LOG4J is an Apache open source project that uses log4j to control log information delivery destinations for consoles, files, databases, GUI components, even socket servers, NT Event loggers, UNIX Syslog daemons, and more ; Can control the information content and information output format of each log; By defining the level of each log information, we are able to control the log generation process more carefully, even if you do not need to modify the bu
Description: This program demonstrates how to use Log4net to record program log information. Log4net is a feature-famous open source logging component. The log4net makes it easy to log information to files, consoles, Windows event logs, and databases (including MS SQL Server, Access, Oracle9i,oracle8i,db2,sqlite). And we can also record the level of log control to be recorded, log categories include: FATAL (fatal error), error (general error), WARN (w
:[Email protected] root]# clock–wThe basic commands that we use are introduced here, and now we are going to talk about some of the problems that novice users encounter in the process and some of the techniques used in the process of operation.First, how to enter the text modeWhen you install Linux, you can choose to enter text mode or when graphics mode automatically. If you select the text mode you can skip this description, if you go directly to the X Window graphics mode, you can still use t
Haiyou Open Services Platform (UI Open service Platform) is a modular, dynamic, SOA-oriented Unified development framework that is ported to the specification of an open service platform as defined by the OSGi Alliance . NET implementation, hereinafter referred to as osgi.net. It provides developers with features such as modular and plug-in, service-oriented architecture, and module extension support for consoles,WinForm,asp,WPF, and Windows services
Description: This program demonstrates how to use Log4net to record program log information. Log4net is a feature-famous open source logging component. The log4net makes it easy to log information to files, consoles, Windows event logs, and databases (including MS SQL Server, Access, Oracle9i,oracle8i,db2,sqlite). And we can also record the level of log control to be recorded, log categories include: FATAL (fatal error), error (general error), WARN (w
system type is automatically detected. If the root file system mount fails, for example because you forgot to include related file system drivers in the core, the core will fail and the system stops (there is nothing left to do at this time).
The root file system is usually read-only mount (this can be used in the same way as the location). This allows the file system to be checked on Mount time; It is not a good idea to check for a read-write file system that has been mount.
The core then laun
not turn on this service, the server cannot network. Sshd:openssh Server daemon. The Rsyslog:linux Log system service (CentOS5.8 under this service name is syslog) must be started. 2. Close the unwanted TTY
Use the Vim editor to open a file
vim/etc/init/start-ttys.conf
//content as follows:
start on stopped RC runlevel=[2345]
env active_consoles=/dev/tty[ 1-6]
env x_tty=/dev/tty1
Task
script
/etc/sysconfig/init for
TTY in $ (echo $ACTIVE _consoles); Do
["$RUNLEVEL" = "5"-a "$tty
36 37
(Note: The value of the user variable is the default username, here is pi.) )
Then give the Tightvncserver file permission to execute:
sudo chmod 755/etc/init.d/tightvncserver1 1
and update the boot list:
sudo update-rc.d tightvncserver defaults1 1
Restart Raspberry pie:
sudo shutdown-r now1 1
Manually startOf course, you can also manually start the VNC server program by using the following command:
Tightvncserver-geometry 800x600:11 1
If you start the first time and you have not used the
Description: This program demonstrates how to use log4net to log information about a program. Log4net is a well-known open source logging component. Log4net makes it easy to log information to files, consoles, Windows event logs, and databases (including MS SQL Server, Access, Oracle9i,oracle8i,db2,sqlite). And we can also record the control to record the log level, can be recorded in the log categories include: FATAL (fatal error), error (general err
Linux terminal and Terminal login process Introduction
The shell is the system's user interface, which provides the interface that the user interacts with the kernel. It receives the command entered by the user and sends it to the kernel for execution, and then displays the results to the user.
Linux Terminal usage Basics:
Monitors and keyboards are called terminals because they can control the system, which is called the console (physical console). If the software is used in a computer to ach
Enterprise|services Zheng @ultrapower
Use the following assembly to define how our components are registered in COM +, where:
The ApplicationName property is the name of the COM + application that is displayed in the COM + catalog and Component Services management consoles.
[Assembly:applicationname ("Mydll.interface")]
The Description property provides instructions for COM + applications in the COM + catalog and Component Services manag
process identification number. For example, in the top command, we see that the system runs many processes, and sometimes it is necessary to abort certain processes using kill to improve system resources. When explaining the installation and landing commands, it was mentioned that the function of multiple virtual consoles of a system is to switch to other virtual consoles to work off the program when a pro
logon week, month, day, time, and the Virtual Console used.4. Application TipsLinux is a true multi-user operating system that allows multiple users to log in at the same time, allowing one user to log in multiple times. This is because Linux, like many versions of UNIX, provides access to the Virtual console, allowing users to log in multiple times at the same time from the console (the system's console is a monitor and keyboard that is directly connected to the system). Each virtual Console c
)Chkconfig yum-updatesd off #禁止开启启动 (all boot modes are disabled)Chkconfig--list yum-updatesd #显示当前系统状态YUM-UPDATESD 0: Off 1: Off 2: Enabled 3: Off 4: Enabled 5: Off 6: OffNine, close the redundant Virtual ConsoleWe know that switching from the console to the X window, generally using ALT-F7, why? Because the system defines 6 virtual consoles by default,So X is the 7th one. In fact, many people do not normally need so many virtual
traditional terminal equipment disappeared with the progress of the times, but we can still through the personal PC graphics display system (SDRAM in the frame buffer plus LCD controller plus display Panel) and keyboard to simulate traditional character terminal equipment (so called virtual terminal equipment). The concept of the entire system is as follows:Because there is no physical terminal equipment, so vitual terminal can not directly deal with the hardware, it to operate display and keyb
currently installed file systems is required (for example, the DF command)./etc/shadow: Shadow password file on a system with Shadow (shadow) password software installed. The shadow password file moves the encrypted password in the/etc/passwd file to/etc/shadow, which is readable only by the superuser (root). This makes it more difficult to decipher the password, which increases the security of the system.configuration file for the./etc/login.defs:login command./etc/printcap: Similar to/etc/ter
the process identification number of a program, and then the system kernel can operate on the processes specified by the process identification number. For example, in the top command, we see that the system runs many processes, and sometimes it needs to use kill to abort some processes to improve system resources. When explaining the installation and landing commands, it was mentioned that the function of multiple virtual consoles is to switch to an
The role of A:debug
Debug program
View program Execution Flow
B: How to view the program execution process
is a marker, where to begin.
How to set breakpoints:
where you want to see the program, you just double-click on the left side of the active program.
Where to set breakpoints:
where doesn't dot where.
At present: we add in the first valid statement of each method
/etc/securetty
Confirm the security terminal, that is, which terminal allows root login. Typically only virtual consoles are listed, which makes it impossible (at least difficult) to break into the system via modem or network and gain superuser privileges.
/etc/printcap
Similar to/etc/termcap, but for printers. syntax is different.
/etc/shells
The list of trusted SHELL.CHSH commands allows the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.