Recently read a lot of kernel programming and drive development tutorials, also refer to some of the Development Board examples. The conclusion is not as high as you can imagine. Developing a driver requires a certain understanding of the kernel,
Logs are important for security, and he records a variety of things that happen every day in the system, and you can use him to check the cause of the error or the traces left by the attacker at the time of the attack. The main functions of the log
Realization of advanced first out shared memory segment based on producer-consumer model
Producer consumer issues: This problem describes the two processes that share fixed-size buffers-so-called "producers" and "consumers"-that can occur when they
first, prepare for work:
1, purchase or download Red Banner Linux Desktop version 4.0 of the installation CD or image files.
Download Address:
http://www.redflag-linux.com/xiazai/xiazai.php?id=1325
2, in the hard drive at least 2 partitions to the
The characteristics of four real-time operating systems (RTOS) are analyzed and compared in this paper. They are: Lynx Real-Time Systems Inc. 's LynxOS, QNX Software Systems Limited, and two representative real-time linux--Kansas at Rt-linux and
Running PPPD with SSH (the simplest Linux VPN)
Sbaa 2003.1.10
I am in order to pass the UDP packet firewall on the QQ
Tried a lot of ways.
With snake SOCKS5 agent good, you can have the extranet machine is Windows
And Linux, Stunnel just forward TCP
Fedora is an operating system and platform, based on Linux. It allows anyone to freely use, modify, and redistribute, both now and in the future. It is developed by a vast community of members who, with their tireless efforts, provide and maintain
Description
SVN (subversion) runs in two ways:
One is based on Apache HTTP, HTTPS Web Access form;
There is also a stand-alone server model based on Svnserve.
SVN has two different ways of storing data: One is to store the data in the Berkeley
Brief introduction
With the rapid development of small and medium-sized enterprises, scalability, low initial investment, simple deployment, reduce footprint, pay by use, security, etc. become hot issues, these can be solved through the cloud model.
Linux under the Firewall (firewall) from the birth to the present, the firewall has experienced four stages of development: the first stage: the firewall based on the router, the second stage of the user Firewall tool sets; Phase III: A firewall
RHEL5 to meet the requirements of the various services
"Make Yum local Source:"
Yum Introduction:
Yum is the abbreviation of Yellow Dogupdater Modified, Yum is the repository of software, it can be an HTTP or FTP site, or it can be a local
Use the program:
chmod setfacl getfacl Stat chattr lsattr
chmod: Setting File permissions
SETFACL: Setting access Control lists (Access controls list)
Getfacl: View access Control List
Stat: Display inode content (a|m|c) time content
Chattr:
The SCP is based on SSH logons.
Copy the root folder test.tar.gz file to the remote host root directory, as follows:
Scp/root/test.tar.gz Root@172.19.2.75:/root
You will be prompted to enter the root user login password for the 172.19.2.75 host
These two days on the SuSE installation and configuration of FTP, encountered a lot of problems, here to do a summary:
First, installation
SuSE's graphical user interface does a good job, so the installation process is relatively simple.
1, open
Why Linux log servers are installed:
As we all know, Linux is a perfect log system operating system. When the system administrator is running the maintenance server, it is unavoidable to view the log file, when the server is wrong, the error is not
When Ubuntu Linux uses the Encrypting File system, the security of the data is well protected. In this case, even if we send the machine to the hacker, as long as they do not have the key, the hacker can see the data will be a bunch of garbled, no
System# uname-a # View kernel/Os/cpu info # head-n 1/etc/issue # view OS version # Cat/proc/cpuinfo # View CPU Info # hostname # View Meter Computer name # LSPCI-TV # List all PCI devices # LSUSB-TV
We recommend a WSL terminal simulator and a WSL terminal simulator.
Windows 10 contains a WSL (Windows Subsystem for Linux) Subsystem in which we can run native Linux ELF executable files without modification. Using it, we can do a lot of things,
Best Linux release name list published on the official website of the Linux FoundationThe Linux Foundation official website, Linux.com, announced a controversial list of the best Linux distributions: Parrot Linux, the best lightweight release
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.