value store. Secure access to and from external services Label based security is the tool of choice0 码力 | 1263 页 | 18.62 MB | 1 年前3
共 68 条
- 1
- 2
- 3
- 4
- 5
- 6
- 7













