Environment Description:
Linux kernel version: 2.6.35
Development Board: wy-s5pv210
First, follow the method to create the boot picture
1, with Photoshop or online download 80x80 picture a
2, using GIMP tool to convert to 224-color ppm format
I believe that a lot of people are full of love for Linux, especially the technical staff, play accustomed to winddows more want to try this system. About its advantages, of course, your good your bad, used to understand! Below me this rookie also
The NL command is used in a Linux system to calculate the line number of a file. NL can automatically add the file contents of the output to the line number! The default result is a bit different from the cat-n, and NL can do more display design of
Take Linux REDHAT6.3 as an example:
Native Insert REDHAT6.3 system ISO Image CD1
1. Configure Yum Local Installation Source:
Log on to the system as root
Mkdir/mnt/cdrom
Mount-t Iso9660/dev/sr0/mnt/cdrom
Cd/etc/yum.repos.d
To see if the
Under Linux, we don't typically need to free up memory because the system has managed the memory well. But there are exceptions, sometimes memory is cached, causing the system to use swap space to affect performance, this time need to perform free
$PATH: determines which directories the shell will look for commands or programs, and the PATH value is a series of directories that Linux searches for and compiles links to when you run a program.
Edit your PATH declaration in the form of:
Path= $
Sample installation with Zhcon-0.2.5.tar
Installation Preparation:
①:zhcon-0.2.5.tar
②:zhcon-0.2.5-to-0.2.6.diff
The installation diagram signals:
Example Step 1: Mount a share to get the software package you need to use for this experiment
Linux command line modifies IP, gateway, DNS methods
Mode one:
Ifconfig eth0 192.168.1.18 netmask 255.255.255.0
Description: This method can make the change immediately effective, reboot will revert to the original IP
Mode two:
Vi/etc/sysconfig/
Supervise is a daemontools tool that can be used to monitor the running of applications under UNIX, and supervise can restart the specified program when an application exception occurs. This article briefly describes the installation and use of
First, squid server basic functions
1. Provide proxy service to HTTP and FTP protocol
2, caching agent content, improve the speed of client access to the site, save traffic
3, access control of the client address to restrict access to the Squid
[Xlp@localhost ~]$ less/etc/xinetd.d/tftp # default:off # description:the TFTP server serves files using the trivial F Ile Transfer \ # protocol. The TFTP protocol is often used to boot diskless \ # workstations, download configuration files to
For bonding Network Load Balancing is commonly used in file servers, such as the three card, as a piece to use, to solve an IP address, traffic is too large, server network pressure is too big problem. For a file server, such as NFS or a Samba file
Introduction of BASIC commands
----1. Cursor command
K, J, H, l--up, down, left, right cursor move command. Although you can use the 4 cursor keys to the right of the keyboard in Linux, it is useful to remember these 4 commands. These 4 keys are
Under Linux, we use the ulimit-n command to see the maximum number of file handles that a single process can open (the socket connection is also included). The system defaults to 1024.
For general applications (like Apache, System process) 1024 is
This article briefly introduces the Kickstart and network installation features of Red Hat Linux to quickly and easily upgrade your Linux system, as in the case of a remote upgrade from Red Hat 7.2 to Red Hat 9.0.
Since version 5.2, Red Hat LINUX
Overview:Based on the instructions of the makefile.in file in the source package, the Configure script checks the current system environment and configuration options, generates Makefile files in the current directory (as well as other files that
Tag: Set characteristic standard response latest ATI up and down intelligent AVSPMBus Protocol Specification IntroductionPMBus is a set of communication protocol standards for the configuration, control and monitoring of power supplies. The latest
The boost library is a thoroughly tempered, portable, source-code C + + library that, as a fallback to the standard library, is one of the engines of the C + + standardization process, as follows in the Linux installation process:Go to the official
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service