3.1 create a dynamic library
Create the file hello. C with the following content:
# Include
Void Hello (void)
{
Printf ("Hello World/N ");
}
Use the command gcc-shared hello. C-o libhello. So to compile it into a dynamic library. We can see that the current directory has an additional file libhello. So.
[Leo @ Leo test] $ file libhello. So
Libhello. So: Elf 32-bit LSB shared object, Intel 80386, Version 1
the command-line arguments), if the target program does not have a linked dynamic library, print "Not a dynamical executable", LDD use refer to manpage.
3 Creating your own library
3.1 Creating a dynamic library
Create a file hello.c that reads as follows:
#include
void Hello (void)
{
printf ("Hello worldn");
}
Compile the Hello.c-o libhello.so with the command gcc-shared into a dynamic library. As you can see, there is one more file libhello.so in the current directory.
[
.
Note : Before I start, I strongly recommend that you try this tutorial in a virtual machine, because Python is the core component of many Linux distributions, and any surprises can damage your system.
The following steps are based on a red Hat version such as CentOS (6 and 7), which can be skipped based on Debian versions such as Ubuntumint and Resbian, Pythonn 3 should be installed by default. If it is not installed, use Apt-get instead of Yum to install the appropriate package below.
backward compatible with Python 2.
Note:: Before you start, I strongly recommend that you try this tutorial on a virtual machine, because Python is the core component of many Linux distributions and may damage your system in any way.
The following steps are Red Hat-based versions such as CentOS (6 and 7). Debian-based versions such as tumint and Resbian can skip this step. Pythonn 3 should have been installed by default. If not, use apt-get instead of yum to install the corresponding package.
[
Network security experts use practice to tell you How situation awareness should be implemented and how network security situation should be handled.
In a large-scale network environment, cybersecurity Situation Awareness obtains, understands, displays, and predicts the future development trend of all security elements that can cause changes in the network situation, does not stick to a single security element. The situation awareness system consists
not been added to the system's environment variables, you need to add the following to ~/.ZSHRC, and then execute the source ~/.ZSHRC.
Export path= $HOME/.pyenv/bin: $PATHeval "$ (pyenv init-)" eval "$ (pyenv virtualenv-init-)"
After completing the above operation, the PYENV installation is complete.
$ pyenv-vpyenv 1.0.8
If you are unsure whether the PYENV environment is installed properly, you can detect the environment through the Pyenv Doctor command.
$ pyenv doctorcloning/users/
command has not added the system environment variables. you need to add the following content ~ /. Zshrc, and then execute source ~ /. Zshrc.
export PATH=$HOME/.pyenv/bin:$PATHeval "$(pyenv init -)"eval "$(pyenv virtualenv-init -)"
After completing the preceding steps, pyenv is installed.
$ pyenv -vpyenv 1.0.8
If you are not sure whether the pyenv environment is correctly installed, you can use the pyenv doctor command to check the environment.
$ pyenv doctorCloning /Users/
-)"
After completing the preceding steps, pyenv is installed.
$ pyenv -vpyenv 1.0.8
If you are not sure whether the pyenv environment is correctly installed, you can use the pyenv doctor command to check the environment.
$ pyenv doctorCloning /Users/Leo/.pyenv/plugins/pyenv-doctor/bin/.....Installing python-pyenv-doctor...BUILD FAILED (OS X 10.12.3 using python-build 20160602)Last 10 log lines:checking for memory.h... yeschecking for strings.h... yes
Essay classification-Php+mysql Encapsulation and Inheritance (PHP learning) Summary: What is encapsulation? A: The package does not know the internal structure, the external only shows the function of this behavior. For example: Radio, you do not know the structure of the radio, but you know the radio can be used to listen to the radio. In PHP, encapsulation is, not externally disclosed, properties and methods, these properties and methods, which are not directly accessible from outside the clas
, lists, classes, functions, and modules. HTML/CSS (basic ).
To learn this tutorial, you do not have to be a python advanced developer.Install Python 3 on Linux
Python is installed by default on most Linux distributions. The following command shows the installed version.
[root@linux-vps ~]# python -VPython 2.7.5
We will use version 3.x to build our app. According to Python.org, this version is only improved and is not backward compatible with Python 2.
Note:: Before you start, I strongly recomme
' 2, $d ' datafileDelete the second line to the last row2 , display a row sed-n ' 1p ' datafileShow First row sed-n ' $p ' datafileShow last linesed-n ' 1,4p ' datafile Show first to fourth lines3 , fuzzy querysed-n '/hello/p ' datafile query includes All rows where the keyword Hellosed-n '/\$/p ' datafile query includes all lines where the keyword ¥, using backslashes \ masked metacharacters4 , append rowssed ' 1,3a leozhong ' file Add the character "Leozhong" after the first line to the t
Python is the core component of many Linux distributions, and any accident can damage your system.
The following steps are based on Red Hat versions such as CentOS (6 and 7), Debian-based versions such as Ubuntumint and Resbian can skip this step, Pythonn 3 should already be installed by default. If not, install the appropriate package using Apt-get instead of yum.
[Leo@linux-vps] Yum Groupinstall ' development Tools ' [
, lists, classes, functions, and modules. HTML/CSS (basic ).
To learn this tutorial, you do not have to be a python advanced developer.Install Python 3 on Linux
Python is installed by default on most Linux distributions. The following command shows the installed version.
[root@linux-vps ~]# python -VPython 2.7.5
We will use version 3.x to build our app. According to Python.org, this version is only improved and is not backward compatible with Python 2.
Note:: Before you start, I strongly recomme
Illinois State Rolin Medos--(American business information)--InternationalInformationThe Audit Association (ISACA) today announced the launch of a newInternetSecurity certification portfolio, combining skills training with hands-on exams and certifications for the first time. These seven new cybersecurity Nexus (CSX) certifications help professionals plan and develop their careers in changing areas while helping employers make up for skills gaps. Glob
Copyright:Original works can be reproduced. During reprinting, you must mark the original publication, author information, and this statement in hyperlink form. Otherwise, legal liability will be held. Address:Http://blog.csdn.net/jobchanceleo/archive/2007/07/03/1677724.aspx
(Originally published in programmer magazine 6th)
Next to 《Job hopping-I was found by the donkey when I was looking for a horse (1)"
Li o left by the "donkey" salary increase
Le
Json,javascript Object NOTATION,JS is the most common form of structured data transmission at present.JSON is not a programming language, but rather a data structure, like MP4, AVI, is just a format. (data structure can contain a lot of types)Types of JSON values
Simple values
Object
Array
Simple values: String, Number, Boolean, and null, note that undefined is not included.Note: Strings in JSON must be in double quotation marks.Objects: Objects are unordered key-value pair
Server release 6.5 (Santiago)
Database Version
Oracle Database 11g Enterprise Edition Release 11.2.0.4.0-64bit Production
Database instance name
Shdb
Wrap path
The Oracle oracle_home/bin directory contains the wrap command.
/Opt/oracle/product/11.2.0/db_1/bin/wrap
Lab started
1. Create an SQL file in the oracle user's home directory.
[Oracle @ zxt28 ~] $ Vim leonarding. SQL
Create or replace procedure leo (I in number)
As
Begin
Dbms_output.put_line (
Test
1. Create a user leonarding and grant DBA authority
Sys@leo> create user leonarding identified by leonarding default tablespace users;
Sys@leo> Grant DBA to leonarding;
2. Create a T-table, as long as the structure of information
Sys@leo> Conn Leonarding/leonarding
Leonarding@leo> CREATE TABLE T as select *
memory is limited and integer values are not infinite. For example, print (type 2**100), the output is int.float:Decimals, for example 3.23. Science counts, 5.2E-4, equivalent to 5.2*10**-4.Boolean value:True or False (Ture/false), 1 or 0 (only 1 and 0 represent true and false).five or three-dollar operationresult = value 1 if condition else value 2. That is, when the IF condition is true, result is a value of 1, otherwise the value is 2.eg.A,b,c = 1,3,5result = A If a>b else CPrint (Result)vi.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.