Reprinted from: Http://www.cnblogs.com/purediy/p/4288649.html Query related findFind a file or folder, including subdirectories, by rule
find . -name ‘*.sh‘--Files ending with. sh
find . -name ‘*channel*‘--File containing the channel
Recent need to collate commands for device performance monitoring (Linux)1. UptimeEg:22:59:10 up, 23:05, 3 users, load average:0.29, 0.43, 0.94One minute, five minutes, 15 minute load respectivelyRepresents the average number of processes waiting in
Mac:media Access controCoaxial transmission signalLine arbitration: At some point which annotations can use this transmission mediumCSMA/CD: Carrier audiometry Multi-access, conflict detection (Ethernet Ethernet)Repeater: Amplification voltage, the
On Linux, everything is file. Similarly, the system's real-time status information is also stored on the file system in the form of a file. In/proc/, the state information in the kernel is saved, and the information of the process is saved in
This article describes some of the Linux command-line tools that you can use to monitor network usage. These tools can monitor data transmitted over a network interface and measure the speed at which data is being transmitted. The inbound traffic is
This article lists the 10 basic network and monitoring commands that each Linux user should know about. Network and Monitoring commands are similar to these: hostname, ping, ifconfig, Iwconfig, netstat, nslookup, traceroute, Finger, Telnet, ethtool
Capable of communicating between processes; Ipc,inter-process communication1.signal (signal)2.semaphore (semaphore)3.shared Memory (SHM)4.socketValid signal representation method:1. Use the digital code of the signal to represent it;2. Use the full
Linux commands: Command-Parameter 1-Parameter 2-Parameter 3 ... Multiple parameters can be combined as command-parameter 1 parameter 2 parameter 3 ...Command--help View command HelpCommand-parameters & the following & indicates running in the
This article only cares about Python's network programming and focuses on TCP/IP units.First, a simple understanding of the following:1, what is TCP/IP,UDP?TCP/IP (transmission Control protocol/internet Protocol) is a protocol/inter-network protocol,
In earlier years, I wrote a load balancer scheduling algorithm module, which calculates a value based on a fixed length of data starting at any offset of the Application layer protocol packet, and then hashes the value to a different server. There
This article describes some of the Linux command-line tools that you can use to monitor network usage. These tools can monitor data transmitted over a network interface and measure the speed at which data is being transmitted. The inbound traffic is
So how should the IP address of the other party be searched? Such a question you may scoff at, indeed, it is simply not worth mentioning the IP address of the other computer, but you may be reluctant to give you a list of multiple IP address search
Top commandMonitor the operating state of the system, and can be sorted by CPU, memory, execution time. The first line, 03:30:22 is the current time, up 39 min is how long the system runs, 1 user indicating that there are currently several users
IntroductionHTTP is an object-oriented protocol belonging to the application layer, which is suitable for distributed hypermedia information System because of its simple and fast way. It was proposed in 1990, after several years of use and
The server-side general step of TCP programming is
1, create a socket, with the function socket ();
2, set the socket property, with function setsockopt (); * Optional
3, binding IP address, port and other information to the socket, with the
The Java socket bottom layer uses TCP/IP protocol communication, the communication details are encapsulated, we just need to specify IP, port, we can easily create TCP or UDP connection, network communication. Data is read and written, and can be
Platform Environment: Centos 7.0First, the architecture modeSecond, Core ServicesMaster1) ETCD ServiceETCD is a highly available key-value storage system that Kubernetes uses to store the state of individual resources, enabling restful APIs. The
Kernel version: 2.6.34
The previous section describes the NetFilter framework, address: http://blog.csdn.net/qy532846454/article/details/6605592, the connection tracking described in this section is implemented on the NetFilter framework ,
SOCKS Protocol Version 5 Working principleHttp://www.faqs.org/rfcs/rfc1928.html
SOCK5 Agent's work procedure is: (pastes)
1. Request information needs to be sent to the proxy server.2. Agent Response3. Send the destination IP and port to the agent
http://blog.csdn.net/ronmy/article/details/6403051
One: Basic terminology FirewallsThe firewall restricts the communication between private network and public network, it mainly considers the unauthorized packets discarded, the firewall only
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.