Bash shell commands are divided into two types: External commands and Internal commands. External commands are called by the system or are independentProgramImplemented, such as SED and awk. Internal commands are implemented by special file formats (
1. key_t ftok (char * fname, int ID)
name of the file specified by fname (an existing file name ), the current directory is generally used. id is the subsequence number. UNIX in implementation, the file index node number ( ls-I ,
when running UNIX and MS-DOS commands, shell metacharacters have been introduced for extension of file names. The asterisk (*) is used to match all characters in the file name. Question mark (?) Matching a single character in the file, while square
MakeStatic Mode
The static mode makes it easier to define rules with multiple targets and makes our rules more flexible and flexible. Let's take a look at the Syntax:
::
...
Targets defines a series of target files with wildcards. Is a set
Several connection methods are different when using securecrt to connect to a virtual machine
1. Bridge Mode
Connect directly to the external network through a virtual machine.
This method is the easiest. You can directly bridge the virtual
Awk ArrayInstance
An array of awk, an associated array (associative arrays). The subscript can be numbers and strings. Because you do not need to declare the array name and element in advance or specify the number of elements, the awk array is
, January 1, January 1, 1970
In December August 1969ProgramEmployee Ken Thompson took the opportunity of leaving his wife and children for a month and began to create a completely new and revolutionary operating system, he developed a unix version
Heap and Memory Allocation
1. Both heap and stack Are operations and management of virtual storage.
2. the system calls BRK () and MMAP () to dynamically allocate virtual storage space, that is, these virtual storage addresses are valid. During
The following content is reproduced from [1 ].
1. Reliable and unreliable Signals
1) signals smaller than sigrtmin (in Red Hat 7.2, sigrtmin = 32, sigrtmax = 63) are unreliable signals. The main problems are as follows:
①Each time a process
1,Ulimit
Set or get the shells resource usage limits
Ulimit [Options] [limit]
2,Option
①-A displays all current resource limits.
②-C size: SetCoreThe maximum value of the file. Unit: Blocks
③-N size specifies the maximum number of files
Print OutputTCP congestion window
In the kernel function tcp_getsockoptCodeYou can see that this option tcp_info returns almost all parameters, and there are many other parameters to get some other information. For more information about each
RZ command error
use the RZ-be command.
if you use RZ to upload files separately, the upload may be interrupted or the File Upload may change (MD5 is different). You can use RZ-be to avoid the following problems:
-B: binary files
Usage: comm [Option]... file 1 file 2
Compare sorted files 1 and 2 row by row.
If no option is included,ProgramGenerates three output columns. The first column contains the rows specific to file 1, the second column contains the rows specific to
Web Server stress testing kernel TCP Parameter Adjustment
The following is the adjustment of kernel parameters:
Echo "2048 64512">/proc/sys/NET/IPv4/ip_local_port_range
Echo "1">/proc/sys/NET/IPv4/tcp_tw_recycle
Echo
In Linux, a function called task_statm is used to return the memory usage of a process.
Int task_statm (struct mm_struct * Mm, int * shared, int * text,
Int * data, int * resident)
{
* Shared = get_mm_counter (mm, file_rss );
* Text = (page_
In Linux, performance problems occur. Generally, we can use top, iostat, free, vmstat, and other commands to locate the problem. Iostat can provide us with a wealth of Io status data.
$ Iostat-D-K 1 10
The-D parameter indicates that the Usage
1. Run a command immune (exempt) to hangups
Nohup Command [arg...] [&]
The nohup command runs the command specified by the command parameter and any relevant Arg parameter, ignoring all sighup signals.
If the output of the nohup command is not
The three functions of adding, deleting, and querying roles are introduced earlier, but the role function is not used for adding, deleting, and querying roles,
It manages users in a unified manner. For example, your website has thousands of users,
1,First, set the VectorSort.
Sort ( Vecsrc. Begin (), vecsrc. End ());
2,Then use uniqueAlgorithm.
Vecsrc. Erase ( Unique (vecsrc. Begin (), vecsrc. End (), vecsrc. End ());
UniqueThe returned value is the starting position of the repeating
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service