C programs under Linux often cause segment fault (segment error) due to memory access, and if the function of core dump is open, a file called core will be generated when running our executable program. We can then use GDB to tune the core file to
Method Two: Install the JDK with Yum1. See which JDK versions are available in the Yum Library (OPENJDK only)[email protected] ~]# Yum search Java|grep JDKLdapjdk-javadoc.x86_64:javadoc for LDAPJDKJAVA-1.6.0-OPENJDK.X86_64:OPENJDK Runtime
I. Initialization of the network1.ip Address modification (temporary effect)Using the Ifconfig commandIfconfig NIC name IP address Subnet mask192.168.100.112/24Modification of 1.IP address (permanent entry)Modify the NIC file in
/*********************************************************************** * i.mx6 SHT20 Linux Drive porting * Description: * Originally intended to use SHT10 to do humidity detection, found that it is not i²c interface, of course, also use * Gpio can
Linux Directory management follows the FHS standard, and the main goal is to let users know which directory the installed software is usually placed in, so they want independent software developers, operating system creators, and users who want to
Manage your network1.IP Basic KnowledgeIpv4/ipv632 Guests172.25.0.10/255.255.255.02. Configure IP>1. Graphical interfaceNm-connection-editor2. Text GraphicsNmtuiifconfig tools to view or temporarily set host IPIfconfig Network Interface view IP on
Under Linux, the management of the disk requires the following steps:1. Observe the disk partition status (MBR partition/GPT partition)Command: LSBLK, lists all disk lists, Blkid, lists the device's UUID parameters, parted lists the partition table
A description of the wildcard command: matches the symbol matching the relevant criteria, matching the file name lookup. Wild-Letter wildcard types: *: matches any character of any length? : Matches any single character[]: matches any single
Process
What is a processProcess is what the system is doing2. Process statusRunDormancyStop itGo onEndZombie Process3. How to view processes in a drawingGnome-system-monitor4. How to view processes with commandsPS Process Viewing tool-a process
Remote access
What is OpenSSH is a software that provides remote access control 2. How to implement remote access SSH remote host user @ remote host IP address SSH [email protected] (-x can open graphics) The authenticity of host ' 172.
Novice First Contact Linu,x the process of learning Linux by using a blog, that is, to share knowledge and to monitor their progress through such a platform. I majored in the University for International trade, engaged in a year of foreign trade
There are two desktop "gnome desktop" and "KDE Plasa Workspaces" available in CentOS 7, as an example of installing "GNOME desktop"1. Mount the disc (build local Yum source or use the network yum source)[Email protected]/]#
command to enter VIVI FileName: Opens or creates a new file and places the cursor at the beginning of the firstVI +n FileName: Opens the file and places the cursor at the beginning of nthVI + FileName: Opens the file and places the cursor at the
1. Tar is just a packaging command and does not compressExample: TAR-CVF tmp.tar/tmp-C: On behalf of packaging-V: Represents the display packaging process-F: Represents the specified package file name-X: Delegate Unpacking2. Compression options-Z:
Installation and configuration of NTP services:The process of installing the NTP service is simple first you need to mount the CD and then install the NTP service if the local Yum source is configured, the local Yum installation can be done directly
1 grep "error" catalina.log-a 20-b 10 View the last 20 lines of the first row of error in Catalina.log 10 linesThis situation is generally the only certainty.2 tail-n Catalina.log After 200 lines from the tail startTAI-F Catalina.log Mandatory
>>1. Set up the user Westos in the desktop host and set its password to Westoslinux2. Configure the SSHD service requirements in desktop as follows:*) Set SSHD service to allow only Westos users to be accessed using*) Create a key authentication
Linux uses a system CD to build a local yum repository and mounts yum
1. Attach a cd
[Root @ localhost ~] # Mount/dev/cdrom/media/cdrom/mount:/dev/sr0 write protection, which will be mounted in read-only mode
The cdrom directory under/dev is created
Upgrade python2.6.6 to 2.7.x and python2.6.62.7.x
1. Download python2.7.x
Wget https://www.python.org/ftp/python/2.7.6/Python-2.7.6.tgz
2. decompress and compile and install
Tar-zxvf Python-2.7.6.tgz & cd Python-2.7.6 &./configure & make all &
Summary of linux compression and backup commands, and summary of linux backup commands
I. compression and decompression
1. compress [-rcv] file or directory
Uncompress file. Z
-R: files in the directory can be compressed at the same time.
-C:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service