As we saw in the last article TTY: What is? What’s the use? . If you think you do not need as many TTY as those available by default in your environment. I agree, and it affects a little performance of your linux .. but rather it. Certainly for those who need the full potential of a machine that will make a difference.
There are ways you can decrease the amount of TTY of their distribution here will decline to 3 the device files , if you want to you can change as you wish, just following the logic, and steps.
Very simple, TTY is an abbreviation for teletypewriter. Do not understand? You for sure have used .. If you use linux .. if you do not close that uses your internet explorer .. and look for a window to play. If you use MAC makeup and go for this PC formats. Jokes aside, TTY is when you use the shortcut key
CTRL + ALT + F #
, or even when you open a terminal on your OS.
There are several ways of update date and time in linux , among which the simplest are:
Easier however, there is the need to have internet connection, and ntpdate installed.
If you do not have ntpdate installed you can install from source: http://www.ntp.org/downloads.html , or whether you have the aptitude:
aptitude install ntpdate
Continuing the previous topic .. the main Subversion commands.
I think anything more than a simple “help” to learn all the commands. The “help” of subversion, is cooler than the others because it provides help with svn commands. For example:
svn help update
Subversion is a control system version free / open-source. That is, Subversion manages files and directories, and the changes made to them over time. This allows you to recover older versions of your data, or examine the history of their changes. Because of this, many people think of a version control system as a sort of “time machine”.
Subversion can operate across networks, which allows it to be used by people on different computers. On one level, the ability for various people to modify and manage the same set of data from their respective locations fosters collaboration. Progress can occur more quickly without a single conduit through which all modifications must occur. And because the work is versioned, you need not fear that their work quality for not miss this one for changes via the data suffers an improper modification, just undo that change.
Deb is the Debian package or as an ‘installer’ for Debian-based distributions. There are two types of Debian packages, both with the same functionality to implement certain command, resource or resources.
Permissions on Linux, is the main "feature" of Unix-based systems. They are used in different ways and for different purposes. But mostly for safety and organization of a system.
Through the permissions, you can define who can access, write and execute a file. Any per group, or per-user. With permissions, Linux prevents a malicious program, for example, delete a file that should not send special files to someone else or provide network access for other users to invade the system.
Let us understand better, and learn how to change and check the permissions of certain directory or file.
To check the permissions of a file or directory, it is common to use the command ls with parameter -l , it’s will discover with the permissions and owners of files and directories .
ls -l /home/vinicius/tmp/
Returns me the result:
total 4 -Rw-r - r - 1 vinicius vinicius 0 Nov 22 12:59 index.html lrwxrwxrwx 1 vinicius vinicius 15 Nov 22 12:59 link -> / home / vinicius / drwxr-xr-x 2 vinicius vinicius 4096 Nov 22 24:59 test -Rwxrwxrwx 1 vinicius vinicius 0 Nov 22 13:00 test_777
Okay? Ta thinking this is a lot of loose letter right? Let us understand what each part of it means.
To know what each item is, just look at the first letter.
You noticed that these letters are being repeated throughout the list of ls, each has its meaning:
Ready now know the meaning of each letter, we can now interpret the results of ls command. We can divide the result into 3 parts, let's take the first line as an example:
rw- | r - | r -
Each group of 3 characters means this order, the permission for the owner, permissions for the group that owns the file owner and permissions to other users.
Reading data only allowed -rw-r – r – , we can identify that a file is that the file owner has read and write permission, and that the other ( group and others) allowed only read.
Each letter has its corresponding bit, which can be identified as follows:
|– x||001||1||Execute permission|
|wx||011||3||write and execute permission|
|r –||100||4||Read Permission|
|rx||101||5||Readable and execution|
|rw-||110||6||Permission reading and writing|
Using the above table if we can change the permission of files and directories with the chmod.
The syntax of the command chmod:
chmod 777 test.txt
chmod 444 test.txt
chmod 644 test.txt
besides using chmod permissions with numbers , there is also possibility to use the most boring form of letters . Where we need to understand that
With this we can use the chmod as follows :
chmod u + x test.txt
chmod g+ r test.txt
As I said earlier , the permission 777 is the full permission to something , ie everyone can edit, delete , write . Imagine a file with permission 777 where everyone can edit it , someone with malicious intentions can edit your file , and run it , you can steal valuable information , run something on your operating system and erase data . So it is normal if you use permission 755 for directories and 644 for non-executable files such as php files on hosting servers .
Even this is something that some servers block with suPHP , whenever you have getting error 403 , first check the permissions of your files and folders , as in 90% of cases the problem is this .
You can understand more about it at:
We’ll cover some more advanced forms of improve the performance of linux.
Disabling than anything, or fiddling with the interface.
I separated the 3 things that I normally use to improve my servers, and virtual machines.
For those who do not know what is ramlog … can kill yourself now. Just kidding, read the rest. Then mate.
As the name says Rams – log means store the log in the ram, instead of pouring it on disk directly. How common is used by syslog.
Thus is avoided that there is always written to disk, which is a bottleneck of performance on any server. Exist only when the ramlog is restarted or stopped.
The use of ramlog, makes a big difference in performance
Ramlog – http://www.tremende.com/ramlog site you can find the installation tutorial for various distributions.