Linux kernel practices

Kernel version: 2.6.34 Realize the idea: The flow of messages in the network protocol stack, for the reception, is the message of the process of shelling, because the message is known as input, as long as the resolution of the protocol number, for

Linux kernel Analysis

Kernel version: 2.6.34 This section focuses on three core data structures-the neighbor table, the neighbor cache, the Proxy neighbor table, and the Nud state transition diagram. In general, to successfully add a neighbor table entry, you need to

Linux kernel Analysis

Kernel version: 2.6.34 This is about the IP layer protocol to receive the message processing, highlighting the routing table lookup, and IP fragmentation reorganization. IP_RCV into IP Shong receive function Discard the message is not sent to

Linux Basics Command (7) MV command

MV command is the abbreviation for move, which can be used for moving files or renaming files (rename), is a commonly used command in Linux systems and is often used to back up files or directories. 1. Command format: MV [option] source file or

Recursive locking of Linux thread synchronization

Overview The most common process/thread synchronization methods are mutexes (or mutex), read-write Locks (rdlock), conditional variables (cond), semaphores (Semophore), and so on. In Windows systems, critical sections (Critical section) and Event

Introduction to the file descriptor under Linux

In the C program, the file is represented by a file pointer or a file descriptor. ISO C's Standard i/0 library functions (fopen, Fclose, Fread, Fwrite, fscanf, fprintf, etc.) use file pointers, Unix I/O functions (open, close, read, write, IOCTL)

To test disk read and write speed with the DD command under Linux

The current mode of mechanical disk operation, mainly reflected in the disk reading and writing to find the track of the process, the disk caching function for reading and writing speed is very important. Disk search process is a mechanical way, so

How to speed up running Ubuntu Linux on an old machine

Absrtact: Regardless of whether your Ubuntu 13.10 system is reinstalled or upgraded from a previous version, you should feel the system starting to slow down after using it for a while. In this article, we'll learn some tips to make your Ubuntu run

Linux command line pipeline

The pipe operator "|"can send the standard output of a command (stdout)to the standard input (stdin) of another command. Filters (Filter)is the combination of multiple commands to form a pipe. Main commands: Sort : sorting; Uniq, UNIQue, Output

Securing Apache sites under Linux

With the mature application of lamp environment, the security of the Apache site has also been proposed, and sometimes because of the various causes of accidents, will lead to some information inside the site leakage, as unnecessary trouble. So

Linux kernel and kernel buffer technology detailed

Introduction to Linux Kernel Now let's look at the architecture of the Gnu/linux operating system from a relatively high altitude. You can consider the operating system from two levels, as shown in Figure 2. Figure 2. Basic architecture of

Linux becomes the most popular operating system for supercomputers

In the latest global Top 500 supercomputer rankings, Linux based supercomputers occupy 476 seats, up from 95.2%. Today Linux has become a eminence in supercomputing, but since its inception, Linux has not always been the dominant position in the

Use of Linux LVM raw devices

1. Create PV PVCREATE-M2--metadatasize 100M/DEV/SDA PVCREATE-M2--metadatasize 100M/DEV/SDB1 PVCREATE-M2--metadatasize 100M/DEV/SDB2 PVCREATE-M2--metadatasize 100M/DEV/SDC The physical volume can be an entire hard disk (LUN) or a partition on

Linux User Process Memory space detailed

You often use the top command to understand process information, including information about memory. The command top Help document explains each field in this way. Virt, Virtual Image (KB) RES, resident size (KB) SHR, Shared Mem size (KB) %mem,

Some problems needing attention in Linux system security

Write in front: When you deploy a server, the first step should not be to deploy the application, security is the first task If one day when you log on to the server discover /bin/bash–i, python-c ' Import pty; Pty.spawn ("/bin/sh") command appears

Linux Common Commands-mkdir

The Linux mkdir command is used to create a directory of the specified name, requiring the user who created the directory to have write permissions in the current directory, and the specified directory name cannot be a directory that is already in

Linux Network Programming IO multiplexing

Refer to "Linux High Performance Server Programming"When dealing with multiple connections under Linux, it is inefficient to use only multithreading and raw socket functionsThen there is the SELELCT poll Epoll and other IO multiplexing

CentOS Nic startup, configuration and other ifcfg-eth0 tutorials

CentOS Nic startup, configuration and other ifcfg-eth0 tutorials Step 1 configure the file in/etc/sysconfig/network-scripts/ifcfg-eth0. It power CentOS under the ifcfg-eth0 configuration details: [root@localhost ~]# vim

Apache + ssl + ca, apachessl

Apache + ssl + ca, apachesslStep 1: Set up an apache server. In the previous blog, you have completed the installation of SSL at http://www.cnblogs.com/sangmu/p/6422238.html #: yum install mod_ssl -y iptables -I INPUT 1 -p tcp --dport 443 -j

Node. js ~ Deployment on linux and node. jslinux

Node. js ~ Deployment on linux and node. jslinux The following uses centOS as an example to deploy the node. js environment. Start centos and download the node. js package. curl --silent --location https://rpm.nodesource.com/setup_6.x | bash - yum

Total Pages: 5467 1 .... 1336 1337 1338 1339 1340 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.