Http://www.turnkeylinux.org/
Http://bitnami.org/
These two websites are very similar. They are easy to install and use. In contrast, I prefer turnkeylinux and the interface is more friendly.
These two websites provide the environment and
Rdesktop is a Remote Desktop Connection software for UNIX and Linux systems. It uses Microsoft Windows NT, terminal services provided by Windows 2000, and remote desktop service of Windows XP ), you can remotely log on to and use Windows in Linux.
The file replication system can use either a push model or a pull model. The following are common commands for copying files:
Push files:
Rdist:Rdist-P/usr/bin/ssh-F distfileThe contents of the control file distfile are as
From: http://www.51testing.com /? 27242/action_viewspace_itemid_78916.html, slightly modified according to apache2 version
Note:Apache installation path:/usr/local/apache2The Linux Startup level is 5 and the version isLinuxAs4
After
Http://hi.baidu.com/hust_chen/blog/item/54a8c516231d0c0ec93d6d3e.html
Loading and parsing of Dynamic Link Libraries in linux (ZZ)
On the surface, loading and parsing dynamic link library (dll) is a very complex process, and the data
Linux simple character driver is very simple. You only need to map the physical address during initialization, register a fileopenration operation set, and then implement the operation set just like writing a bare metal program.Question 1: Why do I
1. Software for viewing binary files in Linux:
Xxd
Hexdump
Ii. Edit:
1. biew
2. hexedit
3. vim
Vim to edit binary files. Vim is not designed for this purpose, so it has several limitations. But you can readTake a file, change a character, and save
Swap, that is, in the Swap zone, how many people care about it except when installing Linux? In fact, Swap adjustment is crucial to the performance of Linux servers, especially Web servers. By adjusting Swap, the system performance bottleneck is
versions: 2002-Oct-25,2002-Nov-01,04,07,08,10,11,12,172003-Jun-13Randy Dunlap ======================================================================Copyright (c) 2002-2003 Randy Dunlap.This document may be distributed only subject to the terms
Step 1: Download the Linux kernel source code (URL: http://www.kernel.org /)
Step 2: deploy the kernel source code to the relevant directory of the Linux system.
Start Linux, open the terminal interface, and change the permission to root user. Enter
If it is #, It is root. If it is $, view the current user who
Change passwd Password
View the current directory pwd
View kernel version uname-r
View the Command help such as man shutdown,/xxx to find xxx ,? Xxx: Search for xxx, and q is
The Ln command is used to create links between files. By default, it is used to create hard links (hard links cannot be created for directories) and use option-s to create symbolic links. Before talking about ln, let's take a look at the links in
This time, we will try to figure out a sine curve in the system monitor in Linux. My environment is Ubuntu 11.04.
The basic idea is the same as that in Windows. You can migrate functions by changing the system call.
# Include # include # include
We know that on 32-bit machines, the address space of processes in the Linux operating system is 4 GB, 0-3G is the user space, and 3g-4G is the kernel space. In fact, this 4G address space does not exist, that is, the virtual memory space we call it.
1. Process special file names
Suppose there is a file name named "-ee" in Linux. If we want to operate on it, for example, to delete it, follow the general deletion method in the commandEnter the RM-ee command in the line, and the interface will
After setting the linux server for one afternoon, tomcat was crashed. I checked the cause on the Internet and found that the process was occupied, so I began to kill the tomcat process.
First, you must know how to view the process :)The two
In Linux, some common shutdown/restart Commands include shutdown, halt, reboot, and init,
Both of them can achieve the purpose of restarting the system, but the internal working process of each command is different.
In this article, we hope you can
This paper analyzes the advantages of the YAFFS/YAFFS2 File System in the embedded environment, and proposes that YAFFS2 not only supports small-capacity NAND flash, but also has advantages for large-capacity NAND flash. The file system structure of
1. kill
Purpose: kill a process based on the process number.
Usage: kill [signal code] process ID
Example:
[Root @ localhost ~] # Ps auxf | grep httpd
Note: kill-9 to force termination and exit
Example [root @ localhost ~] # Ps aux | grep gaim
Or
The first (sftp Secure File Transfer) is an ftp-like client program that can be used to transmit files over the network.
It does not use the FTP daemon (ftpd or wu-ftpd) for connection, but makes sense to enhance system security.
In fact, by
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service