the memory size of each process (the process memory size increases or decreases as the program is executed ). You can also use/proc/maps or pmap-d to understand the distribution of memory space of a process, for example:
# Cat/proc/1449/maps... 0012e000-002a4000 r-xp 00000000 08:07 3539877/lib/i386-linux-gnu/libc-2.13
kernel automatically exchanges infrequently used data blocks in the physical memory to the virtual memory at an appropriate time, and retains the fully used information to the physical memory.
Linux physical memory Detection
Article Title: Linux Server hacker attack detection. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The guy, commonly known as "script kid", is a type of bad hacker, because many o
, and the use of swap space does not mark the occurrence of a memory bottleneck. Parameters useful for the free command:The references-b,-k,-m and-G respectively follow bytes, kilobytes, megabytes, gigabytes display results.-l difference shows low and high memory-c {count} shows the number of free outputsNine, PmapThe PMAP command shows the amount of memory used
Memory Statistics and memory leakage problems in linux are located in product development. by measuring the total memory consumption of the current system, you can accurately evaluate the total memory required by the product, in this way, the appropriate
To prevent memory leakage, use Valgrind in Linux to check general Linux technology-Linux programming and kernel information. The following is a detailed description. One of the most troublesome problems in C/C ++ development is memory management. Sometimes it takes several d
One of the most troubling problems with C + + is memory management, and sometimes it takes days to find a memory leak or a memory access crossing, and if there is a tool that can help us do this, Valgrind is just one of those tools.
Valgrind is a software suite that runs on the x86, AMD64, and PPC32 architectures base
Disk parameter revision for linux missing and missing detectionLinux disk parameter Revision
Archive representative Device
In linux, we all know that we can use corresponding files to represent a device. For example,/dev/sdb1 represents the first separator slot of the sdb hard disk. The device uses major and minor to indicate the device to be replaced.
Brw-rw -- 1 root disk 8, 0 May 12 20:16/dev/sdaBrw-rw -
: 924 kBSUnreclaim: 5976 kBPageTables: 460 kBNFS_Unstable: 0 kBBounce: 0 kBCommitLimit: 62060 kBCommitted_AS: 28864 kBVmallocTotal: 442368 kBVmallocUsed: 46984 kBVmallocChunk: 393212 kB
2. process memory usage statistics
In a 32-bit operating system, each process has 4 GB virtual memory space, of which 0 ~ 3 GB is the private user space of each process, which is invisible to other processes in the sy
, and port usage, and users will not be able to get real system situation reports.
Rootkits
Defense methods:
The most effective method to defend against rootkits is to regularly check the integrity of important system files. There are many such tools, such as tripwire, which is a very good file integrity check tool. Once rootkits attacks are detected, it is troublesome. You must reinstall all System File Components and programs to ensure security. Here we will introduce a simple and easy-to-use
For the current computer, the performance of the entire computer is mainly affected by the disk IO speed, memory, CPU, including the motherboard bus speed has been very fast.Basic detection Method 1, DD commandThe DD command function is very simple, that is, from a source read data in the form of bit-level write to a destination address, in this way we can detect our actual disk in the
Article Title: linux bot intrusion detection. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems and open source and other basic categories yesterday agreed to wzt to find a few linux
System Status Detection commands1. ifconfig : Used to obtain network card configuration and networking status information, format: ifconfig [network Devices] [parameters]One of the following lo is a local loopback port2. uname : Used to view the kernel version information of the system, in the format:uname [ -A]View the kernel name of the system, kernel release, kernel version, node name, hardware nameHardware platform, processor type, operating syste
Middleware, which integrates several detection system tools, is quite good.
1. Installation Process: # tar zxvf sysstat-9.0.4.tar # cd sysstat-9.0.4 #./configure -- prefix =/usr/local/tools
# Make make install
2. Check process:
I first used the built-in system tool vmstat for Server Detection:
# Vmstat
Procs ----------- memory ---------- --- swap -- ----- io ---
Article Title: general process of USB device detection in LINUX. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
USB device detection is
Linux system status detection and process control I. proc file system the commands we usually input: ifconfig, hostname, free (view memory usage), df (view hard disk usage ), where does the uname command obtain the information? The answer is proc! See...
Linux system status detecti
For onlineProgramI really don't feel useless, or I won't use it.
========================================================== ========================================================== =
One of the most troublesome problems in C/C ++ development is memory management. Sometimes it takes several days to find a memory leak or a
system is compromised, the format is "last [parameter]"Parameters-A: The last column shows where the hostname is logged from-r: Host name not displayed-num/-n: Specify how many rows to display last-D: For non-local logins, Linux will not only save the remote host name but also save the IP address, this option can convert the IP address to the host name-I: This option is similar to the-D parameter that displays the IP address of the remote host-X: Dis
of virtual processors%cpu: Total CPU usageCPU: The number of CPUs used by the process.Command: Commands nameWhen reporting tasks and all thread global statistics:PID: Process IDUsr-ms: The number of milliseconds that tasks and child threads use at the user level.System-ms: The number of milliseconds that tasks and child threads use at the system level.Guest-ms: The number of milliseconds that the task and child threads use in the virtual machine (running a Vsan processor).Command: Commands name
Mcelog is a tool used on x86 Linux systems to check for hardware errors, especially memory and CPU errors.For example, the server is inexplicably restarted over time, and message and syslog do not detect valuable information.The cause of the MCE error usually occurs as follows:1, memory error or ECC problem2. Processor Overheating3. System bus Error4, CPU or hard
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.