New guy on the road, ask for advice!
JDK version:
Root @ Ubuntu :~ # Java-versionJava version "1.6.0 _ 20"Openjdk Runtime Environment (icedtea6 1.9.8) (6b20-1.9.8-0ubuntu1 ~ 10.04.1)Openjdk client VM (build 19.0-b09, mixed mode,
Http://blog.sina.com.cn/s/blog_4e056cff0100ghty.html
12 3 *** root tar CZF/usr/local/backups/daily/etc.tar.gz/etc>/dev/null 2> & 1
This statement will be03:12 every day() RunTar CZF/usr/local/backups/daily/etc.tar.gz/etcCommand.>/Dev/null 2> &
The extension. binfile is binary, and it is also the sourceProgramThe compiled machine language. Some software can be released as an installation package suffixed with. Bin, such as the Streaming Media Player RealONE. If you have installed RealONE
Every time I compile a project in Linux, whether it is the latest. o file or notRe-compilation, so it was a mess. After ccache was installed, this problem was solved ~~~ Very easy to use :)
Install and use ccache
1 switch to the root user to
Recommended blog posts:Linux Kernel "problem Gate"-learning issues and experience highlights
Recommended download:Methodology of essence edition of "Cultivation of Linux kernel"
To learn the kernel, you must first use it. follow a
Wine re-implements most APIs in Windows to enable the executable
Program(Exe) can be directly run on Linux, UNIX, Solaris, and other operating systems without any modification.
Its official website (www.winehq.com) has images of running Windows
Linux compression (decompression) command details
Note: This article is based on the Internet, but has been modified by the author.1. tar commandTar can create files and directories. Using tar, you can create a file (backup file) for a specific
Hydra is a brute-force cracking tool mainly for Linux. If you know that the valid user name is better, if you do not know it, it does not matter. Directly crack the root user in one step.
Let's take a look at the display of hydra-H and explain it
Randomaccessfile class in Linux
Note: The following is basically nonsense (but you don't want to delete it). Please read this page and change a page or blog to browse it. Thank you ----- fliggy flying
In the following situations:1. When reading and
Recommended blog posts:Linux Kernel "problem Gate"-learning issues and experience highlights
Recommended download:Methodology of essence edition of "Cultivation of Linux kernel"
After the kernel option is parsed, the initialization of each
Recommended blog posts:Linux Kernel "problem Gate"-learning issues and experience highlights
Recommended download:Methodology of essence edition of "Cultivation of Linux kernel"
In addition to the device model, there are three things that are
Recommended blog posts:Linux Kernel "problem Gate"-learning issues and experience highlights
Recommended download:Methodology of essence edition of "Cultivation of Linux kernel"
So far, just to the 18 th anniversary of the advent of Linux, the
Linux rsync incremental Synchronization Method
Run rpm-Qa | grep rsync to check whether rsync has been installed.
The following describes the configuration process of rsyns.1. Configure the serverFirst, edit/etc/rsyncd. conf as follows:Uid = Nobody #
Recommended blog posts:Linux Kernel "problem Gate"-learning issues and experience highlights
Recommended download:Methodology of essence edition of "Cultivation of Linux kernel"
In the morning, I had to wait in line by subway, wait in the
I am using 64-bit RedHat 5.4 and 2.6.18 system preparations (download the kernel upgrade tool and kernel source code)
1. Download The linux-3.9.6 source code. Address: http://www.linux-mips.org/pub/linux/mips/kernel/v3.x/
2. Download
For details about how to install the software package, refer to the webpage ~~ Http://www.witech.com.cn/news/Article_Show.asp? ArticleID = 48 Enable FTP under RedHat (FTP server installed)
[Root @ erpapptest init. d] #/Etc/rc. d/init.
Key words: protocol-based campus network server access control FirewallLinux itself can act as a proxy firewall by adding a socket package, and it is free of charge.. What is proxy firewall?The proxy
From: http://fanqiang.chinaunix.net/a1/b1/20010508/135910.html
Dd command
Function: Copies the specified input file to the specified output file, and supports format conversion during the copy process. You can use this command to implement the
When I used the snprintf function today, I thought of it:
Strcpy, strncpy
Strcmp, strncmp
Strcat, strncat
Sprintf, snprintf
Snprintf is the most popular one, because it will automatically add '/0' to the back. I checked it online. In the original
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service