国产av日韩一区二区三区精品,成人性爱视频在线观看,国产,欧美,日韩,一区,www.成色av久久成人,2222eeee成人天堂

Home System Tutorial LINUX Modify hosts file and hostname: easily realize domain name and IP address mapping

Modify hosts file and hostname: easily realize domain name and IP address mapping

Aug 08, 2024 am 01:54 AM

修改 hosts 文件和 hostname:輕松實(shí)現(xiàn)域名與 IP 地址映射

Table of Contents

1. Modify the hosts file. The hosts file is a LINUX configuration file under /etc. Delete the directory and record the IP address corresponding to the domain name or host name. Every computer on the Internet will have an IP address, which is similar to a specific door steel number. This machine can be accessed through the IP address. However, it is difficult to remember the IP addressLinux hosts file modification, so you can use the method of mapping the IP address with the domain name to access the specific host by accessing the domain name. The hosts file records this mapping relationship. Change hosts:

, first ping Baidu and get an ipvim/etc/hosts

修改文件軟件免費(fèi)下載_修改文件類型_linux hosts文件修改

, put the IP copied above into hosts where baidubaidu1 leads to the previous IP

2. Modify hostname. Hostname is the hostname of this machine. When managing multiple machines, it is easier to distinguish and check the hostname: hostname

Temporarily change hostname: hostname new name,

linux hosts文件修改_修改文件軟件免費(fèi)下載_修改文件類型

, these methods are to temporarily change the linux hosts file modification, you can also pass sysctlhostname=new name,

, these changes will not be displayed in the host name in this terminal, you can see it by opening another terminal

, the host name has been changed. Change the host name permanently: vim/etc/sysconfig/network--》

linux hosts文件修改_修改文件軟件免費(fèi)下載_修改文件類型

Linux command list, just change the HOSTNAME value. The computer needs to be restarted. When the system starts, it will read the HOSTNAME in /etc/sysconfig/network and write it to /proc/sys/kernel/hostname as the current host name. The above sysctl changes the current host name, that is, The value of /proc/sys/kernel/hostname. 3. Grant root permissions. Sometimes it is necessary to grant root permissions to ordinary users and allow them to use some root commands. At this time, the sudoer file can be changed so that some users can use sudo to execute the root command useraddchicken to create a new ordinary user chicken and passwdchicken to set chicken. Password vim/etc/sudoers change sudoer file

修改文件類型_linux hosts文件修改_修改文件軟件免費(fèi)下載

, add a line of chicken to make the configuration take effect in source/etc/sudoers and then switch the user suchchicken

Unable to execute yum without root identity,

, sudoyum can be used 4. Linux firewall to check the firewall status serviceiptablesstatus, temporarily turn off, start and restart the firewall serviceiptablesstop|start|restart to check the manual start status of the firewall

修改文件類型_linux hosts文件修改_修改文件軟件免費(fèi)下載

Turn off and enable firewall auto-start chkconfigiptablesoff|on

5. Open the port vim/etc/sysconfig/itpables and change the iptables configuration file if you want to open the redis port 6379

, add a line to serviceiptablesreload

The above is the detailed content of Modify hosts file and hostname: easily realize domain name and IP address mapping. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Install LXC (Linux Containers) in RHEL, Rocky & AlmaLinux Install LXC (Linux Containers) in RHEL, Rocky & AlmaLinux Jul 05, 2025 am 09:25 AM

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

Clear Linux Distro - Optimized for Performance and Security Clear Linux Distro - Optimized for Performance and Security Jul 02, 2025 am 09:49 AM

Clear Linux OS is the ideal operating system for people – ahem system admins – who want to have a minimal, secure, and reliable Linux distribution. It is optimized for the Intel architecture, which means that running Clear Linux OS on AMD sys

7 Ways to Speed Up Firefox Browser in Linux Desktop 7 Ways to Speed Up Firefox Browser in Linux Desktop Jul 04, 2025 am 09:18 AM

Firefox browser is the default browser for most modern Linux distributions such as Ubuntu, Mint, and Fedora. Initially, its performance might be impressive, however, with the passage of time, you might notice that your browser is not as fast and resp

How to Hide Files and Directories in Linux How to Hide Files and Directories in Linux Jun 26, 2025 am 09:13 AM

Do you sometimes share your Linux desktop with family, friends, or coworkers? If so, you may want to hide some personal files and folders. The challenge is figuring out how to conceal these files on a Linux system.In this guide, we will walk through

How to create a self-signed SSL certificate using OpenSSL? How to create a self-signed SSL certificate using OpenSSL? Jul 03, 2025 am 12:30 AM

The key steps for creating a self-signed SSL certificate are as follows: 1. Generate the private key, use the command opensslgenrsa-outselfsigned.key2048 to generate a 2048-bit RSA private key file, optional parameter -aes256 to achieve password protection; 2. Create a certificate request (CSR), run opensslreq-new-keyselfsigned.key-outselfsigned.csr and fill in the relevant information, especially the "CommonName" field; 3. Generate the certificate by self-signed, and use opensslx509-req-days365-inselfsigned.csr-signk

How to extract a .tar.gz or .zip file? How to extract a .tar.gz or .zip file? Jul 02, 2025 am 12:52 AM

Decompress the .zip file on Windows, you can right-click to select "Extract All", while the .tar.gz file needs to use tools such as 7-Zip or WinRAR; on macOS and Linux, the .zip file can be double-clicked or unzip commanded, and the .tar.gz file can be decompressed by tar command or double-clicked directly. The specific steps are: 1. Windows processing.zip file: right-click → "Extract All"; 2. Windows processing.tar.gz file: Install third-party tools → right-click to decompress; 3. macOS/Linux processing.zip file: double-click or run unzipfilename.zip; 4. macOS/Linux processing.tar

How to Burn CD/DVD in Linux Using Brasero How to Burn CD/DVD in Linux Using Brasero Jul 05, 2025 am 09:26 AM

Frankly speaking, I cannot recall the last time I used a PC with a CD/DVD drive. This is thanks to the ever-evolving tech industry which has seen optical disks replaced by USB drives and other smaller and compact storage media that offer more storage

How would you debug a server that is slow or has high memory usage? How would you debug a server that is slow or has high memory usage? Jul 06, 2025 am 12:02 AM

If you find that the server is running slowly or the memory usage is too high, you should check the cause before operating. First, you need to check the system resource usage, use top, htop, free-h, iostat, ss-antp and other commands to check CPU, memory, disk I/O and network connections; secondly, analyze specific process problems, and track the behavior of high-occupancy processes through tools such as ps, jstack, strace; then check logs and monitoring data, view OOM records, exception requests, slow queries and other clues; finally, targeted processing is carried out based on common reasons such as memory leaks, connection pool exhaustion, cache failure storms, and timing task conflicts, optimize code logic, set up a timeout retry mechanism, add current limit fuses, and regularly pressure measurement and evaluation resources.

See all articles