UnrmHttp://packetstormsecurity.com/UNIX/utilities/unrm-0.92.tar.gzA small tool actually uses the debugfs command in Linux, which simplifies the steps for manual use of debugfs,There is no interactive interface, and the recovered files are directly
In Linux Command Line Mode, RM completely deletes the file, which is risky.
Solution 1:
Installing the trash-cli tool is actually the command line mode of the recycle bin:
Sudo apt-Get install trash-cli
Solution 2:
Add the alias "RM" to the
Original article: the top 10 Linux Server DistributionsAuthor: kenthHessPart of the translation is from: 51 CTO(Count the ten popular Linux Server releases, translated by Zhe ting)
As you know, many data center servers run LinuxThis saves a lot of
Configuring NTP to set up the local time server NTP is a protocol used to keep the system and a precise time source at time. in Linux, we can use the Network Time Protocol to keep our system accurate. install: # Yum install NTP or find the ntp rpm
Original article in: http://bbs.linuxtone.org/thread-1731-1-1.html
For example, to change the zhangsan in all the files under the directory/modules to Lisi, do the following:
Sed-I "s/zhangsan/Lisi/g" 'grep zhangsan-RL/Les'
Explanations:
-I
Multithreading in Linux follows the POSIX thread interface.Pthread. To compile a multi-threaded program in Linux, you need to use the header file pthread. H. You need to use the library libpthread. A for connection. By the way, LinuxThe
From: http://blog.csdn.net/dog250/archive/2010/02/09/5303688.aspx
This rootkit uses no more technology than the previous one. It does not intercept system calls, but intercepts the callback functions of a specific file system. The callback
As we all know, to send an email is to write an SMTP client. SMTP is actually based on the anscii character Protocol. To put it bluntly, that is, you send the specified character to the server, the server will have a corresponding response. Of
Proc is a virtual file system. In Linux, it is mounted on the/proc directory. Proc has multiple features, including the ability for users to access kernel information or to troubleshoot issues. One of these features is very useful, it is also a more
After the root permission is logged on, the/etc/shadow file is obtained and the text is opened.
Shadow file:
In Linux, the/etc/shadow file stores the user's password hash value.
The ciphertext format of the password stored in shadow is as follows:
$
1. Wait for the process to exit
In Linux, the wait function is used to obtain the end information of the sub-process. The function prototype is as follows:
# Include
Pid_t wait (int * statloc );
The function that calls wait is blocked until any
12 Linux Recovery Tools
Computer crashes, hard disk crashes, and a huge amount of money is spent on an emergency protector ...... This is the dark side of computers.
The time has been walking like this, walking around, maybe some days back. It is
Inode is an important concept and is the basis for understanding Unix/Linux file systems and hard disk storage.
I think understanding inode not only helps improve the system operation level, but also helps to understand the Unix design philosophy,
When compiling the scull program of ldd3, the compilation fails, and the problems encountered are the same as those encountered by the following buddies,
Follow the steps below to solve the problem and record it here.
/*******************************
I used to set date all the time. This time, I finally got a full set by referring to the online materials.
Linux clock is divided into system clock and real time clock (RTC. The system clock is the current Linux kernel clock, and the hardware clock
Linux migration account
First of all, it depends on whether the kernel Linux of the chip is supported. If not, the workload will be extremely heavy. Give up.If the CPU-core Linux supports port Linux, the driver is mainly implemented based on the
In x86-64 Linux, when using 64 bits newlib should pay attention to a point, to add "-Disable-multilib" When configure, otherwise there will be the following error, because newlib will upload 32 bits of newlib together with others, will add-M32 when
As we have said before, the sender can send data in one K and one K, while the application at the receiver can extract data in two K and two K, of course, it is also possible to extract 3 K or 6 K data at a time, or extract only a few bytes of data
1. Introduction to shared memory
The shared memory zone is the fastest form of IPC. data transmission between these processes no longer involves the kernel. In other words, processes no longer transmit data by executing system calls that enter the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service