Monitorix (Linux) system and network monitoring tools

First, MonitorixMonitorix is a very powerful free open source lightweight tool designed to monitor system and network resources in Linux. It collects system and network data on a regular basis and uses its own web interface to display relevant

Set maximum file open number under Linux nofile and Nr_open, File-max instructions

 In the development of operations we often encounter similar to "Socket/file:can" T open so many files, "Unable to open more processes", or coredump too large problems, which can be set resource constraints to solve. Today, when I was teaching a

Using Iconv command to deal with Chinese garbled characters of text files under Linux/unix system

The Iconv command is a file-encoded reload tool that runs on the Linux/unix platform. When we look at the text file in the Linux/unix system shell, we often find that the file is garbled in Chinese, this is due to the encoding of the text file and

Linux Common Command collation

System Information1. Uname-a-r-n-M-a-all; Print all information in the following order, except omit-p and I if unknown:-S, kernel name; print kernel name-N, node name; The host name of the print network nodes-R, kernel release, printed kernel

Every day a Linux command (--tar) command

Through SSH access to the server, it will inevitably use compression, decompression, packaging, unpacking, etc., this time the tar command is a necessary powerful tool. The most popular tar in Linux is the perfectly formed.The tar command creates a

Linux view CPU and memory usage

During system maintenance, it may be necessary to review the CPU usage at any time, and to analyze the system condition according to the corresponding information. In CentOS, you can view CPU usage by using the top command. After running the top

One Linux command per day (shutdown) command

Shutdown shuts down the system in a safe way.(1) Usage:usage: shutdown [parameter] [TIME](2) Function:function: system shutdown command, shutdown instruction can close all programs, and according to the needs of users, to restart or shutdown action,

Linux Signal Volume detailed

1. What is SemaphoreThe semaphore is a special variable, and access is atomic.Only two actions are allowed on it:1) wait for the semaphoreWhen the semaphore value is 0 o'clock, the program waits; When the semaphore value is greater than 0 o'clock,

One Linux command per day-mkdir

mkdir a command to create a directory on a Linux system that requires the user to have write permission on the path where the directory was created, and that the newly created directory name cannot be a directory that already exists.Mdkir-make

One Linux command per day exec of the--find command

Find is a very common Linux command, but we generally find out the amount is not only to look at it, there will be further operations, this time the role of exec is revealed.EXEC explained:The-exec parameter is followed by command, which terminates

Read the default MAC address under Linux

Read the default MAC address under Linux Guide The MAC (media access control) computer uses it to define and identify the location of network devices. In the embedded Linux learning inevitably also encounter Mac, this article

Multiple Linux servers ssh mutual access without password

Excerpt:, the Environment configuration1. System: CentOS release 5.6 ip: host Name: JW012. System: CentOS release 5.9 ip: host name: JW023. System: CentOS release 5.3

Linux Learning 6 Package installation


First, package management Introduction two, RPM package management-RPM Command Management III, RPM package management-Yum Online Management Iv. source package management Five, script installation package and package selection1, Package

Linux command crontab timed execution of tasks

I. Introduction of CrondCrond is a daemon that is used to periodically perform certain tasks or wait for certain events under Linux, similar to Scheduled tasks under Windows, when the operating system is installed, the Service tool is installed by

SCP remote file copy of Linux command

SCP is the most powerful file transfer command in Linux, enabling easy file transfer operations from local to remote and remote to local. The following is a brief explanation of the operation of the SCP command, for some useful reference:The first

BSS segment, data segment, code snippet for target file under Linux

Http:// uninitialized global DataData already initialized globalText code snippet, machine instructionRodata string ConstantsReference: "Programmer self-accomplishment"Code compiled machine

Linux tar command

Http:// is commonly used on Linux packaging, compression, compression tools, he has a lot of parameters, folding only to enumerate the commonly used compression and decompression

Linux Brute Force hack tool Hydra Detailed

Today to help friends do the honeypot test when using this tool, quite convenient, by the way on the Internet to check the relevant information, meet good text, share to everyone:First, IntroductionNumber one of the biggest security holes is

Read the default MAC address under Linux

the Guide to MAC (media access control) is a computer that defines and identifies the location of network devices. In the embedded Linux learning inevitably also encounter Mac, this article mainly describes how to read the embedded Linux Device

Linux and Windows \ r and \ n

application void Niuniu (void) {char Buf[16];char *p[6];int i;led_init (); Uart_init (); while (1) {puts ("\r\nuart>"); Gets (BUF) ;//Remove \r\nbuf[strlen (BUF)-2] = ' strtok ';//Strtok function uses global variable p[0] = (buf, ""); for (I=1; P[i-1

Total Pages: 5469 1 .... 204 205 206 207 208 .... 5469 Go to: GO

Alibaba Cloud 10 Year Anniversary

With You, We are Shaping a Digital World, 2009-2019

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.