1.Data truncation:
BecauseLongCalculation of type variables (Value assignment, comparison, shift, etc.LongDefined inX86For32 bits,InIA64For64bits.It is easyIntType Variable operation exception.
Solution: avoid calculation between different types
These two commands are mainly related to disk partitions.
I. partitioning, mounting, and verification1. mkfs. ext3-B 1024-I 1024/dev/ram5 // format with a memory virtual hard disk. The inode number is defined to be consistent with the block size
How to lock files
There are three different file locks, all of which are "consulting", that is, they rely onProgramBetweenCooperation, so the consistency of all program blocking policies in a project is very important when your program needsBe
When Tomcat is started in Linux, A java.net. unknownhostexception exception is reported. It is known that this is caused by a struts DTD verification problem. If someone encounters such a problem, refer to the following solution :)
When Tomcat is
2. System Call and parameter transfer processSpeaker: Xiao Bai's speech time: 08:36:45
1. How the system calls the function interface to convert it into a command
A system call enters the core State through a command, and then finds the
3. scheduler job time: office "/>
There are two ways to start the Scheduler:
A. Proactive
Directly call schedule () in the core application (). This usually happens when the process needs to be put in the suspended (sleep) State for waiting for the
4. Virtual Machine VMware and network configuration (package you play with virtual machine)
I have seen many people post posts asking me how to play with virtual machines. In fact, I do not recommend using virtual machines.
Summarized the compression and decompression methods of various formats of compressed packages in Linux.
. TarUnpack: Tar xvf filename.tarPackage: Tar CVF filename.tar dirname(Note: tar is packed, not compressed !)------------------------------------
08 01 ** 0, 3, 5/home/Jiang/backup/autobackup. Sh The autobackup. Sh program is as follows: #! /Bin/bash############## System backup to FTP ################# Power by Jiang daoyou# E-mail: jiang_daoyouCml.com.cn#1. mkdir/home/Jiang/backup#2. chmod
As we all know, Linux has more advantages than Windows in terms of security. However, no matter which Linux release version you choose, you should make necessary configurations after installation to enhance its security. The following describes how
Tip: Change the token from tinyproxy and pay tribute to the original author!
At the beginning of a program, you can define the following constants:
# Define maxservices128/* Maximum number of service calls for each process to prevent installation
Lsof Quick Start
View the usage of a file
Check which processes call a file:
$ Lsof/etc/passwd
View the usage of the file system
The/tmp directory is full of junk files, but the LS cannot see too many files. Who did it?
$ Lsof/tmp
Search for
I have read a good article about tcpdump IN Cu. The original author is jeffyan. I have reprinted the article and shared it with you.
The command format is as follows:
Tcpdump [-adeflnnopqstvx] [-C quantity] [-F file name]
[-I network interface] [-r
SuSE Linux operating system security reinforcement (Service shutdown)
After installing the SuSE Linux operating system, you need to perform a security scan to disable unused ports to enhance the security of the operating system.1. the system starts
Author: Liu Zhiyong Guo conghui
Logs are also a part of user attention. Do not underestimate the importance of log files for network security, because log files can detail various events that occur on a daily basis in the system. You can use log
Linux raid1 environment setup and usage instructions
Why should I build the linuxraid1 environment?
Linux raid1 is the most common Hard Disk redundancy backup solution for Linux servers. It can ensure the security of hard disk data when the hard
I. Tools used
1. x_scan3.3 is a hacker tool developed by China's famous hacker glacier (formerly known as Huang Xin). It has features such as vulnerability scanning, weak password cracking, and port scanning, although it is also a relatively old
1. edit/etc/TPD/custom. conf and make the following changes in the corresponding area:
[XDMCP]
# Suseconfig: displaymanager:
Displaymanager_remote_access
Port = 177
Enable = true
[Chooser]
[Security]
# Suseconfig: displaymanager:
It is absolutely impossible to describe inter-process communication in detail here, and it is difficult for the author to confidently say what kind of knowledge he has achieved on this part of content, therefore, at the beginning of this section, we
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service