Linux system add root certificate linux Certificate Trust List, linux Certificate
1. https certificate access in linux
[root@boss-test-dev001-jydx~]#curl-vhttps://mobile.mycard520.com.tw*Abouttoconnect()tomobile.mycard520.com.twport443(#0)*Trying220.130.127.122...connected*Connectedtomobile.mycard520.com.tw(220.130.127
System callsis a soft interrupt, API function, let the upper application fall into the kernelProcess ManagementProcess scheduling, scheduling algorithm, process three-stateProcess is the minimum unit fork for CPU scheduling resourcesVFS Virtual File ManagementUnder Linux, all the devices are filesDriver Bus Model 2.4 2.6 (TRUE) Support PnPExt3 ext2 vfat File Management system----> Driver Development under the driver bus modelMemory managementProcess l
Programmers are lazy, you know.
Recently in development, you need to use the server's IP and Mac information. But the server is installed on the Linux system, for the multiple network, in the acquisition of IP generated a lot of problems. The following is a method for Java to obtain a local IP on a Windows system. Paste Code:
Package com.herman.test;
Import java.net.InetAddress;
/**
* @see get computer IP
* @author herman.xiong
* @date May 16, 20
[Linux] Linux system (process management) and linux System Process Management
Process: When we run a program, Linux creates a special environment for the program, including all the resources for running the program. This environment is called a process.
Foreground process: Generally, some commands belong to the for
[Linux] Linux system (login, exit, password repair), linux Password
To log on to linux, enter the user name and password and press Enter.
Change Password
Use the passwd command to enter a new password and confirm the password. The password rules are strict. Try multiple times.
Run the whoami command to view t
[Linux] Linux system (File Operations), linux System File Operations
Linux has three file types: common files, directories, and device files.
View files
Use the ls command to get ll and view the file list. parameters:-l (list form) and-a (display hidden files)
Use metacharacters *? To view the list of matched fil
First, replace the file1. Op.txt is known to exist in the/root/data, how to copy the/root/afeng/op.txt to the data directory and replace2.1[[email protected]/]# \cp/root/afeng/op.txt/root/data/2.2[[email protected] ~]#/bin/cp/root/data/op.txt/root/afeng/Second, VIM's shortcut keysG reach the bottomGG arrives on the first floorO Go to the downstream editorU undo: Wq Save and exit: q! Forced exitThird, set the alias1. Why alias is setSafety: To enter a crowbar when using dangerous commands2. The f
Summary of the basic operations of Linux, basic operations of linux
Preface
Linux was a UNIX-compatible operating system developed in 1991 and can be used for free. Its source code can be freely transmitted and can be modified, enriched, and developed by anyone, the original intention of developers is to jointly create a perfect, ideal and free-to-use operating s
Linux Directory Architecture
/root directory
/bin commonly used commands binary file's catalogue
/boot store files that must be read when the system is started, including the core (kernel)
/boot/grub/menu.lst Grub Settings
/boot/vmlinuz kernel
RAM Disk required for/BOOT/INITRD core decompression
/dev System Peripheral Equipment
/ETC System Related setup file
/etc/dir_colors Set Color
/etc/hostname set the user's node name
/etc/networking only yes indi
New users talk about Linux, new users linux
Directory:
What is Linux?
Differences between Linux and UNIX
Comparison between Linux and Windows
What is the Linux release?
Linux applicatio
2nd Chapter: Installation Guide
2.1 Pre-Installation Preparation
1, collecting system data: In order to be able to successfully install and set up the Linux system, you must put the following information for the installation of the system to use:
HDD: Quantity, capacity and type;
Memory: The amount of memory installed on your computer;
CD-ROM: interface type (IDE, SCSI);
SCSI card: The model number of the card;
Network card: The model of the network
[Linux] C language Linux system programming creation process, linux
1. process ID
Each process is represented by a unique identifier, namely, the process ID (pid). The system ensures that each pid is unique at a certain time.
1.1 allocate process ID
By default, the kernel limits the maximum process ID to 32768. You can set/proc/sys/kernel/pid_max here. In a short
[Linux] C language Linux system programming-11 TCP communication statuses, linux-tcp
Three-way handshakeThe client initiates a SYN request, and the client is in the SYN_SENT State (the first handshake)After the server receives the message, it changes from LISTEN to SYN_REVD and replies to the client. After the client receives the response, it is in the state of
[Linux] Linux commands for counting folders and files, and linux statistics
# View the number of files in the current directory (excluding files in subdirectories)
Ls-l | grep "^-" | wc-l
# View the number of files in the current directory (including files in sub-Directories) Note: R, representing sub-Directories
Ls-lR | grep "^-" | wc-l
# View the number of
0. Most commonly used Pstree:[Email protected] temp]# Pstree-a|grep Multe| | '-multepoolser| | '-multepoolser| | ' -2*[{multepoolser}]1. > TopAll system processes can be displayedPress U, and then enter the appropriate execution user name, such as TomYou can see all the processes that Tom user started and the corresponding PID2. > Pstack pidYou can see the running state of each thread under this PID,[[email protected] multepoolserver]# pstack 14944 (PID number of the process)Thread 2 (thread 0x4
[Linux Device Driver] linux address type, linux Device address type
List of address types used in Linux:
User virtual addresses)
The normal address visible to the user space program. The virtual address length is 32-bit or 64-bit. It depends on the underlying hardware architecture. Each process has its own virtual addr
[Linux] linux Command learning-netstat, linux-netstat
Many linux services are related to the network. When the service cannot be called, the startup port is occupied, or the firewall is blocked, you need to query network problems, the netstat command only uses one or two parameters.
Common options:
-A (all) shows
Linux basic Review (1)-Linux System Overview, linux Overview1. What is an operating system? What is the relationship between it and hardware and other software?
An operating system is a system software (or a set of programs) that controls and manages various hardware and software resources in a computer system and effectively organizes multiple programs to run.
Transferred from
Http://beterfly.blogbus.com/logs/23724282.html
Basic commands:Logout: LogoutLog on to login againExit to exit the current user Shutdown: shutdown + timeExample: shutdown now (shutdown now or immediately)Shutdown-C cancel all shutdown settings (shortcut: Ctrl + C)
Restart the computer:Shutdown-r restart timeExample: shutdown-RReboot (immediate restart) is the same as shutdown-R
In Linux, there are seven run_level_number running levels
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.