[UNIX] the generation of an executable file to the distribution (on) of processes in the memory/the generation of executable files, unix executable files
From the generation of an executable file to the distribution of processes in the memory (on)
Generation of executable files
To generate executable files for a source program, it must be implemented through the compiler. the compiler translates the high-le
Unix experience center: http://www.unix-center.net/
Users can be registered for free. JDK 5.0 is installed on linux systems, including kernel CPU, freebsd, solaris, and other operating systems.
I registered a user at this morning, and then ran to the Dragon Kernel Machine Installed in Debian linux to write a java hello program. The dragon Kernel Machine is a little slow, but it's okay, barely usable.
It seems that it is interesting to see the fil
1.2 UNIX architecture:
Kernel: Controls hardware resources and providesProgramRunning environment.
System Call: the kernel interface.
The public function library is built on the system call. Applications can call the public function library or the system call.
1.3 Login
1./etc/passwd. Login Name: encryption password: Value user ID: Value group ID: Comment field: Home Directory: shell program.
1.4 files and directories
The stat and fstat f
nodes, disk distribution charts, indirect blocks, and super blocks. This data is invisible to most user-level programs, usually referred to as meta data.The du command is a user-level program that does not consider meta data, while the DF command checks the disk distribution diagram of the file system and considers meta data.Therefore, the used space calculated by DF is slightly larger than that calculated
default kernel file system) and so on.Having said that, what type of file system does CentOS 7 use in the virtual machines we use? Use DF-T to see it.From the Type column we see that it uses the XFS file system, a high-performance log file system that was born in 1993 and was ported to Linux Systems in 2000. The above describes the disk-oriented local file system, in fact, there are network-oriented and temporary virtual file system, for example, TMP
resources. Unfortunately, Unix does not really limit the user's use of resources, one user can use the entire disk space of the file system, and Unix basically does not prevent users from doing this. The system administrator should use the PS command, the accounting program df and the Du cycle to check the system. Detect excessive consumption of the cup and disk
Remember: the operations on the affected system may change the existing evidence or lead to the loss of sensitive information!
{Initial response }}
Objective: To obtain the loss-prone data in the system before judicial authentication and replication, and preliminarily determine the emergency situation.
====================
Create a response Toolkit
====================
We investigate that the system must execute commands with highly trusted programs, and add backups and fixes to create a toolki
is 128 bytes, and one inode is set per 1KB, the Inode table will be about 128MB in size, accounting for 12.8% of the entire drive.You can use the DF command to view the total number of inode per hard disk partition and the quantity that is already in use. Df-i view the size of each inode node, you can use the following command: sudo dumpe2fs-h/dev/hda | grep "Inode size" because each file must have an inod
BG and FGLinux/unix the biggest advantage of the Microsoft platform is the real multi-user, multi-tasking. Therefore, in the task management also has the characteristic management thought.We know that on Windows, we either have a program running in the background as a service or stop the service. Instead of allowing the program to switch between foreground and background. Linux provides FG and BG commands that allow you to easily schedule tasks that a
systems, the following binary files are usually replaced by Trojans: telnet, in. telnetd, login, su, ftp, ls, ps, netstat, ifconfig, find, du, df, libc, sync, inetd, and syslogd. In addition, you also need to check all files referenced by the/etc/inetd. conf file, important network and system programs, and shared library files.
On the NT system. A Trojan horse can usually spread viruses or so-called "remote management programs", such as Back Orifice
ArticleDirectory
UNIX Origin
UNIX splitting
UNIX legal disputes
UNIX open-source organization
Linux was born
Linux leader today
For more information, see http://coolshell.cn/articles/2322.html. In conclusion, we will know how to plan and how to proceed tomorrow. In the scroll wheel of time,
start and end dates. Calculate the difference between the two dates:
$ Date; system-Backup>/dev/NULL; system-diag>/dev/NULL ;/> Netstat>/dev/null; df>/dev/null; Date
Test your typing speed
You can use the same method to test typing input:
$ Date; CAT | WC-W; Date
If you provide an input example that lasts for at least 1 minute, but preferably 3 minutes or longer, the result of this command is more accurate. Calculate the difference (in minutes) betwe
intruders
A. Verify all binary files in the system
When checking whether intruders modify system software and configuration files, remember that the verification tool you are using may have been modified, and the operating system kernel may have been modified, this is very common. Therefore, we recommend that you use a trusted kernel to start the system, and all the analysis tools you use should be clean. For UNIX systems, you can create a boot disk
The 20 good habits to be used in Unix are:
1) create a directory tree in a single command.
2) change the path. Do not move the archive.
3) combine commands with control operators.
4) exercise caution when referencing variables.
5) Use escape sequences to manage long input.
6) group commands in the list.
7) Use xargs outside of find.
8) Know When grep should execute count-when should it bypass.
9) match certain fields in the output, not just the rows.
UNIX legends (Part 1)
Chen HaoOnly by understanding the past can we know and understand it. In conclusion, we will know how to plan and how to proceed tomorrow. In the scroll wheel of time, many things are just like a meteor, and some things are able to withstand the test of time, which is a constant charm and relishing, so far. You need to know how to choose tomorrow and how to do it. Instead of blindly following all kinds of cutting-edge technologie
The processing method of Solaris root password forgetting
1, if you can log in with a regular user,%df/etc, determine the name of the device containing the/ETC directory partition
%df/etc
//dev/dsk/c0t0d0s0 ...
In this case, C0t0d0s0, if your root partition device is different, you can replace it.
2, insert the system disk into the CDROM
3, refresh the file system using the Sync command after the prom
What is the biggest headache for us when deploying Unix OS to plan partitions? I am afraid that the disk space is allocated. For example, at the beginning, only a few colleagues may need to use this unix computer. Therefore, only a small amount of space is planned for the home directory. However, as the number of users increases, the space in the home directory is gradually exhausted. What should I do now?
. Run this command to start the C shell. After starting CSH, you can see that the running environment has changed, because the system prompt has changed from $ to %.
Cu
Purpose: Cu calls another system using a standard outbound line.
Example: Cu 5555555. After this command is executed, call another system by phone number 5555555.
Cut
Purpose: Cut is used to delete columns or rows in a file.
Example: Cut-C2 myfile.txt. After this command is executed, Column 2nd (the command opposite to cut is pas
Let's start a new year with these unix/linux command techniques to improve productivity at the end. I've been looking for it for a long time and I'm going to share it with you now.
>/path/to/file.log
# or use the following format
: >/path/to/file.log
# then delete it
Rm/path/to/file.log
How do I record terminal output?
Try using the script command line tool to create output records for your terminal output.
Script My.terminal.sessio
Ente
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.