Download Address: http://www.kerneltravel.net/journal/v/mem.htm
absrtact : This chapter first examines the process memory management of Linux from the perspective of application developers, and builds on the kernel to discuss the system physical
"Purpose description"
Bash has built-in support for integer arithmetic, but does not support floating-point operations, and the BC Command makes it easy to do floating-point operations, and of course integer operations are no longer spoken. The man
The reason and debugging method of segment error (segmentation fault) under Linux (Classic)
In short, generating a segment error is access to the wrong memory segment, generally you do not have permissions,
Preface
Device tree is a data structure used to describe hardware, similar to a plate-level description language, originating from OpenFirmware (of). In the current widely used Linux kernel 2.6.x version, for different platforms, different hardware,
Introduction: Mainly on the three Linux servers, cluster installation elasticsearch.6.2.1, and its ES plug-ins, a variety of management software 1. cluster installation es 1.1 environment
Domain IP
biluos.com 192.168.10.173
biluos1.com
As shown, create a new user Masterbai under root privileges, and add some information to the/etc/passwd fileIn this file, the user information of the server, such as the red box user, is the user we created, and up to 2-25 of the users, belonging to
traceroute Command (Unix)/tracert command (Windows)The format of the TRACERT command is: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] [-r] [-S srcaddr] [-4] [-6] target_name.①,-DIndicates that the address is not resolved to a host name.
The original text was published in "Cyber Security and Informatization" in the 3rd issue of 2018, reproduced in the blog.Process management is a basic skill that Linux system operators should master, Linux, as a typical multi-user operating system,
A Linux server Performance View 1.1 CPU Performance View 1, view the number of physical CPUs:cat /proc/cpuinfo |grep "physical id"|sort|uniq|wc -l2. View the number of cores in each physical CPU:cat /proc/cpuinfo |grep "cpu cores"|wc -l3, the number
seven weeks two sessions (March 20)10.6 Monitoring IO Performance10.7 Free Command10.8 PS Command10.9 Viewing network status10.10 Linux under Grab bag Extended TCP three-time handshake four times wave http://www.doc88.com/p-9913773324388.htmlTshark
Alpine Linux's official website:http://www.alpinelinux.org/#官方Https://pkgs.alpinelinux.org/packages #官方提供的安装包查询When you use Docker to create a container, the underlying image typically chooses Ubuntu or CentOS, regardless of the size of the image
These two usages of set are often seen in the shell scripts in the work, but like many things in life, habits lead to neglect until problems arise. 1. Set-eThe- e parameter of the SET command, Linux comes with the following description:"Exit
Diffcompare two files or directories in different placesAnd they all take the first file as the object of action:The first file is much more than the second one, and it needs to be deleted, and less to be added. Is the same as the second file that
Character and string processing functions: Character and string processing functions are all character data, but their return value types are different.1. Take the SUBSTRING function:Format: substr (C,N1,N2)Function: Take the string C N1 character
Linux system logs and analysis, linux logs
Linux has flexible and powerful log functions, which can save almost all operation records and retrieve the information we need.
The default log daemon process for most Linux distributions is syslog
Use digital signature RSA or DSA to implement ssh between two linux machines without the user name and password, rsassh
To enable two linux machines to use ssh, the user name and password are not required. Therefore, the digital signature RSA or DSA
How to recursively exclude files when using the scp command
Q: I need to copy all the folders containing the *. c file from the local notebook named hostA to hostB. I use the followingscpCommand, but do not know how to exclude a specific file (such
Install CentOS 7 and CentOS 7
Install with a USB flash drive
1. Use CentOS 7 system image to create a USB disk boot disk
1) download the CentOS 7 System Image
: Http://mirrors.aliyun.com/centos/7/isos/x86_64/
: Http://mirrors.sina.cn/centos/7/isos/
SSH is based on Key verification and accelerates SSH connection, and key verification ssh connection speed
Authentication Method for SSh service logon:
Password-based security verification
1. When the client initiates an ssh request, the server
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.