Recently I learned about Linux, which has a samba service that can solve the mutual access between Windows and Linux. The interface is equivalent to accessing shared access between windows. Friendly interface. So learning ..
Download the Samba
2011-11-09# Uname-A # view kernel/operating system/CPU Information# Head-N 1/etc/issue # view the operating system version# Cat/proc/cpuinfo # view CPU Information
Use head-N 1/etc/issue to list Linux OS I have currently used:
Debian GNU/Linux
Server operations may be attacked by hackers. Common attacks include SYN and DDoS. By changing the IP address, it is possible to find the attacked site to avoid the attack, but the service interruption takes a long time. A thorough solution is to
Programming the IDE environment in LinuxEclipseHttp://www.linuxdby.com/html/linux/other/20070509/40014.htmlUsage in Windows:Install j2sdk-rj4_2_09-nb-4_1-win-ml.exe (in fact, after installing netbeans can also be used, Chinese tutorial
Fu O & M personnel, good or false, such as sniffer) Sniffer is a double-edged sword in the field of network security. It can be used as a network attack tool by hackers or helps O & M to diagnose network faults. This article takes three
AgendaUnderstanding syslog SystemFamiliar with syslogd configuration files and Their syntaxLearn to view system logsUnderstanding the necessity and implementation of log rollingSyslogWhat is SyslogLogs are mainly used for system auditing, detection
Linux diary: Cut grep sort WC & uniq
After several days, I finally had time to write a Linux blog. Recently I felt a lot of emotion, but I was unable to give up my love for Linux. So I continued my research and didn't want to delay my step forward
File IO is not cached, and each read and write calls the corresponding system call in the kernel.File IO common functions:Open, close, read, write, lseekFor the kernel, all open files have file descriptor references.The file descriptor is a
1. Shield grub Information
On Gentoo, the version of amd64 grub is 0.97-r12. You need to modify the source code to block screen printing.
-Create a local overlay:/usr/local/portage/xxx-overlay and add the following content: portdir_overlay =
In Linux, the file type does not depend on its suffix, but generally speaking:
. Ko is the suffix of the dynamic connection file used by the Linux 2.6 kernel, that is, the module File, used to load the kernel module when the Linux system starts.
.
Linux has developed into many versions, and different companies have developed different Linux versions. It is best to describe Linux.
Linux is free of charge, but it is indeed a very good operating system, compared with the MS-WINDOWS has the
Http://www.ibm.com/developerworks/cn/linux/l-cn-nohup/()
We often encounter this problem. We use Telnet/ssh to log on to a remote Linux server and run some time-consuming tasks. As a result, the task fails midway through due to network instability.
In Linux, the find command details the find command in Linux searches for files in the directory structure and executes the specified operation. In Linux, the find command provides many search conditions and has powerful functions.
Common usage
The long and dark Prehistoric Age finally came to setup. In the setup Assembly function, Linux completes the transformation from prehistoric civilization to modern civilization by setting the PE bit of the Cr0 register (switching from the real mode
A header file: mqueue. h is found in the/etc/inclue directory of the server. If you do not know what to do, check it. The following information is displayed:
(1) Implement posix message queues in linux. You can use man mq_open series functions;
(2)
Linux programming environment I. vim
The vim editor can be divided into three modes: Command mode, insert mode, and baseline mode, as shown in the diagram of mutual conversion between Vim modes.
Command mode: controls the movement of the screen
# Use Webmin to manage Redhat Enterprise Linux 6.0
1 Webmin installation Configuration
1.1 Webmin Introduction
Most people may feel a headache when configuring Various UNIX services, because there are too many services in UNIX, and each service
Devices in the system that can access chunks of a fixed size are called Block devices, which are called blocks. The most commonBlock DeviceIs hard disk, in addition, there are many floppy disk drive, CD-ROM drive and flash, etc.OthersBlock device.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service