has been used to set the date, this reference online data, and finally the whole.
The Linux clock is divided into system clocks (systems Clock) and hardware (real time Clock, short RTC) clocks. The system clock is the clock in the current Linux
The SSH full name Secure Shell, as its name implies, is the meaning of a very secure shell, an agreement developed by the network Working Group of the IETF (Internet Engineering Task Force). SSH's main purpose is to replace the traditional Telnet
1. Dynamic Library path settings Linux down with dynamic libraries and windows are not the same. Linux executables rely on the configuration file to read the path, so sometimes you need to set the path to the following export ld_library_path=/home/..
LOCKDEP is the kernel detection deadlock means, the default is not turned on, need make menuconfig add configuration open, under the hacking kernel option y Select the following configuration
1. [*] Detect Hard and Soft lockups
2. [*] Detect Hung
Description: As a personal understanding, KVM is a kernel virtualization technology, and the kernel is not used on the interface, then QEMU provides a user-level interface to assist each other. Of course, using QEMU alone can also be a complete set
In daily use, a server is adequate for a lot of work, but when a lot of people visit at the same time will appear slightly weak, this time. There are two ways to solve this, the first is to constantly improve the performance of this server, but
Feature Description: Displays the space and restrictions that the disk has used.Syntax: Quota [-quvv][user name ...] or quota [-gqvv][group name ...]Note: Execute the quota instruction to query disk space limits and know how much space has been used.
For Linux OPS workers, using SSH remote remote server is no longer familiar! Some of the strict settings for SSH also related to server security maintenance, today, I work in the use of SSH experience, do some summary records to the next. (1) After
Reprint to: http://beikeit.com/post-495.html simple translation: This Linux official information mainly describes the external fragments (external fragmentation), internal fragments (internal Fragmentation) concept and the related situation, it
linux-2.6.35-based Class_create (), device_create parsing Miao Teacher, huaqing Vision Embedded College lecturer. After a version of Linux kernel 2.6, DEVFS no longer exists, and Udev becomes an alternative to DEVFS. As a reminder, Udev is the
Example: compressing the contents of the current directory on the server as a xxx.zip fileZip-r xxx.zip./*Unzip the zip file to the current directoryUnzip Filename.zip============================Another: Some servers do not install the ZIP package
I feel that android is a hot topic and I want to learn it myself. But its kernel is still based on Linux, so I have no choice but to learn everything from the beginning to the old rules. Everything should be switched from scratch, from the
Linux cp/scp command + scp command details, cpscp + scp command details
Name: cp
Permission: All Users
Usage:
Cp [options] source dest
Cp [options] source... directory
Note: copy one file to another or copy several files to another directory.
Count
-
Install freeradius + radius manager3.9 and lnmpfreeradius in LNMP Environment
1. Install the web environment and use the LNMP one-key installation packageFor detailed installation steps, referHttps://lnmp.org/install.html
2. install components
Memory Allocation in linux: mmap, munmp, brk, mmapbrk
Linux virtual memory management has several key concepts:
1. Each process has an independent virtual address space. The virtual address accessed by the process is not a real physical address;
2.
Centos 7 mounts a raid 10 hard drive to the Dell R730 Server
The company purchased a new Dell R730 server with two SAS hard disks and four SATA hard disks respectively. SAS hard disks constitute RAID 1 and SATA constitute raid 10. Install Centos 7
Install Google Drive Linux client Grive2 0.5.1 on Ubuntu 16.04
Grive2, an unofficial Google Drive client, is a simple Linux client application. You only need to download all the files in your Google Drive to the current directory. After you modify
OpenSSL symmetric encryption algorithm commands
1. symmetric encryption algorithm Overview
The openssl Encryption Algorithm Library provides a wide range of symmetric encryption algorithms. We can use the symmetric encryption algorithm commands
Install and configure CentOS 6.4 AMD graphics card driver in Lenovo Y470
I said goodbye to the familiar Windows 7 and switched to CentOS for Linux, with various questions left speechless. When I write it here, I decided to change the input method.
Create a DOS file system on a low-level formatted disk. If the USE_2M parameter is opened during mtools programming, some parameters related to the 2 M format will function. Otherwise, these parameters (such as S, 2, 1, and M) will not
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.