Solve the Problem of unstable wireless connection in linux ubuntu: When xubuntu wirelessly accesses some routers, it constantly reconnects and the network is always good or bad. Check/var/log/syslog. If the system prompts that the wireless
For system administrators or programmers, grep is probably the most popular tool when they need to search for specific text or patterns in a directory with complex configurations or in a large source code tree.
If grep is one of your favorite tools,
1. crontab-E: edit the scheduled task. View crontab-L. The final cron task file is saved in the/var/spool/cron/crontab directory.
2. cron switches to the owner of the cron file in the/var/spool/cron/crontab directory and then runs the defined
The tail command is used to view the file content. Its common parameters are as follows:
1.-F option: dynamically view the content appended to the file, which is generally used to monitor log files.
# Tail-F/var/log/syslog
2.-N option:
Write System logs in C language in Linux
__________________________________________________________________________________________________
Author: jobo
Time: 2011/11/24
Emaile: jibo.tiger@gmail.com
Statement: I am not opposed to reprinting my
We are building a swift environment on our own these days. After reading some documents and combining my own practices, I wrote it down:
1. Physical Environment Description:
Linux: Ubuntu server 12.04 Proxy Server IP: 10.214.0.181storage server
I read ldd3 in the cloud. Fortunately, I have the source code. I can find the source code, compile it, and learn about ldd3. Find a source code and run it. Whether it's a white cat or a black cat, catch a mouse. You have to run it for me first, haha!
Nginx + keepalived for dual-machine hot standby and tomcat Load Balancing
Environment Description:
nginx1:192.168.2.47nginx2:192.168.2.48tomcat1:192.168.2.49tomcat2:192.168.2.50vip:192.168.2.51
I. nginx Configuration1. Install the PCRE Library
Reference: http://blog.csdn.net/andyxie407/article/details/1672325
Today, I encountered a lot of problems running on the 16-14 (client) and 16-15 (server) In chapter 16th of apue, run the method thanks to the andyxie407 article for a good reference (
Kernel tree ~ O 'Reilly's Linux device drivers have repeatedly stressed that kernel trees must be built when writing drivers. The so-called kernel tree is a logical form of kernel source code.
First, check the kernel version used by your OS.
Shana @
Sixth Chapter First Linux driver: Count the numbers of wordsThe Word_count driver for counting the number of words is the first complete Linux drive implemented in this book. Although the functionality of the Word_count drive is not complex, it is
Cat command:Cat filename View the contents of a filecat[options [File] ...-B numbers non-blank lines, line numbers starting with 1-N and NL commands are similar, numbered output displays for all rows (including blank lines)-e Append $ sign at the
Recently encountered a program after a long run time, the operating system due to out of memory caused the system Oom-killer the program directly killed the problem:The error message is probably:Out of Memory:kill process 20011 (main)
Last -a the host name or IP address from which to log in to the system , displayed on the last line.-d Specifies the record file. Specifies the record file. Converts an IP address into a host name.-F specify record file.-N or- set the number of
Sixth, the first Linux driver: Count the numbers of wordsFirst, the steps to write a Linux driver1. Build Linux driver skeleton (load and unload Linux drivers)Module_init processing driver initialization, Module_exit processing driver exit2.
IntroductionLsof (list open files) is a tool that lists open files for the current system. In a Linux environment, everything is in the form of files, with files that not only access regular data, but also access to network connectivity and hardware.
Written in front: some time ago, my friend told me a story of a well-known company she had personally experienced, the end of the interview feel that they have taken off a layer of skin ... The interviewer's problem is not tricky, but is a
1. Installing OpenswanApt-get Install Openswan2. Open the/etc/ipsec.conf file and make the following configuration:Where Virtual_privat contains the network address allowed to be configured as the subnet on which the remote client resides. In other
Organize Linux to view system logs for some common commands
Last-a the host name or IP address from which to log in to the system, displayed on the last line.-d Specifies the record file. Specifies the record file. Converts an IP address
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.