File list:Code Files
/* The following code is saved to Plus.cpp *
/int my_plus (int x,int y)
{return
x + y;
}
/* The following code is saved to minus.cpp
/int my_minus (int x,int y)
{return
xy;
}
/* The following code is
The listen system allows a TCP socket on one host to be passively listening on a port number, waiting for a connection request from a TCP socket from another host, and the following is the function prototype of the LISTEN system call:
#include int
the diagram of the documents in the process of generating configure
second, Detailed introduction
AutoScan: Scan the source code to search for common portability issues, such as checking compilers, libraries, headers, etc., generate file
Mind map of the "Brother Bird's Linux private dishes basic article-third edition"
The man who is called L
Original link: http://www.jianshu.com/p/ec06e1ace0bd description
Use the mind map Mindjet MindManager made the "Brother Bird's Linux
The sudo permissions under Linux can be configured by/etc/sudoers this file,However, this file is read-only and cannot be modified by ordinary users.There is a visudo order, specifically to change the/etc/sudoers.
Here is a configuration experiment,
The first time in Linux installed on the MATLAB r2009a, in order to solve the Chinese garbled problem, refer to the article, the general system may follow the following articles to do, Chinese garbled should be able to solve, but I did not solve, I
1.Mitmproxy
Mitmproxy is an HTTP proxy tool that can be used for man-in-the-middle attacks or for HTML scratch-wrap debugging
2.BP
Use more, do not describe
3.owasp-zap
Zed Attack Proxy is Zap, is a simple and easy-to-use penetration testing tool,
V4L2 Linux driver Framework for 6467T VPIF
In Linux, the V4L2 framework is used to manage video capture devices. The V4L2 framework consists mainly of two layers: V4l2device and V4l2 subdevice, where V4L2 device is a virtual device to manage V4l2
1.Valgrind Introduction
1. One of the most common mistakes when we write C + + is memory leaks, which are inextricably linked to programmers ' programming habits. If you are applying for memory space, you can immediately release the memory in the
Sometimes in our current shell, there is an alias command available, but when we sh script.sh or./script.sh, we find the error alias command not found problem.
What the hell is going on here? Because when you execute a new script with the current
Introduction to login Files
The login file records the activity information of the system, and by analyzing the information, we can solve the system errors and network problems. Login files are generally in the /var/log/ directory, in general
"ARM Linux development-warewin 2G/3G Wireless Transmission (DTU) and routers-notes"
Linux system, start Uboot First, then load Linux kernel and application. Start Uboot when the Uboot NIC driver started up, but after the kernel loaded uboot no
Prepare for Work
[Root@centos-01 ~]# cd/tmp/[root@centos-01 tmp]# ls 1.txt
Systemd-private-40c0e692674844949b91361dc6ab4a40-chronyd.service-6km7k9
Systemd-private-40c0e692674844949b91361dc6ab4a40-vgauthd.service-3w1kyg Systemd-private-40c0e6926748
1th Chapter yum1.1 Command descriptionYum is a RPM-based package Manager that enables system managers to interact and automate finer and more granular management of RPM packages, and he can automatically download RPM packages from the server and
Hard disk is one of the important components of computing, hard disk for the operating system to provide persistent memory, the performance and quality of Linux hard disk devices may be related to the security of the build line and user experience,
Linux 13th DayTime: 20180730Text Manipulation Command Learning/dev/urandom a device that generates random charactersCat/dev/urandom |TR-DC ' [: alnum:][:p rint:] ' |head-c10 output a random stringDo password usePaste outputs the contents of two
1 Tools for extracting textFile content: Less and catFile interception: Head and tailExtract by column: CutExtract by keyword: grep1.2 File ViewFile View command:Cat,tac,revCat [OPTION] ... [FILE] ...-E: Display line terminator $-N: Numbering each
CENTOS6 Yum installation related problems and handling
To use Yum to download files, suddenly yum can not download the desired files, want to change the Yum source, the result is to reinstall Yum
From my github address
Why connect to Linux remotelyIn the actual work scenario, the virtual machine interface or physical server local terminal is very little contact, because the server installed after the system, the IDC room hosting, if the purchase of the cloud host,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service