The following are some tips on Linux. Although they are not very commonly used, they are still quite useful: I keep forgetting that every time I use them, I need to read the manual and Google. Good memory is not as bad as writing, now recorded for
Related commands: &, BG, FG, jobs, screen
* ***************** From freelamp.com *****************Suppose you findProgramIt takes a long time, but you need to do other things, you can use ctrl-Z to terminate the program, and then you can see the
Document directory
Part One
Part Two (expecting ...)
By Reji Thomas and bhasker Reddy 2006-08-08Part One
This article discusses the shared libraries concept in both Windows and Linux, and offers a walk-through varous data structures to explain
How does one manage shared libraries (*. So) during Linux running? In Linux, the search and loading of shared libraries are implemented by/lib/lD. So. LD. So searches for the shared libraries used by applications in the standard channels
The/proc file system is one of the excellent features of Linux. This article describes some of its most practical basics in detail. With/proc, you no longer need to shut down and reboot the machine to manage many details about the operating system,
This article analyzes the CPU usage based on linux2.4.19 source and PXA 270.
When the ARM Linux kernel is started, the kernel interruption exception vector table is initialized through the call relationship between start_kernel ()-> trap_init.
/*
With the wide application of Linux operating systems, especially the development of Linux in the embedded field, more and more people are devoted to Linux kernel-level development. Faced with the ever-growing Linux kernel source code, developers
Environment: RedHat Linux9.0. Webmin version 1.38. Webmin is an excellent Linux system management software with B/S structure. It uses its graphical user interface to conveniently and efficiently manage most Linux services, applications, networks,
This test used RedHat Enterprise 5.3.
Network link environment:
PC1 (Virtual Server ):Double Nic, eth0 IP1 = 192.168.0.254, eth1 ip2 = 10.0.0.254Eth0 acts as outside address, the virtual IP address.Eth1 acts as inside address, makes a LAN with pC1
Grep command:Grep-I pattern files: searches case-insensitive. Case Sensitive by default,Grep-l pattern files: only names of matched files are listed,Grep-l pattern files: Lists unmatched file names,Grep-W pattern files: match only the entire word,
LINUX multi-thread function analysisLINUX multi-threaded functions use the following threePthread_create (), pthread_exit (), pthread_join (); they are all in the header file. Static library-lpthread must be added during compilation
The following
Company intranet server hard disk space is insufficient, will buy a new GB hard disk mounted and set to Samba shared directory, Samba please refer to this article http://blog.csdn.net/linglongwunv/archive/2010/01/19/5212875.aspxNext, we will
One obvious advantage of using shared memory communication is high efficiency, because the process can directly read and write the memory without any data copying.For communication methods such as photo channels and message queues, You need to copy
The top five lines are the overall statistics of the system.
The first line is the task queue information, which is the same as the execution result of the uptime command. The content is as follows:
Top-15:09:51 up 17 days, 4 Users, load average: 1.0
I. Introduction
In modern operating systems, Multiple kernel execution streams may be executed at the same time, therefore, like multi-process and multi-thread programming, the kernel also needs some Synchronous Machine mechanisms to synchronize
6. Large kernel lock (BKL -- big kernel lock)
A large kernel lock is essentially a spin lock, but it is different from a spin lock. A spin lock cannot be obtained recursively because it causes a deadlock.However, large kernel locks can recursively
1. Memory Data Representation:Recommended article: Linux Process Management
In teaching materials or reading, we often need to intuitively use diagrams to show the distribution of data in the memory. How is the data stored in the memory?
Comparison between common Linux and DOS Commands
Functions Linux MS-DOS
Copy the CP copy file
Move a file mv
List Files ls dir
Clear screen clear CLS
Delete the RM del File
Create the mkdir directory
View files less more
Rename a file MV
Linux Shell RZ and Sz are commonly used file transmission commands in the terminal. RZ and Sz are called through shell, here, Rz is used to upload files from the system where the terminal is enabled to the target system (the target system where the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service