Pipelines can only be used for communication between relationships, whereas in a FIFO, a path is accessible so that communication is possible.FIFO communicates in the first-in, first-out principle, and the data that is written is first read from the
there are duplicates, but it's definitely the point.Linux interview (II)First, Linux operating system knowledge1. What are the common Linux distributions? Which one are you good at? What is its official website? Which one do you specialize in?Answer:
System Information The processor architecture of the Arch Display Machine (1) UNAME-M display the processor architecture of the Machine (2) uname-r display the kernel version dmidecode-q display hardware system parts-(SMBIOS/DMI) hdparm-i/dev/ HDA
"Sudo" is a very useful tool on the Unix/linux platform that allows system administrators to assign some reasonable "rights" to ordinary users to perform tasks that only superuser or other privileged users can accomplish, such as running some
memcached Boot ModeMethod One:Append the start command to the /etc/rc.d/rc.local file
/usr/local/memcached/bin/memcached-u root-d-M 2048-l 192.168.137.99-p 11211-p/tmp/memcached.pid
You can also specify no IP, which is native by
1.last, the default read is the/var/log/wtmp file content, showing the user login history and System restart history-N #: Displays information about recent # times650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M02/84/4F/wKiom1eMmdKhn_XTAAHCM0
Linux process (1) – the environment in which the process runstags (space delimited): LinuxThe following is from the advanced programming of the UNIX environment reading notesPre-citedFirst think about the following questions can be answered:
DNSRelated ConceptsDNS (domain Name System), a distributed database of domain names and IP addresses that are mapped to each other on the Internet, makes it easier for users to access the Internet without remembering the number of IP strings that
The W command displays a list of users who have logged in to the system and displays the instructions that the user is executing. Execute this command to know who is currently logged in to the system, and which programs they are executing. The
Source: Huangguisu Links: http://blog.csdn.net/hguisu/article/details/6122513Linux systems generally have 4 main parts:cores, shells, file systems, and applications. The kernel, shell, and file systems together form a basic operating system
Some Linux by default is SELinux enabled, we can choose to turn selinux on or off when installing the operating system, but how to turn it on and off after installing the system?There is a SELinux file under/etc/sysconf, using VI to open, change the
Regular Expressions (regexp:regular expression)Regular expressions are divided into two categories:1, the basic regular expression. Basic REGEXP2, extended regular expression. Extened REGEXPBasic Regular Expressions:Character matching. Match any
CentOS双网卡双IP设置 系统环境:CentOS Linux network environment: two IP addresses, 10.4.34.31 and 10.4.35.31, the Mask is 255.255.255.0, 这两个子网的网关地址分别是10.4.34.1和10.4.35.1。 1. Configure the IP address 10.4.34.31 for the NIC eth0, configure the IP address for
Transferred from: http://blog.csdn.net/jimmy_1986/article/details/5838297Embedded Linux USB belongs to all the drivers of a very complex subsystem, want to completely conquer her, at least a few months, do not believe? That's not what you did.I have
1. Configure the Networkcat/etc/resolv.conf//View DNSNETSTAT-RN//View GatewayVi/etc/sysconfig/network-scripts/ifcfg-eth0//Change network configurationonboot= "Yes"Bootproto=staticAdd in this directoryIpaddr= "IP"netmask= "Subnets"gateway=
Learn about Linux, please refer to the book "Linux should Learn"The world's first supercomputer, the light of Taihu Lake, made the world's attention. This supercomputer was developed by China, and the processor uses 64-bit domestic 260-core CPU
As a system administrator, you can often (at some point) need to see which users in your system are active. Sometimes you even need to know what they are doing. This article summarizes 4 ways to view system user information (by number (ID)).1. Use
Non-root users cannot start Tomcat listening to port 80I. Problems
After a website is bound to a domain name, port 80 is directly used for access through the domain name. Therefore, tomcat must listen to port 80. For security reasons, tomcat
Smokeping for Network Monitoring
Smokeping can be used to check the network status and stability.
1. Adjust firewall settings[Root @ C65-A1 ~] #/Etc/init. d/iptables stopIptables: Setting chains to policy ACCEPT: filter [OK]Iptables: Flushing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service