Assume that there is a project folder in the current directory, which contains several files.
. TarCompression:Tar CVF project.tar Project/Decompress:Tar xvf project.tarView:Tar tvf project.tarNote: It is only packaged and not compressed. It is
When using VMWare virtual Linux in windows, data and files are often transmitted between the virtual machine and the host, therefore, it is convenient to use tools such as SSH Secure Shell client to remotely control Linux virtual machines and
// The structure of the character device, struct xxx_dev_t {struct cdev ;...........} xxx_dev; // The static int _ init xxx_init (void ){....... /* initialize cdev */cdev_init (& xxx_dev.cdev, & xxx_fops); xxx_dev.owner = this_module;/* obtain the
First, consider whether the root $ path contains these environment variables.
The main four are:/bin,/usr/bin,/sbin,/usr/sbin.
Four major storage items:
./Bin:
The short description of "bin" as "binary" mainly places some necessary execution
Download and decompress the package from the official website;
Use the CD command to switch to the boost_000049_0 directory;
Set Bootstrap. Sh permissions:
(Gksu) chmod A + rwx./Bootstrap. Sh
Run to generate bjam
./Bootstrap. Sh -- With-toolset
Ls *. Jad | xargs-N 1-I-t MV {}{}. Java
A and suffix
1. problem: a directory contains a large number of files named by date, some of which have suffixes and some end with dots, such as 20020101., 20020102 .,......, 20020101. TD, 20020102.td.pdf ....
It is difficult to enter the system by entering the user name and password when performing livecd. Therefore, we plan to skip these two steps.
1. Password verification omitted
Simply change root: X: 0: 0: Root:/root:/bin/bash in/etc/passwd to
Ace adaptive communication environment (Adaptive Communication Environment) is a free-to-use, open-source object-oriented (OO) framework, which implements many core modes for concurrent communication software. ACE provides a rich set of reusable
Http://cnfn.org/ubuntu-perfect-pdf-reader-add-bookmarks-comments-foxit-reader.htmlPDFMOD
Cnfnwork hard every day! Perfect pdf reader in Linux (Bookmarks can be added)-Foxit Reader Author: cnfn Date:
June 25, 2011 Comments (2) view comments
I have
Emebedded System and Application (Linux)
Goal--Master the embedded system development process, the system porting method, and write bootloader
(Be familiar withProcess of ES developing,System migrationAMDBootloader Programming)
Requriement--C, C
Measure network traffic of the network card. Linux has two gadgets: nload and iftop.
After downloading the source file, configue & make install
I personally prefer iftop, which dynamically uses a simple ASC diagram to identify the current traffic
Chapter 3 Linux File System tailoring
3.1linux File System tailoring Platform(1) Add a virtual hard disk (1.5 GB, SCSI interface) based on the kernel tailoring platform ). (2) install a redhat9.0 server version + Perl language environment on this
After exiting SSH in Linux, the command being executed will be interrupted. Even if the task is executed in the background, the output information will not be displayed the next time you enter ssh.
Screen simulates multiple windows. When you exit
This is the Ubuntu method:First, remove the root lock and set the password for the root user.Open the terminal and enter sudo passwd.Password: Enter new Unix Password: Retype new Unix Password: Passwd: the password is successfully updated.2. Change
In Linux, IPCS-A is used to query the IPC object information of the current system.
[crazybaby@localhost ~]$ ipcs -a------ Shared Memory Segments --------key shmid owner perms bytes nattch status 0x00000000 65536
Because processes have their own private address space and can only be accessed by themselves, this means that other processes cannot access the address space of the process, the following describes how processes communicate in plain words and
The program is used for analysis. The theory is not mentioned. There are a lot of online data:
#include void test(void){ printf("%s\n","Hello");}int main(int argc, char *argv[]){ test(); return 0;}
Next let's take a look at the address transfer
Development Environment:WINXP (host) + visualbox + fedora9 (Virtual Machine 2.6.25.4 kernel)Function:The globalmem character device framework analysis (supports two devices) allows for dynamic creation of device files and supports blocking and
Linux and xp lan sharing with SMB
TextSyste_usernameIt is created to allow others to access your account from the network. Please note the modification.
Sudo apt-Get installSamba
Sudo apt-Get installSmbfs
Set access accountAdd a system
System: ubuntu10.10
1. First, create an arm-Linux-GCC cross-compilation environment:
Download arm-Linux-Gcc-3.4.1.tar.bz2
Copy and decompress
# Cd/Copy arm-Linux-Gcc-3.4.1.tar.bz2 to the root directory# Tar jxvf arm-Linux-Gcc-3.4.1.tar.bz2
This will
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service