Linux 32-bit to 64-bit migration FAQs

1.Data truncation: BecauseLongCalculation of type variables (Value assignment, comparison, shift, etc.LongDefined inX86For32 bits,InIA64For64bits.It is easyIntType Variable operation exception. Solution: avoid calculation between different types

Mkfs and tune2fs commands in Linux

These two commands are mainly related to disk partitions. I. partitioning, mounting, and verification1. mkfs. ext3-B 1024-I 1024/dev/ram5 // format with a memory virtual hard disk. The inode number is defined to be consistent with the block size

File lock in Linux

How to lock files There are three different file locks, all of which are "consulting", that is, they rely onProgramBetweenCooperation, so the consistency of all program blocking policies in a project is very important when your program needsBe

A solution for error reporting when Tomcat is started in Linux

When Tomcat is started in Linux, A java.net. unknownhostexception exception is reported. It is known that this is caused by a struts DTD verification problem. If someone encounters such a problem, refer to the following solution :) When Tomcat is

Linux-permission management

Linux-permission management Permission management: Chmod (Change File Permission), chown (change file owner), passwd (Set User Password), SU (User Switch), useradd (add user), groupadd (Add User Group) Given system permissions involves system

Linux Kernel Study Notes (3)

  2. System Call and parameter transfer processSpeaker: Xiao Bai's speech time: 08:36:45 1. How the system calls the function interface to convert it into a command A system call enters the core State through a command, and then finds the

Linux Kernel Study Notes (4)

3. scheduler job time: office "/> There are two ways to start the Scheduler: A. Proactive Directly call schedule () in the core application (). This usually happens when the process needs to be put in the suspended (sleep) State for waiting for the

Linux Kernel Study Notes (5)

  4. Virtual Machine VMware and network configuration (package you play with virtual machine)  I have seen many people post posts asking me how to play with virtual machines. In fact, I do not recommend using virtual machines.

Common Linux compression methods

Summarized the compression and decompression methods of various formats of compressed packages in Linux. . TarUnpack: Tar xvf filename.tarPackage: Tar CVF filename.tar dirname(Note: tar is packed, not compressed !)------------------------------------

Automatic database backup in Linux

08 01 ** 0, 3, 5/home/Jiang/backup/autobackup. Sh The autobackup. Sh program is as follows:   #! /Bin/bash############## System backup to FTP ################# Power by Jiang daoyou# E-mail: jiang_daoyouCml.com.cn#1. mkdir/home/Jiang/backup#2. chmod

Linux Server Security (1)

As we all know, Linux has more advantages than Windows in terms of security. However, no matter which Linux release version you choose, you should make necessary configurations after installation to enhance its security. The following describes how

Multi-process service framework in Linux

Tip: Change the token from tinyproxy and pay tribute to the original author! At the beginning of a program, you can define the following constants: # Define maxservices128/* Maximum number of service calls for each process to prevent installation

Linux tool (I): lsof Quick Start

Lsof Quick Start     View the usage of a file Check which processes call a file: $ Lsof/etc/passwd  View the usage of the file system The/tmp directory is full of junk files, but the LS cannot see too many files. Who did it? $ Lsof/tmp Search for

Linux advanced tool command (2) usage of tcpdump

I have read a good article about tcpdump IN Cu. The original author is jeffyan. I have reprinted the article and shared it with you. The command format is as follows: Tcpdump [-adeflnnopqstvx] [-C quantity] [-F file name] [-I network interface] [-r

SuSE Linux operating system security reinforcement

SuSE Linux operating system security reinforcement (Service shutdown) After installing the SuSE Linux operating system, you need to perform a security scan to disable unused ports to enhance the security of the operating system.1. the system starts

Practical topics of Linux Log Analysis

Author: Liu Zhiyong Guo conghui Logs are also a part of user attention. Do not underestimate the importance of log files for network security, because log files can detail various events that occur on a daily basis in the system. You can use log

Linux raid1 build tutorial

Linux raid1 environment setup and usage instructions Why should I build the linuxraid1 environment? Linux raid1 is the most common Hard Disk redundancy backup solution for Linux servers. It can ensure the security of hard disk data when the hard

Remote Linux operating system password cracking

I. Tools used 1. x_scan3.3 is a hacker tool developed by China's famous hacker glacier (formerly known as Huang Xin). It has features such as vulnerability scanning, weak password cracking, and port scanning, although it is also a relatively old

Used xmanager to log on to Linux SuSE 11.2

1. edit/etc/TPD/custom. conf and make the following changes in the corresponding area: [XDMCP] # Suseconfig: displaymanager: Displaymanager_remote_access Port = 177 Enable = true [Chooser] [Security] # Suseconfig: displaymanager:

Inter-process communication in Linux

It is absolutely impossible to describe inter-process communication in detail here, and it is difficult for the author to confidently say what kind of knowledge he has achieved on this part of content, therefore, at the beginning of this section, we

Total Pages: 5467 1 .... 3571 3572 3573 3574 3575 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.