Solve Linux under Set

Since the use of PHP-SYSLOG-NG monitoring log information, often found that some of the past will ignore the error information, is currently being resolved. One of the errors occurred when I logged on to the server using the key via SSH, and the log

Linux Environment interprocess communication: pipelines and well-known pipelines

Pipes and famous pipes In this series, the author outlines several key means of communication between Linux processes. Among them, pipelines and well-known pipelines are one of the earliest interprocess communication mechanisms, pipelines can be

Back up the part of Linux that uses Luks encryption

Some of us, for security reasons, encrypt the hard drive through the Linux Unified Key Configuration (Luks) at home or on the VPS, and these drives will quickly grow to dozens of or hundreds of GB. So while we enjoy the security of Luks devices,

Ways to set up firewalls for the Linux system's servers

Firewalls Help filter access ports and prevent logon attempts to use brute force laws. I tend to use the powerful firewall of CSF (Config Server Firewall). It uses iptables, is easy to manage, and provides a web interface for users who are not good

Install VNC under Linux

Today installed VNC, solve a lot of problems, write a teaching post, to see the novice, if you encounter the same problem, you can quickly solve, without headaches or even give up. System environment vm+rhel5.1 [Root@localhost. vnc]# uname-r 2.6.

How to download using Wget in Linux

Use examples: 1. Download a single file The code is as follows: $ wget Http:// 2. Download a single file in the background of continuous transmission mode The code is as follows: $ WGET-BC

Deep analysis of the timing tasks under Linux

After having the alarm function of the mail, the next thing to do is to do a timed task, so that the task is performed on a periodic basis, so that it can periodically receive the alarm information Before doing a scheduled task, check the current

Linux Next example of a simple multithreaded mutex

This article is an example of a simple multithreaded mutex in Linux analysis, the need for friends can refer to the following copy code code as follows: #include #include pthread_mutex_t device_mutex; int count=0; void Thread_func1 () {  

How to compress pictures under Linux system

Method of bulk compressing picture size under Linux system Now the mobile phone users are very large, for mobile phone users have to consider the traffic, but the mobile network bandwidth is small, how the image compression on the internet is a

method of connecting Linux server via key authentication mechanism under Windows

SSH service supports a security authentication mechanism, that is, key authentication. The so-called key authentication, in fact, is to use a pair of encrypted strings, one called the public key, which anyone can see its contents, used for

Introduction to STAT command usage in Linux

The LS command may be one of the first commands that every Unix user learns, but it only shows a small portion of the information the Stat command can give. The stat command obtains information from the index node of the file. As you may have

Methods of using Logrotate to manage log files in Linux systems

The log file contains useful information about the events that occur in the system, and is often used during the course of the troubleshooting or during the performance analysis. For busy servers, the log file size grows extremely fast and the

tutorial on installing wine on Linux systems

Wine, a very popular and powerful Open-source application on the Linux platform, with it, we can run Windows apps and games perfectly on the Linux platform. WINEHQ team, recently announced a new development version of Wine1.7.29. This version

How to compress JPEG images on the command line under Linux system

Today, photographic devices, such as smartphones and digital cameras, are getting bigger resolution. Even the 36.3 million-megapixel Nikon D800 has rushed into the market, and this trend simply can't stop. Today's camera devices are constantly

How to batch rename files in Linux

In Linux, when you want to change a filename, use the MV command. However, MV cannot use a wildcard rename characters to name multiple files. You can use SED, awk, or with Xargs to work with multiple files. However, these command lines are

Ten common mistakes in Linux management

For Linux administrators sometimes make small Linux management common mistakes, but for some of the administrators who just stepped into Linux management, if not avoid some common mistakes, it is easy to the organization's network or system security

Linux Common Commands Encyclopedia

System Information Processor architecture for arch display machines (1) UNAME-M processor architecture for display machines (2) UNAME-R Displays the kernel version being used DMIDECODE-Q display hardware system parts-(SMBIOS/DMI)

The method of Linux intrusion right (server claim)

The method of using MySQL root to extract power The MySQL 5.x introduces a system function that executes commands that can be executed by using this function when MySQL is logged in as root, which is, of course, within the purview of the permission.

How Linux modifies system times and time zones

To modify a time zone: 1> Find the appropriate time zone file/usr/share/zoneinfo/asia/shanghai Replace the current/etc/localtime file with this file. Or find the server you think is Standard time, and then #scp

Write Lua extensions so files and invoke method instances under Linux


This article mainly introduced under Linux to write LUA extensions so file and Invoke method instance, this article gives the C language code, compile so file, Lua call code instance, need friends can refer to the following The code is as follows:

Total Pages: 5469 1 .... 300 301 302 303 304 .... 5469 Go to: GO

Alibaba Cloud 10 Year Anniversary

With You, We are Shaping a Digital World, 2009-2019

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.