2.1 Current application roles for LinuxLinux kernel is very small and can run in many power-saving and low-hardware environmentsLinux distribution integrates a lot of great software and is also suitable for personal computer use2.1.1 The use of enterprise environment
Network server
Mission-critical applications (financial database, large Enterprise network management environment)
High-performance computing tasks for academic institutions
2.1. Use of 2 human environments
Desktop
1.1 Linux is what 1.1.1 Linux isLinux is a set of operating systems-an environment in which programmers can develop software more easily1.1.2-1.2.4 (omitted on Linux predecessor, GNU Project, and Torvalds Linux development process)Kernel version of 1.2.5 Linux
The main and minor versions are odd in the developing version
The primary and minor versions are even stable versions
1.2.6 Linux DistributionsFully-installable Linux Publishing SuiteMajor similarities and differences bet
portability
The program is of specificity
0.4.2 Operating SystemOperating system kernelThe operating system is also a set of programs that focus on managing all the activities of the computer and all the hardware in the drive systemThe chunks placed in the memory by the kernel program are protected and are permanently in memory after they are powered on.System calls Kernel featuresSystem Call InterfaceProgram ManagementMemory managementFile System ManagementDevice drivers0.4.3 appli
under./ethereum, enter the password in it, and each account has a password such as:12345612345612345610. Configure Ethereum Startup script private_blockchain.sh (name pickup)Geth--rpc--rpcaddr= "0.0.0.0"--rpccorsdomain= "*"--unlock ' 0,1,2 '--password ~/.ethereum/password --nodiscover- -maxpeers ' 5 '--networkid ' 1234574 '--datadir ' ~/.ethereum ' consoleEach time you start the Geth node, you only need to enter a commandBash private_blockchain.sh11, after starting, enter Eth.getcompilers ()
shut down.2) Run Level 3: pure command line mode.3) Run Level 5: Contains graphical interface mode.4) Run Level 6: Reboot.6. Troubleshooting problems with the boot processFirst, the problem of file system error is discussed. There are three scenarios: the root directory is not corrupted, the root directory is corrupted, and the hard disk is broken.Finally, we talked about forgetting the root password . Describes the use of the Grub boot loader to resolve this issue. Copyright NOTICE: This artic
; "src=" http://s3.51cto.com/wyfs02/M00/6B/A2/wKioL1UzngqTqylHAAFmWLDJCMY045.jpg "/>First Login VMware VCloud Director of the Web interface needs to be initialized according to the wizard650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6B/A6/wKiom1UznLHyemz7AAD6KOsxW60152.jpg "/>650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6B/A2/wKioL1UzngrAH4P2AAFvdnkWD3c757.jpg "/>650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6B/A6/wKiom1UznLKSf2OmAADqHRuxa2o942.jpg "/>Set
Linux is a multi-tasking multi-user system-R continuous changes with recursion, along with all files under subdirectories, will changeShutdown-Option Time parameter display messageShutdown-k nowShutdown-h +10Shutdown-r 10:28 ' The system would reboot at 10:28 'RebootInit 0 shutdownInit is the meaning of switching the level of execution, different numbers for different levels of execution: 0 shutdown, 3 pure command line mode, 5 mode with graphical interface 6 restartLs-aLs-alCHGRP Group name Fil
, = representative settings.File or directoryEg1:infor Original permission is drw-r–r– input command chmod u=rwx,g=rw,x=rx inforInfor Permissions to Drwxrw-r-x (note that there is no space in the middle of the U=rwx,g=rw,x=rx)Eg2:infor Original permission is drw-r–r– input command chmod u-w inforInfor Permissions Change to dr–r–r–5. Copy files: CP source file Target file EG:CP. bashrc. bashrc_testsecond, log in rootMethod 1: Enter the command: sudo su then prompts to enter the current account (S
Bash inside the variable PS1 is the user's usual prompt, the system defaults to [[email protected] working directory]$. For more information about PS1, see: http://www.cnblogs.com/starspace/archive/2009/ 02/21/1395382.htmlIn the article, it is introduced that the PS1 modification is required to be written to the ~/.bash_profile in the restart, but this is for the login shell (that is, the various TTY terminal interfaces, etc.), for the nonlogin of the command-line terminal that enters the Xwindo
Language Perl files, followed by a prefix may also be taken. pl such file nameThe maximum allowable file name for a single file or directory is 255 charactersFull pathname with full path name and directory (/) named 4,096 charactersLimitations of the Linux file nameIn general, it is best to avoid some special characters when setting up a Linux file name/etc Boot and system data files are in this directory/bin/sbin/usr/bin/usr/sbin This is the placement directory for the system preset execution
database to find files, so it's fairly fast . The Linux operating system records all the file information in a database file, and the Whereis and locate commands are used to locate the file using this database file. Although this approach is fairly fast, the database file update is not real-time (different distribution, CentOS updates the data file once a day), so when you use the Whereis or locate command to find a file You may have found a file that has been deleted, or the newly created file
enter\n", Tid); Pthread_setspecific (Key, (void *) tid); Sleep1); printf"Thread%d returns%d\n", Tid,pthread_getspecific (key)); Sleep5);}int main (voidint Tid1,tid2; printf ( "hello\n" Span style= "color: #000000;" >); Pthread_key_create (key,echomsg); Pthread_create ( tid1,null,child1,null); Pthread_create (tid2,null,child2,null); Sleep ( 10); Pthread_key_delete (key); printf (main thread exit\n "); return 0 The nature of the thread:In fact, in Linux, the new thread is not in the original
a small operating system, a DEC (Digital Equipment Corporation) launched by PDP-7 no one to use. Ken took over to transform, after four months of time, he finally an assembly language to write a set of kernel programs. ---uinx system prototype. It was called UNICs.In 1973, Ritchie and others wrote the first formal Unix kernel in C language.The BSD branch of Unix--Berkeley software distributionBerkeley University's Bill Joy (founder of Sun) is involved in UNIX collaboration, adding a lot of comp
, of course, the device driver is the core needsDo the thing! Fortunately, there are now so-called "loadable modules" function, you can edit the driver into a module, you do not need toTo re-compile the core!Operating system and driversFrankly speaking, the driver can be said to be a very important part of the operating system! However, the hardware continues to progress! PackageIncluding motherboards, display adapters, hard drives, and more. The newer hardware that is later introduced, such as
compressed file name: Extract files. or bunzip2 Compressed file name: Extract files.TAR-ZCVF compressed package name. tar.gz Original file: Compresses the original file into. tar.gz format, both directories and files can be compressed using the. tar.gz format.TAR-ZXVF compressed package name. tar.gz: Unzip the package name. tar.gz.TAR-JCVF compressed package name. tar.bz2 Original file: Compresses the original file into. tar.bz2 format, both directories and files can be compressed using the. ta
ls: View files and directoriesCD: Switch directoriesPWD: Show current directorymkdir: Creating a DirectoryRmkdir: Delete an empty directoryRM-RF: Delete the directory and delete all files in the directoryEcho: Display, printMV source file path after move file path: Move File/directoryCP source file path copy to file path: Copy fileCp-r source file path to file: Copy directoryFrequently viewed file contents:Cat: Display file contents starting from the first lineTAC: Displays the contents of the f
File system Hierarchy? fhs:http://www.pathname.com/fhs/Linux Standard Base? lsb:http://www.linuxbase.org/Tips:Exciting Real bird Brother obituary for distributions is divided into two major systems, one is to use the RPM obnoxious-installed softwareSystems, including Red Hat, Fedora, SuSE, and so on, one of which is the use of Debian'sDpkg obnoxious installation software system, including Debian, Ubuntu, b2d and so on.There are several major Linux distributions publisher URLs listed below:? Red
database file, and the Whereis to use the locate is the next to say that the contents of the database will be based on the content, therefore, you will find the use of these two files, you will find the file has been killed! And Hideaway also can't find the latest files that have just been created! This is because the two led orders are the result of database bi search for files! Locate is related to the Linux archive database (the Linux system will keep all of the files in the system 弽 in a d
shutting down or restarting, always)Although the current Shutdown/reboot/halt and so on led order are already in the shutdown before Import line sync This tool call, but do more than a few times more comfortableShutdown)To learn how to use the method, man shutdownCommand:/sbin/shutdown-h ' I'll shutdown after ten mins 'Time is the parameter that must be added, otherwise shutdown will automatically jump to run-level 1 as a maintenance log-in situationExample: Shutdown-h now shuts downShutdown-h
Fifth ChapterUse of man and infoKey combinations: Toggle login environment, TAB, CTRL + C, ctrl+dThe correct way to shut down the computerTroubleshooting problems with the boot process: File system error, forgotten root passwordSixth chapterModify a file's properties/permissions: Chown/chmodDifferent meanings of permissions for files/directoriesFHS Directory Configuration criteria: Defines the directory as 4 interaction modes, defines what data should be placed under/,/usr,/varInterpretation of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.