See Dr. Zhao Jiong's "Linux 0.11 source code comment" has been two or three weeks, starting from today, some personal summary and sentiment sub-standard inscribed out, chat for memory for later review.In the/linux/boot/bootsect.s of linux0.11 source
1) &Example: Ping baidu.com &This is used at the end of a command, you can put this command in the background to execute, but this is also possible because the terminal exit causes the process ye to exit2) nohup background operation ( recommended
CD commandUseful: Jump DirectoryUsage: Enter the CD plus the directory you want to jump to, here are a few thingsExample:One, enter the subdirectory of the current directoryMy current directory is/home/jim, There are a lot of folders under this
The Find command is a common file Finder tool for Linux systems, and can also be used to perform appropriate operations on files found.FormatFind [path found] [find condition] [processing action]Default behavior:Find path: Default is not specified
Linux files are usually divided into 7 major categories
File type
Abbreviation
English name
Normal file
-
Regular file
Catalog files
D
Directory file
Block device
1, configure LINUXIP address #setup2. Start the network card# Vi/etc/sysconfig/network-scripts/ifcfg-ech0Change Onboot=no to Onboot=yes3. Restart the NIC service# Service Network Resart4, set the virtual machine network connection mode (cont.)VMNET0
How does a computer work? (summary)--Three magic weapon
Stored program computer working model, the most basic logical structure of computer system;
The function call stack, the high-level language to run the foundation, only the machine
Learning Linux also has a period of time, say how you feel now. From the Windows colorful interface, suddenly turned to the dark command line, suddenly feel very good. In addition to feeling a great accident, in fact, I do not have anything. The
PS. He Bong Original works reproduced please specify the source "Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-10000290001.mykernelExperimental Guidance (how the operating system works)Use the lab building virtual machine
Pwd-p returns the true path of the linkCd/usr/srcCd..CD-CD HomeLs-alLs-ld/rootLs-ltCp/etc/hosts/tmp/hostCp-r/var/log//tmpFind-name Hello.docFind/root-name "*.log"Find-iname "Jacob"Find/-emptyFind/-group TomFind/-mtime-3Find/-mtime +4Find/-mtime
Text processing on Linux "threesome"grep, Egrep, Fgrep: Text Search tool; Search operations on a given text based on "pattern";Regular Expressions: Regular expression, REGEX, a pattern written by a class of special characters and text characters,
Many windows are familiar with the ipconfig command-line tool, which is used to obtain and modify network interface configuration information. The Linux system has a similar tool, the ifconfig (Interfaces config). You typically need to log in as
Errors that may occur when Insmod: (question 5 is the actual problem you are experiencing, others are learning from his experience)1.warning:function declaration isnt a prototypeThis kind of error is also very common, mainly for some of the
A What is Umask? when we log into the system and create a file that always has a default permission, how does this permission come from? That's what Umask did. Umask set the user to create the default permissions of the file, it is the
Summary of Common commands in Linux (7) Security Settings and Common commands in linux
Security Settings
Category
Command
Option
Annotation
Security PolicySelinux
Setenforce
Number (0, 1)
Summary of common Linux commands (5) disk management and common linux commands
Disk Management
Command
Option
Annotation
Example
Df
[Option]
Display disk space usage
Displays the disk
User and permission management in centos 7
1. user, group knowledge is related commands
A. user category:
Administrator: root
Common users:
System User: Used to run service programs only;
Login User: normal user of system resources;
User ID: UserID,
Inotify + rsync for real-time synchronization deployment, inotifyrsync
1. Architecture Planning
1.1.1 Architecture Planning preparation
Server System
Role
IP
Centos6.7 x86_64
NFS-server-inotify-tools)
192.168.1.14
Linux Telnet Service
Linux Telnet Service
Compared with ssh, telnet provides low security performance. However, you must enable this service when upgrading the ssh version or in other cases. The services provided by linux are executed by daemon, the
Elasticsearch 2.2.0 Word Segmentation: Chinese Word Segmentation
Elasticsearch has many built-in analyzers, but the default word divider does not support Chinese very well. Therefore, you need to install plug-ins separately. The common ones are the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service