Restore accidentally deleted files in Linux

UnrmHttp://packetstormsecurity.com/UNIX/utilities/unrm-0.92.tar.gzA small tool actually uses the debugfs command in Linux, which simplifies the steps for manual use of debugfs,There is no interactive interface, and the recovered files are directly

Delete files from Linux to the recycle bin

In Linux Command Line Mode, RM completely deletes the file, which is risky. Solution 1: Installing the trash-cli tool is actually the command line mode of the recycle bin: Sudo apt-Get install trash-cli Solution 2: Add the alias "RM" to the

10 most popular Linux Server Distributions

Original article: the top 10 Linux Server DistributionsAuthor: kenthHessPart of the translation is from: 51 CTO(Count the ten popular Linux Server releases, translated by Zhe ting)   As you know, many data center servers run LinuxThis saves a lot of

Configure the NTP Time Server Client in Linux

Configuring NTP to set up the local time server NTP is a protocol used to keep the system and a precise time source at time. in Linux, we can use the Network Time Protocol to keep our system accurate. install: # Yum install NTP or find the ntp rpm

Install Apache + Tomcat (Apr, APR-util) and JK in Linux

Software: apache-tomcat-6.0.24.tar.gz Httpd-2.2.14.tar.gz Jdk-6u18-linux-x64.bin Tomcat-connectors-1.2.28-src.tar.gz tar-zxf httpd-2.2.14.tar.gzapr Installation CD httpd-2.2.14/srclib/Apr. /configure -- prefix =/usr/local/HTTP/aprmake & make install

[Sed] Linux sed replaces strings in batches

Original article in: http://bbs.linuxtone.org/thread-1731-1-1.html For example, to change the zhangsan in all the files under the directory/modules to Lisi, do the following: Sed-I "s/zhangsan/Lisi/g" 'grep zhangsan-RL/Les' Explanations: -I

Analysis of multi-thread programming instances in Linux

Multithreading in Linux follows the POSIX thread interface.Pthread. To compile a multi-threaded program in Linux, you need to use the header file pthread. H. You need to use the library libpthread. A for connection. By the way, LinuxThe

Two linux kernels rootkit-2: adore-ng

From: http://blog.csdn.net/dog250/archive/2010/02/09/5303688.aspx   This rootkit uses no more technology than the previous one. It does not intercept system calls, but intercepts the callback functions of a specific file system. The callback

Sending email programs in Linux

As we all know, to send an email is to write an SMTP client. SMTP is actually based on the anscii character Protocol. To put it bluntly, that is, you send the specified character to the server, the server will have a corresponding response. Of

A comprehensive understanding of the proc file system in Linux

Proc is a virtual file system. In Linux, it is mounted on the/proc directory. Proc has multiple features, including the ability for users to access kernel information or to troubleshoot issues. One of these features is very useful, it is also a more

[Reprinted] Linux password cracking

After the root permission is logged on, the/etc/shadow file is obtained and the text is opened. Shadow file: In Linux, the/etc/shadow file stores the user's password hash value. The ciphertext format of the password stored in shadow is as follows: $

Linux Process relationship operations

1. Wait for the process to exit In Linux, the wait function is used to obtain the end information of the sub-process. The function prototype is as follows:   # Include Pid_t wait (int * statloc );   The function that calls wait is blocked until any

Files deleted by mistake in Linux recovery (stuck everywhere, not verified)

12 Linux Recovery Tools Computer crashes, hard disk crashes, and a huge amount of money is spent on an emergency protector ...... This is the dark side of computers. The time has been walking like this, walking around, maybe some days back. It is

Introduction to inode in Linux

Inode is an important concept and is the basis for understanding Unix/Linux file systems and hard disk storage. I think understanding inode not only helps improve the system operation level, but also helps to understand the Unix design philosophy,

Linux driver_ldd3_scull driver compilation in the new kernel

When compiling the scull program of ldd3, the compilation fails, and the problems encountered are the same as those encountered by the following buddies, Follow the steps below to solve the problem and record it here. /*******************************

Linux time settings

I used to set date all the time. This time, I finally got a full set by referring to the online materials. Linux clock is divided into system clock and real time clock (RTC. The system clock is the current Linux kernel clock, and the hardware clock

Linux migration account

Linux migration account First of all, it depends on whether the kernel Linux of the chip is supported. If not, the workload will be extremely heavy. Give up.If the CPU-core Linux supports port Linux, the driver is mainly implemented based on the

Pay attention to the newlib of 64 bits on Linux in x86-64

In x86-64 Linux, when using 64 bits newlib should pay attention to a point, to add "-Disable-multilib" When configure, otherwise there will be the following error, because newlib will upload 32 bits of newlib together with others, will add-M32 when

Socket for Linux Network Programming (5): Issues and Solutions of TCP flow Protocol

As we have said before, the sender can send data in one K and one K, while the application at the receiver can extract data in two K and two K, of course, it is also possible to extract 3 K or 6 K data at a time, or extract only a few bytes of data

Introduction to shared memory and MMAP functions in Linux Network Programming

1. Introduction to shared memory The shared memory zone is the fastest form of IPC. data transmission between these processes no longer involves the kernel. In other words, processes no longer transmit data by executing system calls that enter the

Total Pages: 5467 1 .... 1056 1057 1058 1059 1060 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.