the composition of the Linux kernel subsystemConsists of the above 7 subsystems. First, memory management subsystemFunctions:1, from the virtual address to the management of physical address mapping. 2, the management of physical memory allocation.
System InformationThe processor architecture of the Arch Display machine (1)UNAME-M Display the processor architecture of the machine (2)Uname-r displaying the kernel version in useDMIDECODE-Q Display hardware system
Use ' top-i ' to see how many processes are in Running state, there may be memory or I/O bottlenecks in the system, use free to see the system memory usage, swap is occupied a lot, use Iostat to look at the I/O load situation ... One more way is
Recently Learning Linux operating systems (CentOS 6 & CentOS 7). The Linux terminal command line is all white, which often causes the command and output to be difficult to distinguish. So on the Internet to find a way to modify the Linux terminal
Fourth Chapter process scheduling
The scheduler is responsible for deciding which process to run, when to run, and for how long, and the process scheduler can be seen as a kernel subsystem that allocates a limited amount of processor time
Using the Usermod command in the RHEL7.2 system to add a user to multiple additional groups, by default, adding multiple additional groups at once can be added in the following ways:Usermod-g Additional Group 1, additional Group 2, ..., additional
Summary: The regular expressions for the two commands are distinguished by ' single quotation marks.The output variable name is quoted in single quotes, and the output variable value is quoted in double quotes, which is generally common in bash
Ls List is used to display target lists Grammar ls [Options ...] [Arguments ...] Options -A all displays all files and directories (including hidden files that begin with.) and the directory itself. and the parent directory. ) -A shows all hidden
Process switching and general implementation of the system one, the content summary and analysis process scheduling and process scheduling process scheduling requirements of the classification:The first classification method:I/O-bound (frequent I/O,
Written in front: source collation and knowledge, the original link to http://www.zhihu.com/question/32163005/answer/55772739, Lo ZhiyuThank the author again ~ ~Suppose you are an air tube at an airport, you need to manage all the routes to your
first, what is a scriptA script is an executable (777) text file that contains a series of command sequences. When the script file is run, the sequence of commands contained in the file will be automatically executed. Second, script
7.1, User Configuration files7.2, user management related files7.3, user management commands7.4, user Group Management Command Delete user Userdel [[email protected]~]# Userdel [-r] User name//Be sure to add-R to delete home directoriesIn addition
Wang Zhao (with the name of the final application certificate must be consistent) + Original works reproduced please specify the source + "Linux kernel analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000
How the Linux
Install the GO Runtime Environment and Its Development Tool LiteIDE on CentOS
Five years ago, I thought that if Microsoft had a set of C-language-based easy-to-Develop Web frameworks, the performance would be much higher than Asp. Net. Later, I
Install ZooKeeper in standalone mode and cluster mode in CentOS
The environment for this article is as follows:Operating System: CentOS 6 32-bitZooKeeper version: 3.4.8
0. environment requirements
Zookeeper requires a Java environment later than
Introduction to Performance Testing Tool Gatling
1 Introduction
Gatling is a high-performance server performance testing tool developed based on Scala. It is mainly used to perform load tests on servers and analyze and measure various server
RHEL7 Nic settings, rhel7 Nic1. Change the NIC name to vim/etc/sysconfig/grub:GRUB_TIMEOUT = 5GRUB_DEFAULT = savedGRUB_DISABLE_SUBMENU = trueGRUB_TERMINAL_OUTPUT = "console"GRUB_CMDLINE_LINUX = "crashkernel = auto rhgb quiet net. ifnames = 0
Graphic SSL and encryption and decryption
1. SSL Principle
Secure Sockets Layer (Secure Socket Layer) is located between TCP/IP and various application Layer protocols, providing security support for data communication. It is used to ensure the
SSH public key verification
It is not safe to log on to the server using the username and password. The SSH public key is used to verify that this method can effectively solve the login server and secure login server features:Objective: to log on to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service