Debian basic configuration tool, Debian Linux Command Line preparation tool-Linux release version technology-debian information, the following is a detailed description. Rcconf
System Boot is the service you want to start and a useful tool.
Base-config
The preparation of th
Oracle SQL handler, yesDesigned for Oracle database developers and operatorsA carefully crafted Oracle client tool:Ultra-intelligent SQL Editor;Ultra-convenient table operations(You can update the data warehouse table by modifying the cell data of the table );Export data in multiple formats, including xls, CSV, insert SQL, HTML, and XML;Chinese and English InterfacesAnd can be switched; MonitoringRun batch SQL statements(Paused and corrected during running );No need to install the Oracle client;
test the audio file upload.5.tinycap use[Email protected]:/# tinycap/sdcard/test.wavcan be recorded.At present, only meet these, the first summary to this, you can at any time in depth.20141014 Update:1. The original Tinyalsa the original source code here Tinyalsa_github.2. Fork a copy yourself, add a static compilation method, and busybox the Tinymix/tinyplay/tinycap/tinypcminfo integration into a tinyalsa.Tinyalsa-utils contains the Tinymix/tinyplay/tinycap/tinypcminfo use method is Tinyalsa
TeX can be said to be an international typographical standard, especially papers and books. The formula is much better than the MS Office series, and the format is exceptionally beautiful. However, due to its complicated commands, non-visual editing makes the entry threshold high, so a macro package such as LaTeX is available, but it is more complicated for people familiar with the MS Series, is there a visual editing tool? The answer is yes. Today, L
When learning Linux, sometimes the terminal's print message is very important to us, but the terminal display also has a certain buffer space. When the information is printed many, the preceding information is overwritten. So here's an online search for a little bit about this. For example, the following are summarized:Script is a very useful tool, and it's fun enough at the same time. Script can record the
When working with files, you often encounter two very similar files that need to be compared and modified. Meld is a tool that specializes in this work. meld is a visual diff and merge tool. Meld is a Linux software that allows users to compare 2 to 3 files and edit them, or compare 2 to 3 folders and compare files simultaneously. 650) this.width=650; "Src=" http
Tags: Linux virt--text memcpy DDR command EOF logI also recently went to interview was asked how to do the memory leak check, before all rely on artificial shielding code, or pc-link/kw a class of inspection tools to check, back after the search, just know that Linux comes with mtrace tools.The following are the steps:1. Create the test.c file under Linux and wri
/mysql/bin/mysqld--basedir=/usr/local/mysql--datadir=/data/mysql--plugin-dir=MySQL 3005 3087 0 Jan15? Sl 0:05/usr/local/mysql/bin/mysqld--basedir=/usr/local/mysql--datadir=/data/mysql--plugin-dir=3. PstackPstack shows the stack trace for each process, PHP's FPM master process, found that this thing is walking epoll:[Email protected]:~# pstack 1892#0 0x00000030e9ae8fb3 in __epoll_wait_nocancel () from/lib64/libc.so.6#1 0x0000000000856a74 in Fpm_event_epoll_wait ()#2 0x000000000084afff in Fpm_even
Linux Malware detection tool and Anti-Virus engine ClamAV installation tutorial
Malware is any software program designed to interfere with or damage the normal operation of the computing system. Although the most notorious malware include viruses, spyware, and advertising software, their attempts do not cause the same harm: Some steal private information, some delete personal data, and some are between them
We know that to obtain all the permissions of a master machine, we need to obtain the permissions of the Super administrator root of the master machine! As a result, hackers generally want to gain root privileges by using the arbitrary method. So how can we get root privileges? The simplest method is to use the root kit tool program of the streaming on the network to initiate an intrusion.
Because the root kit to
Vmstat is short for VirtualMeomoryStatistics (virtual memory statistics). it monitors virtual memory, processes, and CPU activity of the operating system.
He makes statistics on the overall situation of the system. The disadvantage is that he cannot conduct in-depth analysis on a process. The vmstat tool provides a low-cost system performance observation method. Because vmstat itself is a low-cost tool, on
Pick: a Linux Command Line fuzzy search tool | Linux China, pick fuzzy search
It allows you to select from a series of options through the ncurses (3X) interface, and also supports fuzzy search. This tool is useful when you want to select a directory or file whose name contains non-English characters.
-
Release "Linux tool quick tutorial" and linux tutorialRelease the Linux tool quick tutorial
Origin
In Linux, there are many command line tools for us to use. Each tool always provides
Build a tool for reading Linux source code and linux source code
Creating a tool for reading Linux source code
To read/write code in Linux, vi is usually used.
However, when encountering a large project, reading the source code i
Reprinted please indicate the source and the author contact: http://blog.csdn.net/mimepp
Contact information: Yu Tao
Read the preface first:
Selection of Linux software hands-on projects for college students (in sequence)
Project name:
Hard Disk File quick search tool hdd_search in Linux
Project requirements:
Functions such as CD Manager:
Http://www.newhua.com
Python for beginners-a linux User Logon monitoring tool, python-linux
In the past few days, I want to learn Python. After reading some basic information, I felt a little boring, so I wanted to do something. If you think about it, just get a tool to detect Linux User logon
Linux memory viewing tool --- Smem, linux view --- smem
Insufficient physical memory has a great impact on the performance of Linux desktop and server systems. When your computer slows down, the first thing to do is to release the memory. Especially in a multi-user environment and a server environment that executes ke
Linux monitoring tool introduction series-free and linux monitoring series-free
In Linux, we can view and monitor the system memory usage. The most common command is free. The free command is actually very simple, and the parameters are also very simple, but you may not know much about it. The following is a summary o
for Pathfinder b
1. Using Arpspoof to implement ARP spoofing attacks on target machines# arpspoof-i Eth0-t 192.168.1.125 192.168.1.1
2. Using Dsniff to obtain data information for the specified port# dsniff-i Eth0-t 21/tcp=ftp,80/tcp=http
The types of protocols supported by Dsniff include:Ftp,telnet,smtp,http,pop,nntp,imap,snmp,ldap,rlogin,rip,ospF,pptp,ms-chap,nfs,vrrp,yp/nis,socks,x11,cvs,irc,aim,icq,napster,ostgresql,meeting Maker,citrix Ica,symantec, Pcanywhere,naI sniffer,micr
The CPU cache query tool in Linux and the cpu cache query in linux
In Linux, you can use the following tool to query the CPU cache:
Method 1:
$ Lscpu
L1d cache: 32 K
Method 2:
$ cat /sys/devices/system/cpu/cpu0/cache/index0/size32K
$ cat /sys/devices/system/cpu/cpu0/cac
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.