Using the GdB method debugging, because of the limited resources of embedded system, it can not be debugged directly on the target system, which is usually debugged by Gdb+gdbserver. The target system must include the Gdbserver program, and the host
routing table
There are routing table fib_table_hash and routing cache table rt_hash_table in the kernel. The Routing cache table is primarily designed to speed up routing lookups, and each routing query first finds the routing cache and then finds
Locate allows users to quickly search the file system for specific files. The approach is to create a database that includes all the file names and paths in the system, and then simply query the database when looking, without actually going into the
The CP command is used to copy files or directories and is one of the most commonly used commands in Linux systems. Typically, the shell sets an alias, and when the file is copied at the command line, if the target file already exists, it asks if it
It was with the previous reading and writing base that we began to look at the RAID5D code. RAID5D is not a read-write entry, nor is it a place to read and write, but simply a transit point or a transport hub. The hub has a commanding position, like
1 Source Code Form
1 The vast majority of open source software is directly published in the form of source code
2 source code is usually packaged into a tar.gz archive zip file
3 The source code of the program needs to be compiled into binary
Rational Tools for Linux development
Rational Software provides a comprehensive solution that enables you to build, integrate, scale, transform, and deploy software with Linux. With broad support for all roles and activities in the software
A possible online information is everywhere, because I also always forget, I will be the basic steps to write.
1.root Landing,/etc/services Cvspserver 2401/TCP presence confirmed
2./etc/xinetd.d/under the Cvspserver new rules made (file name can
Linux is doing its way, many friends believe that it has been used to set up a variety of services, what web, FTP, BBS and so on, and so on, this time, I would like to introduce another Linux run under the Server software----Noseyparker, a powerful
In order to improve the high availability of the system, we can bind two or more network cards into a virtual network card, using the same IP address, to ensure that a link is broken, another link can be activated at any time, improve the stability
One: Principle:
Logging is important to the security of the system, which records a variety of things that occur on a daily basis, which users can use to check the cause of the error or to look for traces left by the attacker. The main function of
Iftop script installation, download script to the/usr/local/sbin/directory:
Iftop script reference adsorption pieces! Rename to: iftop.sh
Note: Permissions must be granted to run:
#chmod 755 iftop.sh or #chmod u+x,g+x,o+x iftop.sh
#./iftop.sh or
I. Overview
Memory mapping, in short, is to map a section of memory area of user space to the kernel space, after the successful mapping, user changes to this area of memory can be directly reflected to the kernel space, the same, the kernel space
In Linux, file lookups are commonly used with two commands, namely locate and find.
#locate based on locate database lookup, not real-time lookup, not exact lookup. Faster.
#find do not search according to the database, real-time lookup, traverse
One, what is Yum
Yum is the abbreviation for "Yellow Dogupdater, Modified", and the executable program name is yum. Yum is a shell front-end package manager in Fedora and Redhat as well as SuSE and CentOS. One of the important reasons for
Default Permissions
Each terminal has a Umask attribute to determine the default permissions for new files and folders
Umask is represented by the use of digital permissions, such as 022
The default permissions for the directory are: 777-umask
Use rights: All user dd This instruction is defined in manual as convert and copy a file
How to use: DD [option]
If you want to see manual online, try it: DD--help or info DD
If you want to see how this version is: DD--version
Input or output DD
Recently saw the group mentioned how to restore Linux under the Ext4 mistakenly deleted files, before heard of ext3 partition recovery tool ext3grep, but restore EXT4 has no concept, and the current line of the system partition format is EXT4, So on
1, what is the bare Linux device? Character devices? Block device?
Bare devices: Also known as bare partitions (raw partitions), is a special character device that is not formatted and is not read by Unix/linux through a file system. A raw device
Gnu/linux users can run popular Windows exclusive applications with wine, but they do not have a similar simulator to run popular Mac applications. Now, a Hungarian developer named Lubo Doleel is trying to reverse the situation by developing an OS X
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service