Yum (originally called yellowdog Updater modified ). he is an online installation software with a list of many software. Previously, the software was installed with many commands such as RPM and tgz on the terminal, but now it's really much more
In Linux, enter mail to enter the inbox.
DDelete the current email, pointer, and move down.
D 3Delete the email number 3.
D 1-100Delete emails ranging from 1st to 100.
When exiting, you must use the Q command to save the previous operations.
In the user space, call the sched_setscheduler () function. The function prototype is as follows:
Int sched_setscheduler (pid_t PID, int policy, const struct sched_param * PARAM );
Parameter description:
PID: The PID of the
Rpm-QL mplayer | cat-N View package informationIn addition[Root @ centos5h ~] # WC -- HelpUsage: WC [Option]... [file]...Print newline, word, and byte counts for each file, and a total line ifMore than one file is specified. With no file, or when
# Uname-A # view kernel/operating system/CPU Information# Head-N 1/etc/issue # view the operating system version# Hostname # view the computer name# Lspci-TV # list all PCI devices# Lsusb-TV # list all USB devices# Lsmod # list loaded Kernel Modules#
Memory Management in the Linux kernel is not as simple as outside the kernel. The biggest difference from user space is that the kernel's internal slave space is not as easy as the user space, and it is not always easy to get the desired
Introduction
Shared Memory (shared memory) is one of the simplest methods for inter-process communication in Linux. With shared memory, different processes can read and write the same piece of memory. Because all processes Access shared memory in
1. firesheep Introduction
Firesheep is a Firefox 3. X plug-in for HTTP session hijacking. firesheep uses pcap to capture packets in the wireless network for analysis, and then extracts the cookie to complete session hijacking. eric butler, a
Some Common commands used in Linux work have been recorded.
I put it in Notepad. Now let's share it with you. This is the first part.
1. Scheduled command execution and monitoring results
The principle of watch is to execute the subsequent commands
7) getting started with Linux programming-thread operations
Thread creation in LinuxThis article describes how to create and use threads in Linux. threads in Linux are a very complicated problem.It is good for me to learn about threads from time to
2) getting started with Linux programming-process IntroductionProcess Creation in LinuxPreface:This article introduces various process-related concepts in Linux. We will learn:Process ConceptProcess IdentityProcess CreationCreation of daemon---------
5) Introduction to Linux programming-Signal ProcessingLinux signal eventsIn this chapter, we will discuss the signal processing functions in Linux.Signal processing functions in Linux:Signal GenerationSignal ProcessingOther Signal FunctionsOne
In Linux, there are very few BT tools and the performance is not very high. Azureus is graphical interface, but it occupies a lot of memory and cup, it is easy to dang machines, and its BT tools are all life-saving.
Linuxfans cause a lot of
Add new Hard Disk
After Linux kernel 2.6, the system will identify the newly added hardware devices and create corresponding device files under/dev. For example:
SDA represents 1st SCSI hard disks.
Hda indicates 1st IDE Hard Disks (connected to
AIXAndLinuxHow to viewCPUAnd memory information
AIXOperating System
The hardware information of Aix can be seen through the prtconf command.
1. view the number of logical CPUs
# Pmcycles-m
CPU 0 runs at 4204 MHz
CPU 1 runs at 4204 MHz
CPU 2 runs at 4
Linux Command-top
Top commands are often used to monitor Linux system conditions, such as CPU and memory usage. Programmers generally know this command, but it is strange that few people can use it well, for example, the memory value in the top
Different from installing JDK, besides setting the corresponding environment variables under/etc/profile after installing Tomcat, you must also develop the specified port for Tomcat listening in the firewall settings.
First download Tomcat:
I have two virtual machines with centos installed on my laptop. One IP address is 172.16.1.10 (slave) and the other IP address is 172.16.1.9 (master ).
Use the root user VI/etc/hosts on slave to add the 172.16.1.9 master.
1. Run ssh-keygen-t rsa
It's messy to paste it here. I should just put it in VI. I tested it myself, but I still went through it. I remember the app-lpcap during compilation.
# Include # include # include # include # include # include # include # include # include
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service