Linux under oracle11g DG Build (iii): Around the standby library to build operationsEnvironment
Name
Main Library
Standby Library
Host Name
Bjsrv
Shsrv
Software version
RedHat
3. File backup and compression commands:(1) bzip2 command: Used to compress files. bzip2 file name, suffix bz2. Unzip to: BUNZIP2 file name. bz2(2) Gzip command: Use gzip to compress files. gzip file name, and the suffix is gz. Unzip to: Gunzip file
4. Commands for shutting down and viewing system information(1) Shutdown command: normal shutdown. SHUTDOWN-T 2 2 minutes after the automatic shutdown shutdown-r shutdown after the restart.(2) Reboot command: Shutdown command, but this command does
In VMware cloned Redhat Linux 6.0, restart the network card error, unable to ping the IP address of eth0.Failure phenomena:Service Network restartShutting down loopback insterface: [OK]Bringing Up loopback insterface: [OK]Bringing up interface
Entboost,version 2014.183 Linux release, mainly to increase PC-peer (point-to-point) file transfer function, release Android mobile phone client App version 1.0, release the Apple iOS phone (tablet) Client SDK beta version, Improve the Android SDK
When doing kernel-driven development, you can use the files under/proc to get the appropriate information for debugging.Most of the files under/proc are read-only, but for the completeness of the example, a write method is provided.Method One: Use
The Linux kernel Adventures of the MD source code interpretation of the XV bitmap principle Reprint Please specify Source: Http://blog.csdn.net/liumangxiongFor people do not know Chenjinna, all over the lake also in vain. Do raid do not know bitmap,
A block device cannot be accessed as a character device, but instead is placed in a queue and then executed after tuning the order, which is called an "elevator scheduling algorithm".This article explains how to write block device drivers through
Each command uses the ";" Is separated, the next command will continue regardless of the success of the previous command executionHere, intentionally writes the echo of the second command an O, the command execution error, but does not affect the
This paper explains USB device driver with USB mouse.When calling the Usb_register (struct Usb_driver *) function in the driver, first determine if the USB bus driver supports id_table defined in the Usb_driver, and if so, Usb_driver probe function
Write a simple socket network communication program today, after using CTRL + C to end the server-side program, start the server again there is a bind failed:the address already in the error. After checking the Internet, I found out the reason, here
Install PIP:wget https://bootstrap.pypa.io/get-pip.pysudoinstallThe following error occurred when using PIP to install/upgrade lxml (up to 3.3.5):" Error:command ' X86_64-LINUX-GNU-GCC ' failed with exit status 1 "This is because some dependent
0. PrefaceFrom the beginning of learning C language began to contact Makefile, consulted a lot of makefile information but always feel no real master makefile, if you write a makefile always feel very laborious. So deliberately using the blog to
PermissionsFirst, the basic permissions of the fileThe so-called permission is the user's ability to access the file, the basic permissions of the file include R (read), write, X (executable).To view the permissions properties of a file with Ls-ld
15.1 gzipGzip (1) is the GNU compression program. It compresses only a single file. The basic usage is as follows:$ gzip filenameAfter the program executes, the file name becomes filename.gz, and in general the size is smaller than the original file.
The crontab command is commonly used in UNIX and Linux systems to set instructions that are executed periodically. The command reads the instruction from the standard input device and stores it in the crontab file for reading and execution.
Basic format:* * * * * commandTime-sharing Weekly commandThe 1th column represents minutes 1~59 per minute with * or */1The 2nd column represents the hour 1~23 (0 means 0 points)The 3rd column represents the date 1~31The 4th column represents the
The length limit for a Linux file name is 255 charactersFully qualified file names under Windows must be less than 260 characters, and folder names must be less than 248 characters.limitations of the number of Linux items, folders, and file name
The following conditions are required to remotely obtain the Windows and Linux operating system versions and host names:AssumeHost A (Windows 7), ip:192.168.12.2Host B (CentOS 6.3), ip:192.168.12.3Host C (Windows 2008)-a host for remote access to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service