linux以binary形式get文件,详解linux采用binary方式安装mysql

5268f80b9b1e01f982625ef6fac83ca1.png

本文主要为大家详细介绍了linux采用binary方式安装mysql步骤,具有一定的参考价值,感兴趣的小伙伴们可以参考一下,希望能帮助到大家。

1、下载binary文件

在官网上下载 mysql-5.6.36-linux-glibc2.5-i686.tar.gz.

2、解压文件并移动到/usr/local/mysql目录下

tar -zxvf mysql-5.6.36-linux-glibc2.5-i686.tar.gz

3、创建用户组和用户并配置

groupadd mysql

useradd mysql -g mysql

chown -R mysql /usr/local/mysql/

chgrp -R mysql /usr/local/mysql/

4、安装及初始化

#安装mysql

/usr/local/mysql/scripts/mysql_install_db --user=root

#配置mysql启动文件

cp /usr/local/mysql/support-files/my-default.cnf /etc/my.cnf

#将mysqld服务添加到系统中

cp /usr/local/mysql/share/mysql/mysql.server /etc/init.d/mysqld

#将mysql命令软链接到系统命令中

ln -s /usr/local/mysql/bin/mysql /usr/bin/mysql

5、启动服务测试

service mysqld start

mysql -u root

相关推荐:

MySQL 二进制日志(Binary Log)

Java数据结构中关于二分查找法binarySearch的实例

Linux环境下安装MySQL5.6的图文教程

Key Features Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes Book Description Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them. The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis. This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker. Table of Contents Chapter 1. The Linux Environment and Its Tools Chapter 2. The ELF Binary Format Chapter 3. Linux Process Tracing Chapter 4. ELF Virus Technology – Linux/Unix Viruses Chapter 5. Linux Binary Protection Chapter 6. ELF Binary Forensics in Linux Chapter 7. Process Memory Forensics Chapter 8. ECFS – Extended Core File Snapshot Technology Chapter 9. Linux /proc/kcore Analysis
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值