Roughly summed up the Linux under the various formats of compression package compression, decompression methods. But some of the methods I did not use, also not all, I hope you help me to add, I will be ready to modify, thank you.
. tar
Unpack: Tar
Before reading this article, please master the following basics, or skip this article.
Preliminary Knowledge :
Read the first 10 chapters of LDD3.
Familiar with kernel-driven model (SYSFS) and platform bus.
Briefly understand the SD card
I believe you vpser in the use of VPS will often in different VPS backup data or transfer data, most of the VPS have been installed on the Nginx or similar Web server, directly to the transfer of files to the Web server directory, Then execute on
DateCommandThe function of the date command is to display and set the system date and time.The general format for this command is: date [options] Displays the time format (beginning with +, followed by formatting)Date set time formatThe meanings of
RAID information is usually kept in the last location of the hard disk, such as 1TB hard drive, can be cleared (999998000 is a general block location, it is not clear where the information of each RAID card is kept, can only guess the most normal
Translator Note: Recently in the file system-related, whenever you read the inode related things, the book or blog will be related to hard link/soft link content, so today specifically for hard links translated a few English, understand it. One,
1. Df-lh
2. Du-s/usr/* | Sort-rn
This is sorted by byte
3. du-sh/usr/* | Sort-rn
This is sorted by megabytes (M)
4. Select 10 of the preceding
Du-s/usr/* | Sort-rn | Head
5. Select the following 10
Du-s/usr/* | Sort-rn | Tail
Du-h–-max-depth=0
Notebook is not a serial port, so bought a USB to the serial port line. After the driver installation, the Super terminal to try, the development of the Board pass.
I am using XP system +vmware, how to make the virtual machine to identify this
When developing high-performance network programs, Windows developers say that Iocp,linux developers will say Epoll. We all know that Epoll is an IO multiplexing technology that can handle millions of socket handles very efficiently, much more
One, gitGit reset--soft fallback commit to commit codeGit format-patch-1 generate a single patchgitformat-patch Generate multiple patches after a version (not including itself)git am patch/*.patch hit patch"Git commit--amend--reset-author"git log--
Modify the NIC Ens33 to Eth0In the use of Rhel and CENTOS7, found that the NIC name became Enox, quite unaccustomed. Now change back to the old name Eth0 looked pleasing to the eye.1. Back up the/etc/sysconfig/grub filecp /etc/sysconfig/grub
Source: Find command with the grep file content Lookup command under LinuxWhen using Linux, file lookups are often required. The commands you find are primarily find and grep. Two commands are of a district. The Difference : (1) The Find command is
1, (think) the system why to have users1.1 Users?? The lowest-level security settings in the system, and reclaim (limit) rights.1.2 Groups?? Share rights. Divided into the following two kinds:?? (1) Additional groups: groups determined by the user
The du command is used to view the size of the disk space occupied by a directory or file. Common option combinations are: Du-shOne, Du's function: ' Du ' reports the amount of disk space used by the specified files and for each subdirectory (of
Although the Linux system is very powerful, stable, but we use the process, if the human operation is not appropriate, will still affect the system, and may even make the system does not boot, unable to run services and other problems. Then this
Multi-touch (MT) Protocol
-------------------------
Copyright (c) 2009-2010 Henrik Rydberg Introduction
------------
To give full play to the powerful functions of recent multi-point touch and multi-user devices, we define a method for
1. view the file type:
File, For example: # file/etc/Password
Ii. File Search:
1. Which (find the "execution file 』)
# Which [-A] command parameter:-A: Lists All commands that can be found. By default, it is the first command to be found.This
Introduction
The concept of Virtualization has long existed. Simply put, virtualization is the process of using certain programs and making them look similar to other programs. Applying this concept to a computer system allows different users to
The firmware upgrade instance of ms6000 chip with melfas describes the installation process of image files in the general array format. The chip requires a pin combination to complete a certain sequence and enable a set of command codes to enter the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.