http://blog.csdn.net/thinkerabc/article/details/647272
Command time-execute the command and timing
Format time [P] command [arguments ...]
Description
Executes the command-line command [arguments], which prints the results of the time statistic
This article explains how to configure the Linux kernel to implement its support for USB cameras.
1, configure the kernel; Allow the following command to configure the Linux kernel
[HTML] view plain copy print? Make Menuconfig2, enable the camera
in Linux we often use U disk, SD card mount problem, each time manually mount or uninstall is very troublesome, we can take the following methods to achieve automatic mount or uninstall U disk, SD card
1, first in the/ETC/INIT.D/RSC to add the
Which view the location of the executable file
Whereis View the location of the file
Locate view file location with database
Find actual search hard disk query file name
1, which
Which is looking for executables through the PATH environment variable,
Jenkins configuration Slave specific steps 1 Enter Jenkins to find "System Management"
2 Go to Jenkins System admin page to find "Management node"
3 Find "new node" in the Node Management menu
4 new node page input node name, select Dumb Slave,
centos6.x Configure NIC Bindings
(mainly understand three kinds of modes: mode=0,1,6.)
Stop NetworkManager first.Service NetworkManager StopChkconfig NetworkManager off//power-on self-boot shutdown
In the/etc/sysconfig/network-scripts/directory to
From: http://blog.sina.com.cn/s/blog_5b9734c501011l4b.html
$ tar zxf readline-5.2.tar.gz$ CD READLINE-5.2/$./configure--host=arm-linux--prefix=$ (pwd)/_install$ make$ make Install
The meaning of/configure--host=arm-linux--prefix=$ (pwd)/_install
Man for a moment rear, is so explained:
NAME rear-bare Metal disaster recovery and system Migration Tool synopsis rear [-h|--help] [-v|--version
] [-DSSV] [-d|--debugscripts SET] [-C DIR] [-C CONFIG] [---] [-] [] [--] COMMAND [ARGS ...]
To create a certificate login:
Collects the public key of all users who need to log in, the public key is in the Id_rsa.pub file, and imports our public key into the/home/git/.ssh/authorized_keys file of the Linux server where the Git library
In Linux, the Trap command is used primarily to receive signals and act, signals are sent asynchronously to a program's event, by default, a program can be terminated, and the Trap command prototype is as follows:
Trap command Signal
Signal is the
The function of this command is to copy the given file or directory to another file or directory, which is as powerful as the copy command under MSDOS.
Syntax: CP [option] source file or directory destination file or directory
Description: This
Today, a new egg on the order of a 1TB hard drive to install Ubuntu, of course, the first to do homework, check the attention.
Basic skills, formatting commands, to format/DEV/SDA1 partitions as an example:
$ sudo umount/dev/sda1 # You must
Registering a SDIO driver will call the following function:
/*** Sdio_register_driver-register a function driver* @drv: SDIO function Driver*/int sdio_register_driver (struct sdio_driver *drv){Drv->drv.name = drv->name;Drv->drv.bus =
Change from: Http://z515256164.blog.163.com/blog/static/324430292011113112712825/linux the difference between open and fopen:
The difference between open and fopen:The main difference is that it involves the system, not the buffer. With F is
Linux kernel Configuration and compilation (X86 platform)
Original link: http://www.linuxidc.com/Linux/2013-07/87360.htm
Objective:(1): Configure and compile the Linux-2.6.29 kernel under the X86 platform(2): Install the compiled kernel under VMware
Operating system: CentOS 6.8
1. Install MAILX
Yum Install mail
2. Configure SMTP
Vi/etc/mail.rc
Set from=*** @qq. com
Set smtp-auth-user=*** @qq. com
Set smtp-auth-password=igsre***
Set Smtp-auth=login
Set Ssl-verify=ignore
Set
Second Extended FS Support
EXT2 file system is a standard Linux file system, good at processing sparse files
EXT2 Extended Attributes
EXT2 file System extended attributes (Name:value pairs associated with the Inode) support
EXT2 POSIX Access Control
We create a folder under root and create a file under that folder, so what does the other user have to do with the file's permissions? Let's explore the impact of the parent directory's permissions on the child file.
First, create the test folder
Linux deletes files with special characters
Sometimes we need to delete some files with special characters, but we don't know how to delete them, like I do, and here are some of the ways I've learned to delete: rm–-filename rm./-filename RM * some*
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service