linux cookbook

Want to know linux cookbook? we have a huge selection of linux cookbook information on alibabacloud.com

Understanding the Linux network stack (Linux networking stack) (1): A simple summary of the Linux network protocol stack

This series of articles summarizes Linux network stacks, including:(1) Linux Network protocol Stack Summary(2) Network multipart offload technology Gso/tso/ufo/lro/gro in non-virtualized Linux environment(3) QEMU/KVM Network multipart offload technology in virtualized Linux environment Gso/tso/ufo/lro/gro1.

Linux Learning Basics _unix Linux

1, what is Linux? To be exact, the Linux kernel (the core program of the system), whose kernel copyright belongs to Linus Torvalds, is issued under the GPL (GNU general public License) Copyright Agreement, and anyone can copy (copy) and modify ( Change), package distribution (distribute), sales, but can not add any restrictions at the time of distribution, and all the original code must be public, so anyone

Linux disk IO monitoring [ZZ]

Disk I/O monitoring is a very important part of unix/linux system management. It can monitor the throughput, the number of I/O per second, disk utilization, service time and other information, and when the exception is found, send alarm information to the system administrator, so that the system administrator to adjust the data layout and other management activities to optimize the overall system performance.Commands that monitor disk I/O for differen

Linux Learning Notes 4:linux task scheduling, process management, MySQL installation and use, use of SSH tools, Linux network programming

as follows: 1) VI mytask.sh Enter the following command Date>>/home/mydate3 Cp/home/mydate3/root 2) Grant mytask.sh Execute permission chmod 744 MYTASK.S H 3) Crontab-e 4) Re-enter the command: * * * * * */root/mytask.sh. (3) How to terminate a task crontab-r means to terminate a task schedule. After the command is executed, the tasks in the crontab-e are removed. CRONTAB-L indicates which task schedules are currently in the list.2, the Linux proces

How to enhance the security of Linux system, Part one: Introduction to the Linux Security Module (LSM)

HTTP://WWW.IBM.COM/DEVELOPERWORKS/CN/LINUX/L-LSM/PART1/1. Related background: Why and whatIn recent years, Linux system has been widely concerned and applied by computer industry because of its excellent performance and stability, the flexibility and expansibility of open Source feature, and the lower cost. But in terms of security, the Linux kernel only provides

Deploy War packages for Linux tomcat, deploy JavaWeb projects for Linux Tomcat, deploy War packages for Linux, and deploy tomcatjavaweb

Deploy War packages for Linux tomcat, deploy JavaWeb projects for Linux Tomcat, deploy War packages for Linux, and deploy tomcatjavaweb Deploy the War package for Linux tomcat, deploy the JavaWeb project for Linux Tomcat, and deploy the War package for

Linux: build your own exclusive mini Linux (2) Improve the small Linux function to make it full

Create a small Linux with network functions First, copy the required basic network commands to a Linux instance.Copy Ping and ifconfigTo add a network function, you must be driven by the NIC. The NIC Driver is pcnet32.However, pcnet32 has a dependency module that is MII, and MII has no dependency module,So we only need to copy the two modules to ourIn Linux, chec

"Linux" Linux often uses basic commands

important before the system shuts down again cookbook. Better run a few more times!7, the customary shutdown command: ShutdownIn addition, it should be noted that the time of the number of instructions must be increased, otherwise shutdown will jump to Run-level 1 (that is, the single-player maintenance of the login), so it is nerve-racking! Here are some examples of how many time references are available:Reboot, Shutdown: reboot, Halt,poweroff8. Swi

Never use Linux commands! | Linux China, linux China

Never use Linux commands! | Linux China, linux ChinaYou only need a stupid move. You can even destroy a company worth billions of dollars, Just Like Apache Struts without patching. -- Steven Vaughan-Nicolas In this article, navigate to rm-rf/11% faster fork bomb 39% faster junk data rewrite hard disk 47% faster erase hard disk! 54% Bytes/dev/null loss 63% bytes f

[Reprinted] Linux Startup Process details-Section 8 of "do not worry about Linux programming" and linux Startup Process details

[Reprinted] Linux Startup Process details-Section 8 of "do not worry about Linux programming" and linux Startup Process details This original article belongs to the "Linux greenhouse" blog, blog address for http://roclinux.cn. The author of this article is rocrocket.To prevent negative reprinting on some websites, we r

There are many common commands in Linux that must be mastered, and here I will learn some common basic commands that I learned from Linux to share with you and hope to help you.

1. Instructions for displaying dates: date2. Instructions for displaying the calendar: Cal3. Simple and easy to use calculator: BCWhy would 10/100 become 0? This is because BC presets only output integers, and if you want to output a decimal point, you have to execute Scale=number, which is the number of decimal places, for example:4. Important several hotkeys [Tab],[ctrl]-c, [ctrl]-d[Tab] Key---with "command completion" not "file full" function[Ctrl]-c button---Let the current program "Stop"[ct

Compile linux0.00 kernel (the Linux kernel completely analysis-Based on 0.12 kernel ") linux-0.00-041217 and linux-0.00-050613

Compile the linux0.00 kernel (full Linux Kernel Analysis-based on the 0.12 kernel) I have bought a fully-analyzed Linux kernel written by Zhao Ke-based on the 0.12 kernel. It seems that the principles of the first four chapters have never had the courage to practice them by myself. Recently, I have made up my mind to take a good look at this book, and I plan to write some study notes to record some gains an

Linux Learning Basics Tutorial _unix Linux

Basics of Linux Learning 1, what is Linux? To be exact, the Linux kernel (the core program of the system), whose kernel copyright belongs to Linus Torvalds, is issued under the GPL (GNU general public License) Copyright Agreement, and anyone can copy (copy) and modify ( Change), package distribution (distribute), sales, but can not add any restrictions at the tim

Linux kill usage, killall, pkill, and xkill

command, and the other is the/bin/kill executable program. Generally, these two commands may not conflict with each other. However, if you encounter a kill command exception, you can specify the/bin/kill command explicitly. You must refer to the reference resources listed in the following resources to learn more about kill in Linux, because this is your ticket to enter the field of Linux system maintenance

Linux configuration startup item, self-starting service

There are two mechanisms in Linux: one is the old SystemVinitialization, which comes from Unix and is still used by various Linuxdistros; the other is the Upstart mechanism proposed in recent years. Refer to: http: wwwcnblogscomcassvinarchive2011122. There are two mechanisms in Linux: one is the old-style System V initialization, which is derived from Unix and is still used by various

Understanding of Linux System in Linux OS Analysis and learning from Linux kernel

After this period of time to learn, I also have a certain understanding of Linux, today this blog on the previous knowledge of a summary it.The previous Linux learning blog, from the top down is learning in-depth process, my blog link is as follows:First: Analysis of the Linux operating system how the computer starts and how it operatesChapter Two: Analysis of

Linux lakes: Just for tossing

interface after startup problems, I would like to tell them: pull down, or use the graphical interface. For a server system that does not have a graphical interface, be honest with SSH remote connection. Why are there so many different distributions? It's all Linux, so why install so many distributions? That's because the system and the system are not the same. Different genres of distribution, the same genre of the distribution, the old system and

Using SSH to transfer files between Linux and Linux,linux and Windows

Using SSH to transfer files between Linux and Linux,linux and WindowsTransferring files between Linux and Linux:SCP file [email protected]: Document Address Example:SCP Abc.txt [Email protected]:/home/endall/abc.txtTransferring files between Windows and Linux:The author uses Putty's built-in PSCP. Other such as SSH Sec

Linux knowledge point Review: single-user mode, rescue mode, clone Virtual Machine and Linux machine logon explanation, linux knowledge point

Linux knowledge point Review: single-user mode, rescue mode, clone Virtual Machine and Linux machine logon explanation, linux knowledge point1.13 single-user mode In linux, when the password is forgotten, the password is changed (prerequisite: the password must be manually operated on a physical machine or server) At t

Linux kill command and Signal Control

command exception, you can specify the/bin/kill command explicitly. You must refer to the reference resources listed in the following resources to learn more about kill in Linux, because this is your ticket to enter the field of Linux system maintenance. This knowledge allows you to maintain the system like a surgical procedure, instead of restarting the system every time you encounter a problem, as we kno

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.