function pointer inside the parenthesesModule destructor: The function called when executing the rmmod instruction unload module. Function prototype is module_exit ()Module License Statement: The function prototype is Module_license (), which tells the kernel which license the program uses, otherwise it will prompt the module to contaminate the kernel when it is loaded. The GPL is generally written.Header file Module.h, this file must be included;Header file Kernel.h, containing commonly used k
graph bar will change depending on the scale;Press J or press K to scroll up or down the screen to display the connection record;Press 1 or 2 or 3 to sort by the three-column traffic data displayed on the right;Sort by Sort by > According to the host name or IP of the remote target host;Press O to toggle whether the current connection is fixed only;Press F to edit the filter code, this is translated by the saying, I have not used this!You can use the shell command, this is useless! I don't know
Original: Redis Advanced Practice II How to install Redis on Linux systems I. Introduction Previous article wrote "How to install a VMware Pro virtual machine" and install the Linux operating system on a virtual machine. That was the first step, and with the Linux operating system, we were able to install Redis on
Linux Process understanding and practice (4) wait function processing botnetsWait background
When a child process exits, the kernel sends a SIGCHLD signal to the parent process. The exit of the child process is an asynchronous event (the child process can be terminated at any time when the parent process is running)
When a child process exits, the kernel changes the child process to a zombie state. This pro
Linux multithreading practice (4) specific data of threads
In a single-threaded program, we often use "global variables" to share data among multiple functions. However, in a multi-threaded environment, because the data space is shared, therefore, global variables are shared by all threads. However, sometimes it is necessary to provide a global variable private to the thread in the application design, which
Linux practice engineer study Note 2: common system management commands redhat-config-network-tui is a unique configuration tool for redhat. After configuring network parameters with this command, writes to the/etc/sysconfig/networking/profiles/directory, and takes precedence over network-scripts/ifcfg-eth0
1. useradd redhat
2. passwd redhat
3. su-
4. exit
5. df-h partition
6. du-sh/* size of the space used
/wKioL1efWByDz9ZbAAARrolxRGo309.png "title=" 70X} $A %13i] $IT 8t2~4fqi1.png "alt=" Wkiol1efwbydz9zbaaarrolxrgo309.png "/>2. Convert the current system login user's information to uppercase and save to the/tmp/who.out fileW.H.O. | Tr ' A-Z ' A-Z ' >/tmp/who.out650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/85/4C/wKioL1efWJGSbbeAAAAPHDUGAoc863.png "title=" p}%~6c _}c_{s ' 85$u9 ' zg}s.png "alt=" Wkiol1efwjgsbbeaaaaphdugaoc863.png "/>3, a Linux
Read end
Shut_wr
Close the Write end
Shut_rdwr
Both read and write off
Close terminates two directions of data transfer, shutdown can selectively terminate data transfer in a certain direction or terminate data transfer in two directionsSHUTDOWM How=1 can guarantee that the peer receives an EOF character, regardless of whether other processes have opened the socket.Close does not guarantee that it will be sent until the socket reference count is re
sent, call the function gethostbyname () to resolve Host B, and convert the hostname to a 32-bit IP address. This process is called DNS domain name resolution .Step b:ping program sends an ICMP echo packet to the destination IP addressStep c: Convert the destination host's IP address to a 48-bit hardware address , send ARP request broadcasts within the LAN, and find the hardware address of Host B.Step d: After the ARP protocol layer of Host B receives the ARP request from host A, the hardware a
:/sbin/shutdownHalt:x:7:0:halt:/sbin:/sbin/haltBash:x:505:505::/home/bash:/bin/bashNologin:x:508:508::/home/nologin:/sbin/nologin
5. Display the default shell and UID of root, CentOS, or User1 user on the current system (please create these users beforehand, if not present)
[[email protected] ~]$ grep-e ' ^ (root|centos|user1) '/etc/passwd | Cut-d:-f1,3,7Root:0:/bin/bashCentos:509:/bin/bashUser1:510:/bin/bash
6, find a word in the/etc/rc.d/init.d/functions f
) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/79/BD/wKioL1aaFgyzqgUwAAAhpWUiLqI409.png "style=" float: none; "title=" 7.png "alt=" Wkiol1aafgyzqguwaaahpwuilqi409.png "/>7 , one day the system was invaded, hackers in your system to leave the Trojan file:You now need to find all the files on the current system that are not owned by the master or group and have been visited in the last week;In addition, it is necessary to find all files of more than 20k and type ordinary files in/etc dire
= "Wkiom1aliz2zxaaaaaanlsds7_o489.png"/> 6 Find all files that are not root, bin, or Hadoop under the/usr directory; 650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M02/79/34/wKioL1aLgezCdoiXAAAFwFYBvWM900.png " Title= "7.png" alt= "Wkiol1algezcdoixaaafwfybvwm900.png"/> 7, one day the system was invaded, hackers in your system to leave the Trojan file:You now need to find all the files on the current system that are not owned by the master or group and have been vis
Requirements: On-line system performance optimization, locating servers and online system bottlenecks
Based on on-line experience data and expectation quantification
Data
Up
Down
On-line data
50
500
Test data
100
500~2000+
Test data
200
500~2000+
Test data
300
500~2000+
registration of the process is revoked. The process must call Mq_notify again to reregister (if necessary), but be aware that re-registration is placed before the message is read from the message queue and not after (as with the example program);Attached-View the POSIX message queue that has been successfully created#其存在与一个虚拟文件系统中, you need to attach it to your system to viewmounting the message queue filesystem On Linux, message queues is created in
is able to receive a **/Comprehensive case1) Create child process and parent process;2) Register SIGINT non-real-time signal and sigrtmin real-time signal, and add these two signals to the process shielding signal Group;3) Register user-defined signals;4) The sub-process sends 5 non-real-time signals and sends 5 real-time signals;5) The sub-process then sends the SIGUSR1 to unblock the sigint,sigtrmin signal.6) Observe the difference between real-time and non-real-time signalsprogram example vo
Learn more about the character test of Linux and the practice of bash scriptingOne, character test options= =: Tests whether two strings are equal, equals true, and not equal to false.! =: Tests whether two strings are unequal, unequal to true, and equal to false.-N String: Tests whether the specified string is empty, NULL is true, and is not NULL for false.-Z String: Tests whether the specified string is n
of the extra directory, and then call it in the form of include.8 Nginx alias and connection status information configuration
#别名其实就是以相应的别名配置虚拟主机, then use the rewrite rule to jump to the primary domain.Specifically write a configuration file with the following contents:server {Listen 80;server_name etiantian.com;Rewrite ^ (. *) http://www.etiantian.com permanent;}This file will then be called in the Nginx file: include extra/www_alias.conf
That is, configure a virtua
package, download the installationRemove Uninstall, the configuration file is not deletedAutoremove will remove unused packagesClean Delete the buffer storage inside the hard driveUpdate download updates package list informationUpgrade Upgrade SystemSystem Core configuration file:ETC/PASSWD and Etc/shadow passwd is the account information, and Shadow is the password. Said originally in passwd can see encrypted secret law, but because passwd file is often stolen, crack root secret method, now pa
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.