Yum in Linux

Yum (originally called yellowdog Updater modified ). he is an online installation software with a list of many software. Previously, the software was installed with many commands such as RPM and tgz on the terminal, but now it's really much more

Linux email operations

In Linux, enter mail to enter the inbox. DDelete the current email, pointer, and move down. D 3Delete the email number 3. D 1-100Delete emails ranging from 1st to 100. When exiting, you must use the Q command to save the previous operations.

Set Process Scheduling Policies for Linux applications

In the user space, call the sched_setscheduler () function. The function prototype is as follows: Int sched_setscheduler (pid_t PID, int policy, const struct sched_param * PARAM ); Parameter description: PID: The PID of the

Some Linux commands

Rpm-QL mplayer | cat-N View package informationIn addition[Root @ centos5h ~] # WC -- HelpUsage: WC [Option]... [file]...Print newline, word, and byte counts for each file, and a total line ifMore than one file is specified. With no file, or when

Add the following Linux Command to view system information:

# Uname-A # view kernel/operating system/CPU Information# Head-N 1/etc/issue # view the operating system version# Hostname # view the computer name# Lspci-TV # list all PCI devices# Lsusb-TV # list all USB devices# Lsmod # list loaded Kernel Modules#

Linux Kernel Memory Allocation Function

Memory Management in the Linux kernel is not as simple as outside the kernel. The biggest difference from user space is that the kernel's internal slave space is not as easy as the user space, and it is not always easy to get the desired

Linux IPC shared memory

Introduction Shared Memory (shared memory) is one of the simplest methods for inter-process communication in Linux. With shared memory, different processes can read and write the same piece of memory. Because all processes Access shared memory in

Tutorial: Use the firesheep plug-in Linux

1. firesheep Introduction Firesheep is a Firefox 3. X plug-in for HTTP session hijacking. firesheep uses pcap to capture packets in the wireless network for analysis, and then extracts the cookie to complete session hijacking. eric butler, a

Common Linux commands (1)

gtk

Some Common commands used in Linux work have been recorded. I put it in Notepad. Now let's share it with you. This is the first part. 1. Scheduled command execution and monitoring results The principle of watch is to execute the subsequent commands

7) getting started with Linux programming-thread operations

7) getting started with Linux programming-thread operations Thread creation in LinuxThis article describes how to create and use threads in Linux. threads in Linux are a very complicated problem.It is good for me to learn about threads from time to

Recommended applications in Linux

* Media playback:1) DivX video: mplayer2) Rm video: realplayer10 for Linux, mplayer3) MP3: amarok, beep Media Player, mplayer4) ape: xmms + monkey's audio plugin5) other formats (WMA, WMV, MKV, QuickTime): mplayer * Documents and files in various

2) getting started with Linux programming-process Introduction

2) getting started with Linux programming-process IntroductionProcess Creation in LinuxPreface:This article introduces various process-related concepts in Linux. We will learn:Process ConceptProcess IdentityProcess CreationCreation of daemon---------

5) Introduction to Linux programming-Signal Processing

5) Introduction to Linux programming-Signal ProcessingLinux signal eventsIn this chapter, we will discuss the signal processing functions in Linux.Signal processing functions in Linux:Signal GenerationSignal ProcessingOther Signal FunctionsOne

Bitorrent, a Bt tool in Linux

In Linux, there are very few BT tools and the performance is not very high. Azureus is graphical interface, but it occupies a lot of memory and cup, it is easy to dang machines, and its BT tools are all life-saving. Linuxfans cause a lot of

Linux disk management

 Add new Hard Disk After Linux kernel 2.6, the system will identify the newly added hardware devices and create corresponding device files under/dev. For example: SDA represents 1st SCSI hard disks. Hda indicates 1st IDE Hard Disks (connected to

How to view CPU and memory information in Aix and Linux

AIXAndLinuxHow to viewCPUAnd memory information AIXOperating System The hardware information of Aix can be seen through the prtconf command. 1. view the number of logical CPUs # Pmcycles-m CPU 0 runs at 4204 MHz CPU 1 runs at 4204 MHz CPU 2 runs at 4

Linux Command-top

Linux Command-top Top commands are often used to monitor Linux system conditions, such as CPU and memory usage. Programmers generally know this command, but it is strange that few people can use it well, for example, the memory value in the top

Install Tomcat in Linux

Different from installing JDK, besides setting the corresponding environment variables under/etc/profile after installing Tomcat, you must also develop the specified port for Tomcat listening in the firewall settings. First download Tomcat:

Set password-free login for Linux SSH

I have two virtual machines with centos installed on my laptop. One IP address is 172.16.1.10 (slave) and the other IP address is 172.16.1.9 (master ). Use the root user VI/etc/hosts on slave to add the 172.16.1.9 master. 1. Run ssh-keygen-t rsa

Network Traffic test program in Linux (libpcap package is used)

It's messy to paste it here. I should just put it in VI. I tested it myself, but I still went through it. I remember the app-lpcap during compilation. # Include # include # include # include # include # include # include # include # include

Total Pages: 5467 1 .... 3592 3593 3594 3595 3596 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.