Build Shadowsocks tutorials with Ss-manyuser and Ss-panel in Linux

II. Installation Mkdir/dataCd/datagit clone https://github.com/mengskysama/shadowsocks.git Backendgit clone https://github.com/orvice/ss-panel.git FrontIII. Configuration Front # 1. Create a database and set up a local user shadowsocks@localhost,

How to use the Flock Control program's asynchronous execution _unix Linux in Linux

Recently I often need to SSH to several computers at the same time to do a lot of work that needs to wait and can be done at the same time. For example: 1. Let the remote computer update the kit at the same time 2. Simultaneous transfer of small

Detailed Linux Chinese garbled problem Ultimate solution _linux

First into the Linux program staff, often get garbled greetings. "Toss". Because of garbled, and finally gave up Linux is not a minority. Well, to get to the point, here's a look at the specific Linux garbled solution. method One: modify/root/.bash_

What is a "segment error" with Core and GDB queries under Core Dump Linux

What is a "segment error" with Core and GDB queries under Core Dump LinuxHttp://blog.chinaunix.net/uid-26833883-id-3193279.htmlSometimes when we are in a C code, due to an illegal memory operation, in the process of running the program, there is a

The latest glpi--excellent Linux open source it Asset management system

System: Linux6.5 (64)ip:192.168.0.16Written by: Little Grey black adminGLPI official website: http://www.glpi-project.org/Build Environment: Apache+php+mysql (Latest version Glpi requires PHP version 5.4.0 and above)Date: 2016/11/10I am a rookie,

Common command and usage of file management under Linux system

What are the file management class commands on Linux and how they are used?File system operation commands are divided into: directory operation command, file Operation command, Permission action commandDirectory Operations Command:LS lists the

Teach you how to set a honeypot in the Kali Linux environment?

Guide Pentbox is a security suite that contains a number of tools that make penetration testing work easy to process. It is written in Ruby and targets Gnu/linux, and it also supports Windows, MacOS, and any other system that has Ruby installed.

"Reprint" Under Linux, a file also has three kinds of time, namely: Access time, modification time, state change time

under Windows, a file has: creation time, modification time, access time. and under Linux, a file also has three kinds of time, namely: access time, modification time, state change time . There is a difference between the two, there is no concept of

Linux io Scheduler (Linux IO Scheduler)

each block device or partition of a block device has its own request queue (request_queue), and each request queue can select an I/O Scheduler to coordinate the request submitted . The basic purpose of the I/O Scheduler is to arrange requests

Linux (vii) LAMP environment construction

First, the preparatory work1. Install the compilation tool GCC, gcc-c++Note To resolve dependencies, it is recommended to use Yum installation, if not networked can use the installation CD as a Yum source--1) Edit the Yum configuration file:#

nmon--very good Linux/aix performance counter monitoring and analysis tool

Turn from 51Testinghttp://bbs.51testing.com/viewthread.php?tid=116526Often see a lot of people talk about LoadRunner to Linux/aix performance monitoring too little, indeed, LR for non-Windows platform monitoring is too little, but we can use IBM's

Arch Linux Installation Little Note

Arch Linux Installation Little NoteThis is just an essay to record the process of starting from a new installation of Arch Linux to a variety of software configurations during use.In fact, for Linux with rolling updates like Arch Linux, there is

TI Processor SDK Linux am335x evm/bin/commom.sh hacking

#!/bin/sh## ti Processor SDK Linux am335x EVM/bin/commom.sh hacking# Description: # This article mainly explains the common.sh script in TI's SDK, in order to understand its working mechanism. ## .-4- -Shenzhen

Linux USB Driver Development (i)--USB Equipment basic Concept

In the end user's view, USB device provides a variety of additional functions, such as file transfer, sound playback, etc., but it is consistent with the interface of all USB devices for USB host. A USB device consists of 3 function modules:USB bus

Common git commands and git commands

Common git commands and git commandsCommon Git commands View, add, submit, delete, retrieve, and reset the modified File Git help # display command help Git show # display the submitted content git show $ id Git co -- # discard workspace

The exciting four years at Wikipedia

The exciting four years at WikipediaGuideI think I am a Wikipedia member of Odia. I have contributed Odia knowledge to many Wikipedia projects by writing articles and correcting document errors (this is the main language in Orissa, India), such as

Open-source loose license

Open-source loose licenseGuideWhy does a restricted license like gnu gpl become increasingly undesirable. "If you use any open-source software, the rest of your software must also be open-source ." This is what Mr. Balmer, former CEO of Microsoft,

Install chrome in ubuntu and chrome in ubuntu

Install chrome in ubuntu and chrome in ubuntu First. The subject fails to install chrome by running ubuntu commands. I would like to mention the following errors: Enter the download installation package sudo wget

Android system transplantation and driver development-Chapter 6-use instances to understand Linux driver development and experiences, and android driver development

Android system transplantation and driver development-Chapter 6-use instances to understand Linux driver development and experiences, and android driver development The operating method of the Linux driver is interaction. For example, if you want

In-depth analysis of Linux heap memory management (I) and in-depth analysis of Memory Management

In-depth analysis of Linux heap memory management (I) and in-depth analysis of Memory Management LinuxIn-depth heap memory management analysis(Upper Half) Author: Location @ Alibaba Cloud universal security   0 Preface In recent years, vulnerability

Total Pages: 5467 1 .... 145 146 147 148 149 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.