.Total number of lock structs in row lock hash table 08.LIST of transactions for each SESSION:9.---TRANSACTION 0 0, not started, process no 3396, OS thread ID 115244067210.MySQL thread ID 8080, query ID 728900 localhost root11.show InnoDB Status---TRANSACTION 0 80157600, ACTIVE 4 sec, Process no 3396, OS thread ID 1148250464, thread declared inside InnoDB 44213.mysql tables in use 1, locked 014.MySQL thread ID 8079, query ID 728899 localhost root sending data15.select sql_calc_found_rows * from
add it:Use adminDb.createuser ({User: "admin", pwd: "123456", Roles:[{role: "Root", DB: "admin"}])Because my is mongodb3.2 version, so add the user need to use the above actionAfter the user has finished, close MongoDB, and then modify the MongoDB configuration file, just modify the first configuration file on the line, because again, we started the first MongoDB database,The modified configuration is as follows:port=27017dbpath=/usr/local/mongod/data1/Logpath=/usr/local/mongod/log/mongodb.logP
NameString connstring = @ "Data source= (description= (address= (protocol=tcp) (host=127.0.0.1) (port=1521))(Connect_data= (SID=ORCL))); User Id=appserveruser; password=1234; ";The above is the ODP-mode connection string2. We use this to debug by defaultThis is a hint of VSThat is, we did not provide provider simple we add the sample first try3. Add the testThis is the added connection string tep = "Data source= (DESCRIPTION = (Address_list = (ADDRESS = (PROTOCOL = TCP) (HOST = 127.0.0.1) (PORT
:641px;height:315px; "title=" Clipboard.png "src=" http://s3.51cto.com/wyfs02/ M00/6f/4b/wkiom1wxgccgokqgaaf59sau8x4285.jpg "width=" 658 "height=" "alt=" wkiom1wxgccgokqgaaf59sau8x4285.jpg "/ >
7) Common methods for viewing file or directory properties①long Length (): Returns the size of the file.②long lastmodified (): Returns the last time the file was modified.③string getName (): Returns the file or directory name. ⑧string GetPath (): Returns the path string.④boolean exists (): exists. ⑨
permission only.A: Indicates the above so the user.Law II: How to use numbers:RWX rwx rwx corresponds to 111 111 111---------corresponds to 000 000 00000000101001110010111011101234567RW-R-----rwx rwx rwxr-x-w---x110 100 0006 4 07 7 75 2 1chmod 640 1chmod 777 1chmod 521 1-----------------------------------------------------------------------------For a directory,If you do not have R permissions, you cannot use the LS command to view the contents of th
"src=" Http://s3.51cto.com/wyfs02 /m02/6e/01/wkiom1vwc7zyi7pxaaimahm5ybm114.jpg "border=" 0 "/>650) this.width=650; "height=" 539 "title=" Image25 "style=" border:0px; "alt=" Image25 "src=" Http://s3.51cto.com/wyfs02 /m00/6d/fd/wkiol1vwdvmik1raaag7lf2c-dy968.jpg "border=" 0 "/>Select the Last Listener tab and create a listener for the AG group directly, and the port number will write the SQL default port 1433 well, remember to plan an IP address for it.650) this.width=650; "height=" 514 "title=
.518. DBA_EXP_FILESContains information about the exported file.519. DBA_EXP_OBJECTSLists the objects exported in incremental mode.520. DBA_EXP_VERSIONContains the version number of the last exported session.521. DBA_EXTENTSLists information about all segments in a database.522. DBA_EXTERNAL_TABLESDescribes all external tables in the database.523. DBA_FREE_SPACELists free partitions in all tablespaces.524. DBA_FREE_SPACE_COALESCEDContains the statisti
At present, the Internet is developing rapidly, and various technologies are constantly being updated and upgraded. As one of the new routing protocols, IPv6 routing plays an important role in it. IPv6 is an innovative solution for IPv4. Although most IPv6 routing protocols need to be re-designed or developed, IPv6 routing protocols have only a small change compared with IPv4. Currently, various common unicast routing protocols IGP and EGP have been supported by IPv6.
IPv6 Routing Protocol
The i
is required to enter 1
1000 + 200 + 30 + 4 = 1*103 + 2*102 + 3*101 + 4*100 = 1234
1011 [binary] 0 1 when the value of the digit exceeds 1, it is required to enter 1
1*23 + 0*22 + 1*21 + 1*20 = 8 + 0 + 2 + 1 = 11
1011 [octal] 0 1 2 3 4 5 6 7 when the number of digits exceeds 7, 1 is required.
1x83 + 1x81 + 1x80 = 512 + 8 + 1 = 521
1011 [hexadecimal] 0 1 2 3 4 5 6 7 8 9 a B C D E F when the number of digits exceeds 15, it is required to enter 1
1*16
for the parent node's left brother (63), always find the two public nodes, and finally find out 423, 44, 5, 63, 641, 642 this 6 term can be. In this way, the original need to query 423, 445, 446, 448, 521, 522, 632, 633, 634, 641, 642 this 11 times the corresponding list of inverted IDs, and merge the 11 term corresponding inverted ID list, now only need to query 423, 44, 5 , 63, 641, 642 these 6 term corresponding inverted row ID list and merge, gre
) Action_call_back_from_notification: Sends the ACTION to intent.action_call_privileged intent and eventually initiates the dial-up activity ( For Outgoingcallbroadcaster, learned from Androidmanifest), direct dialing;(3) Action_send_sms_from_notification: Send Intent, start the activity of sending SMS, this step need user intervention.Interestingly, there was such a comment before the notificationbroadcastreceiver,Accepts broadcast Intents which would be prepared by {@link Notificationmgr} and
_ SYSSMU3 $13 241 8 2 UNDOTBS1 _ SYSSMU3 $14 249 8 2 UNDOTBS1 _ SYSSMU3 $15 257 8 7 UNDOTBS1 _ SYSSMU3 $16 521 128 www.2cto.com 17 rows selected. from this we can also see that the partition allocation in the undo segment is not continuous. Status in the undo segment: 1) free: not allocated to any segment 2) active: transactions in the zone are not committed 3) inactive: transactions in the zone are committed 4) expired: the transaction has been comm
Ext.: http://521-wf.com/archives/46.htmldiscuz! X2.5 Adding a custom data call module (simple method)discuz! X series of DIY function is still quite good, in the process of two development, you may need to add a new data call module, so that you can develop the functional modules like the original module, just a few mouse points, fill in some simple information, you can display the various locations of each page you want to display data.The following
tested to be effective, But unfortunately, as long as you refresh the cache, then the problem arises, publish the article or blank one, the symptoms do not cure! Can not always upload every time, how hard it is. On the internet also found another method, delete the video model, this castrated system function method, I think this will not be the best solution.That is, the cache, where it is always generated, and is generated after the problem, then the source of the error must be generated. Open
Article Title: a good way to save space and improve efficiency. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
1. Space saving
Recently, the server space is often insufficient, causing alarms. Therefore, after testing, I compress and store all the logs, such as the first 6.1 GB of xxx logs on a machine, and then 1.2 GB of logs are compressed by almost. in
this incident, information of a total of 131389 users was leaked, mainly after 80 and 90, with the highest proportion after 80, 65%, more than half of the 90 s. At present, the 80 s is still the main force in the leak.
Password setting taboos
One of the taboos: passwords contain frequently used words
According to the 0.13 million pieces of leaked data exposed on the Internet, many people still use frequently used words such as 123456, 1314, 520, and 521
518/udp ntalk network conversation (ntalk), remote conversation service and customer
519 utime [unixtime] UNIX time protocol (utime)
520/tcp efs extension file name server (EFS)
520/udp router [route, routed] Routing Information Protocol (RIP)
521 ripng route selection Information Protocol for Internet Protocol version 6 (IPv6)
525 timed [timeserver] Time daemon (timed)
526/tcp tempo [newdate] Tempo
530/tcp courier [rpc] Courier Remote Proced
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.