Linux High Performance Server programming-system detection tools

System Detection Toolstcpdumptcpdump is a classic subcontracting tool, tcpdump There are a number of options available to the user, the swimsuit filter datagram or the custom output format. lsoflsof is a tool that lists the file descriptors that

The grep of the "Three Musketeers" in the text processing of Linux system

When we write a script, we often intercept some data from the command output, such as: I want to know how many hard disks are on the hostThis is very convenient. Using grep to find the data we want and then using sed , or Cup cutting, we can get the

Linux under Soft raid

1. See how many hard drives are available#fdisk-LWell, in general, leave the system disk, the other disks if the size of the same, all together to do a raid.2. Decide what type of RAID to do.raid-0, Raid-1, raid-5?If you have three disks (or more)

The Tar of Linux basics

#未完待续The only way to unlock a single fileIf I just want to untie the package file,One of the files in it, how do you do it? Vigilance simple, you just use-JTV to find the file name you want, and then the file nameYou can undo it. We use the

Linux interprocess communication Programming 6----signal Volume

Main purpose: Protecting critical resourcesTwo-value beacon: 1 maxCount Lights: Multi-process accessible. Minus 1 operations.Wait for automatic wakeup.A collection of semaphores#include #include #include Create/Openint Semget (key_t key,int

Linux iptables Firewall Overview ~

Linux Firewall system mainly work in the network layer, for TCP/IP packet implementation filtering and mechanism, belong to a typical packet filter firewall (or called network Layer Firewall). NetFilter and iptables differences:NetFilter: Refers to

Install and update libraries on Linux using an external device (optical drive)

1. Mount the optical drive (directory does not exist, create)Mount-t Auto/dev/cdrom/mnt/cdrom2. Modify the index file, specify to read the local fileVi/etc/yum.repos.d/centos-media.repoIncrease file:///mnt/cdrom/for node BaseURL3. Install with yum

Getting Started with Linux you'll find it in there.

a basic introduction to grep and Egrep :First, we need to know that grep 's command itself means:grep [Global search REgular expression and print out of the line] globally searches the contents of the regular expression and prints out the matches in

Set up static IP under Linux

First go to the Network-scripts folder #:cd/etc/sysconfig/network-scriptsThen use VI to edit Ifcfg-eth0 #:vi ifcfg-eth0 #仅eth0网卡一个DEVICE = eth0 #设备名称BOOTPROTO = static #获取IP的方式或依赖的协议, where auto is changed to static broadcast=192.16

Installation Rz/sz commands and instructions for use in Linux systems

For people who frequently use Linux systems, the RZ/SZ command is a convenient means of uploading local files to the server or downloading files from the server, but many Linux systems do not initially have these two commands. Today, we will briefly

Linux iptables Firewall Overview ~

Linux Firewall system mainly work in the network layer, for TCP/IP packet implementation filtering and mechanism, belong to a typical packet filter firewall (or called network Layer Firewall). NetFilter and iptables differences:NetFilter: Refers to

Linux Command Learning Notes

First, command ls:1, ls command function:The information that is used to list the file or directory, which belongs to an external command.2. ls command format:ls [option] parameter (option can be multiple connected together)3. ls command common

How does Linux partition the disk and mount it?

How is Linux going to partition a piece of disk partition and use it? Processes such as650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/3C/20/wKioL1PA5fvj5VhvAADvlciwNEs674.jpg "title=" The process of formatting a disk partition. png "alt="

Open source Clanav under Linux

ClamAV is a virus-checking software under the command line.Official address: http://www.clamav.net/lang/en/Official Document: http://www.clamav.net/lang/en/doc/For situations where large-scale deployments are needed, it is best to use an efficient

Restrict remote login IP on Linux

1) White list formrequirements: Only allow 192.168.0.11 and 192.168.0.10 login All other forbiddenimplementation:1. Vim/etc/hosts.allow//Add the following:sshd:192.168.0.11, 192.168.0.102. Vim/etc/hosts.deny//Add the following:Sshd:all2) blacklist

Installing JDK in Linux

Almost all of the servers in the company are built on Linux, so this is unavoidable, (if you use the Java language) to put a set of JDK on Linux, which is the Java Virtual Machine environment.Below, I specifically describe the installation process,

"Brother's Linux Private Dishes" study notes (1)--Files and directories

In Linux, any device is a file, not only that, but also a data communication interface has a dedicated file responsible. It can be said that everything is file, directory is also a file, is a path mapping. Therefore, the file system is the

The use of the GCC compiler in Linux

GCC is a very important compilation tool for development in a Linux environment, so it is necessary to learn the basic common usage of GCC.  First, let's start by explaining the suffix name type of the source file under GCC compilation.. c is a

"Brother's Linux Private Dishes" study notes (0)

I've heard of Linux for a long time, but I've never learned Linux from the system. This time in the blog Garden of the Maiden show to Linux, hoping to give themselves to learn Linux a persistent power, adhere to the victory, fighting!In my opinion,

Dell r710xd installs the system through a remote management card, and r710xd Remote Management

Dell r710xd installs the system through a remote management card, and r710xd Remote Management Machine dell r720xd Server Remote Management Card: iDRAC7 installation system CentOS 5.9 64-bit 1. First, you must configure the IP address and user name

Total Pages: 5467 1 .... 3284 3285 3286 3287 3288 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.