Tools used: Putty Small software can remotely connect to the host's small softwareThen enter the user name on the screen root password: ****** can be connected because the installation of these two tools need to compile so: the first step to install
Introduction to RPM package RPM package is in the corresponding operating system platform compiled on the package, not compiled is a bunch of source code, many new users of Linux has not been able to or self-compiled source code program is very
Background knowledge basically explained clearly, below we actually write a small example to look at. The functionality of the code is simple, displaying a line of text, and then exiting. We used the write and exit calls in Syscall to look up the
1. Inheritance of open files between Processes 1.1. To inherit open files with forkThe child process after the fork automatically inherits the open file of the parent process, and after inheritance, the parent process closes the open file without
Note the nature of the article.In fact, I want to implement my FW150US-USB wireless card function on the arm Development Board, so test the USB interface.1. Configuring the KernelDevice Drivers---> SCSI device Support---> SCSI
The concept of soft interrupts can have two different interpretations in embedded development:First, soft interrupts in the processor design is one of the processor exceptions, the program software uses the specified instruction (such as ARM's SWI
TCP Message FormatTCP (transmission Control Protocol Transmission Protocol) is a connection-oriented, reliable, byte-stream-based Transport layer communication protocol.The header of a TCP message segment has 10 required fields and an optional field.
when using Linux , sometimes because the initial disk space allocation is not estimated, the use of the mount point needs to be expanded, this requires us to mount the new disk. But if we mount the disk while Linux is running, and Linux does not
Read INI file class under Linuxon recent projects there is a need to read the INI file called INI file which is also a text document and//NOTE 1/ * NOTE 2[section]key1=aaakey2=bbbdocuments that exist in this formI wrote a class comparison using
In bash scripting, we often need to reference variables and replace the command, for the specification operation, it is now a simple summary of the description.ReferenceReferencing refers to enclosing strings in reference notation to prevent special
Xshell connects to virtual machine linux and xshell Virtual Machine linux
1. Ensure that windows and Linux can ping each other, NAT or BridgeIfconfig2. Disable The Selinux Service1. temporarily disable SELinux:Root @ server # setenforce
Analysis of linux logs and linux logs
In linux, the connection time logs are generally recorded by the/var/log/wtmp and/var/run/utmp files. However, these two files cannot be directly viewed by cat, the file is automatically updated by the system.
How to become an excellent Linux O & M personnel?
Today, I want to talk about how to become a good linux O & M personnel ?" I will analyze the current situation of the Linux industry from the following three parts and how to learn and use linux well.
View the file and folder size in Linux (df & amp; du)Df
Usage: df [Option]… [File]…Displays the information of the file system where each file is located. All file systems are displayed by default.
Common options-H,-human-readable size displayed as
CENTOS6.4 installation configuration OPENJDK-7
Test Machine installation and configurationInstall centos6.4 mini
1000 words are omitted here ......
Disable selinux
Setenforce 0
Vi/etc/sysconfig/selinux --> diabledDisable iptables
Service iptables
ExFAT and NTFS are supported in CentOS.
ExFAT:
1. Download the fuse-exfat support software:Exfat support is supported through the fuse module, its project address is: https://code.google.com/p/exfat/, the current version is: 1.0.1.Currently, exfat
JDK1.3 installation appears/lib/ld-linux.so.2: bad ELF interpreter: No such file or directory Done., badelfinterpreter
JDK1.3 was installed for the first time since its debut. It was already known as JDK1.4 when I was in college, and it was on Red
How to Use fail2ban to defend against brute force cracking attacks on SSH servers
A common attack on the SSH service is a brute-force cracking attack-remote attackers use different passwords to perform unlimited logon attempts. Of course, SSH can be
Install phpredis module extension in Ubuntu
Install phpredis module extension in Ubuntu
1. The premise is to install redis first, and then install phpredis...
2.download the phpredis-master.tar.gz installation package first...
The details are as
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service