View the size of the Linux File directory and the number of files contained in the folder
Total statistics size
Du-s files/
Du-Sm * | sort-N // count the current directory size and sort the directory size.
Du-SK * | sort-n
Du-SK * | grep
Syntax: unzip (option) compressed file name. Zip
The meanings of each option are as follows:
-X file list: Decompress the file, but does not include the specified file.
-V.
-T whether the test file is damaged, but the pressure is not solved.
-D
Linux Kernel since 2.6 version, it is strongly recommended CPIO-INITRD.
Currently, initrd of major Linux releases are in the cpio format.How to Make CPIO-INITRD.First, let's assume that we have used busybox, klibc, or anything else to prepare the
The telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main method of the Internet remote login service. It provides users with the ability to complete remote hosts on local computers.
WorkCapabilities. Use
Each time the system is started, different services are started based on different runlevel levels.
Press [CTRL] + [alt] + [F7]/[F8] to view the services that are being started at system startup !!!!
As we all know, Linux provides us with different
Http://mhbjava.javaeye.com/blog/26594
Http://www.ybfq.com/lamp/svn-subversion-command-flowchart-in-website-design/
1. Two files are required. httpd and subversion. httpd are Web servers used to access subversion through the Web. httpd can be
Http://www.tianyablog.com/blogger/post_show.asp? Blogid = 311462 & postid = 10646176
I. Syntax
1. Chain OperationsCreate a new chain (-N ).Delete an empty chain (-x ).Change the principle of a built-in chain (-P ).Lists the rules (-l) in a chain
1. Go to sphinx to download the corresponding package: sphinx-0.9.8.1.tar.gz (recommended document version)
ExtractsphinxSource code package:
$ Tar xzvf sphinx-0.9.8.1.tar.gz$ CD sphinx
2. Run the configure configuration program:
$./Configure
# You can put this script in/etc/crontab, 01 0 *** mysqlbackup. Sh# Well, the system will automatically run the backup. Sh file to back up the MySQL database at every day.# The automatic backup script can be executed only once a day, and only the
When I migrated Apache Web server a few days ago, I found that the page using reverse proxy cannot be displayed. The reverse proxy configuration in the Apache configuration file is as follows:
ProxyRequests Off ProxyPass /homepage/ http://192
Image depth and breadth priority Algorithms
# Include # include # include # include # define N 5 # define M 10 typedef int datatype; typedef struct {datatype data [m]; int front, rear;} sequeue; sequeue * Create () {sequeue * sq; If (sq =
Summary:
Linux Kernel uses a lot of Data Structure Knowledge. Although Linux is written in C language, many of the content in it is an object-oriented idea. Therefore, the knowledge of data structures is very basic and important.
Data structure
Loop linked list, the final tail pointer pointing to the head knot point, two-way loop linked list is to add a pre pointer.
Questions about Joseph's ring: set N people numbered 1, 2, 3,... n to sit in a circle. The person whose sequence number is K (
Shortcuts to learning: write more code
STACK: A stack is a linear table that restricts the insert and delete operations on one end. The row number is also a linear table. That is to say, there are two storage methods: sequential stack and chained
Kernel configuration and compilation
The Linux kernel can be configured, that is, it can be configured according to the user's needs. It is precisely because the Linux kernel can be freely configured and cropped to reduce the volume of the kernel,
The makefile of the Linux kernel is divided into five parts:Makefile: the top-level makefile that reads the. config file and is responsible for creating vmlinux (kernel image) and modules (module file ).In the. config Kernel configuration file, call
The kernel is the core of an operating system. It manages system processes, memory, device drivers, files, and network systems, and determines the system performance and stability. Is a system software that provides hardware abstraction layer, disk
See Attachment
This article is very good and tells you how:
File Content, file name, ID3 tag in MP3, Vim... Methods and practices for migrating from gb2312 to UTF-8 in.
Extract some special examples:
The enca command can be used to detect the
In previous articles, we used ia32 and x86_64. There was a problem with the machines that installed IA64 on the network. The most important thing was that pxelinux did not support IA64 and replaced it with elilo, which was made by HP.
The most
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service