Linux must learn 60 commands (5)-Network securitySubmitted by Zhanjun in Thursday, 2006-04-13 12:42
Linux must learn 60 commands: System security-related commandsLinux must learn system security commands (1)Author: Cao Yuan its dispatch time: 2004.12
Modify network connection mode modify Linux virtual Machine network adapter main configuration modify Windows virtual machine IP information
Modify network connection mode
To view the MAC network, paralles virtual machine--> windows, CentOS Modify
=============================================================================
Original address: http://blog.micro-studios.com/?p=615#comment-1069
Look after the feeling: this is more careful than the LDD3 said
November 29, 2012 11:24:17: There are
SVN diff Replacement tool
One. Replace SVN diff with Vimdiff:
For most Linux developers, Vimdiff's presentation of file differences is obviously much more intuitive than SVN diff.
So can we use Vimdiff instead of SVN diff? Fortunately, SVN
Under Windows, a file has: creation time, modification time, access time.
In Linux, a file also has three kinds of time, namely: Access time, modification time, state change time.
There's a difference between the two, and there's no concept of
statement: This article is "Brother Bird's Linux private dish" reading summary.
Disk Basics Dot Finishing
The main components of the whole disk are: a rounded disk disc (a portion of the main record data); a mechanical arm, with a disk-reading
the need to upgrade the OpenSSH to OPENSSH_7.1P2 as a result of third party monitoring software scanning Linux SSH vulnerabilities
System version:
[Root@db ~]# Uname-aLinux db 2.6.32-431.el6.x86_64 #1 SMP Sun Nov 22:19:54 EST 2013 x86_64 x86_64 x86_
One, top+pstack+gdb of the combination of boxingGossip less, first directly on the operation of the example, and then do the principle of explanation.
1.1 Using top command to find the most CPU process
>top
PID USER PR NI virt RES SHR S%cpu%mem
Sunday, 09. September 2018 07:51 pm-beautifulzzzz1. Installation Steps
1) Download the latest Gcc-arm toolchain from the GNU Arm Embedded Toolchain website, which is downloaded as follows: gcc-arm-none-eabi-5_4-2016q3-20160926-linux.tar.bz2
1. Insert a USB flash drive2. Use fdisk-L to view the device name of the USB flash drive, and check the system type to confirm the USB flash drive.3. My USB flash drive type is FAT32, so create a mount point USB under the/mnt directory (if it does
Use the Linux kernel linked list, hlist macro definition, and operations in user space programming.
List_head and hlist_head/hlist_node in Linux kernel are two important linked list construction tools that concatenate data structures into linked
Use the firewall function of Linux to defend against Network AttacksVM service providers may be attacked by hackers during operation. Common attacks include SYN and DDoS attacks. By changing the IP address, it is possible to find the attacked site
The Xixiang program was finally completed. Since the kernel module was unable to be downloaded, I had to write it myself. After understanding the principle of the Xixiang program, writing this module is not very troublesome (in fact, it is not
Install VMware Tools in redhat9
The installation steps are as follows:1. Start rad hat 9.0 (graphical logon) and log on as an administrator.2. In the vmwarevm menu, click: Virtual Machine-> install VMware tool-> install.3. Red Hat 9.0 automatically
During system initialization, kernel_init creates and runs applications in the kernel state to complete system initialization. when the kernel was just started, only the kernel-state code was available. Later, some initialization system programs
As an embedded product, the company uses the ARM kernel and Linux operating system (not uClinux ). My recent work is to mount a previously prepared module (via serial port for communication) to the system, and control a series of work of this module
Linux servers have the following features: low cost, excellent performance, and open code. More and more enterprises are preparing or adopting Linux to take on the important responsibilities of enterprise application servers. This article describes
People who may learn QT generally feel that QT's IDE development environment is relatively small and hard to find. In fact, the IDE environment is scarce for Linux development.Here I recommend several good ides:1. kdevelop 3.5, a well-established
Linux versions are installed on hard drives in windows at, September 28. Take Linux mint 14 as an example.
I. Preparations
1. Partition
To ensure the security of hard disk data, we recommend that you partition at the end of the hard disk. A 10-20
Linux operating system disk installation Customization
Wang lunwei (xc_wangwei@163.com ),
PhD student from National Defense University of Science and Technology
Introduction:This article describes how to customize a Linux system installation disk
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.