One. InstallationTwo. Modify the configurationIt is better to back up first, after all, the comparative violence of this service area configurationOriginal Configuration file contentsConfigure the comparison simple rude, do not set any user,
1. What is the symbolic representation of the absolute path? What is the current directory and top level directory used for? What does the home directory say? What are the commands for switching directories?Absolute path such as:/ETC/INIT.DCurrent
2018-9.9Lesson ThreeAfter the opening ceremony and the installation of the software completed, we formally entered the study!Usually also installs some software, but is not a fool installs, oneself always is afraid, afraid accidentally is wrong,
1. Download jdk:https://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html2. Place the downloaded jdk-8u101-linux-x64.tar.gz in the/usr/lib directory3. Setting environment variables: # Vi/etc/profile4, profile Add the
First, the preparatory work1.1, (both the server and the client need to set) the system is using CentOS6.8 to disable the firewall: View status: # Service Iptables status stop: # systemctl stop iptables Boot not on: # chkconfig Iptables off view:
First, the configuration of Yum source management and software management. Yum Common Tools tree Telnet SL Cowsay1.Yum Install tree #安装tree命令, display#由于每次安装都由是否确认的提示, cancel the default installation by adding-y after the command. As followsYum
The process address space of the Linux kernel
The function in the kernel obtains dynamic memory in a fairly straightforward manner:
__get_free_pages or Alloc_pages get the page box from the partition page box allocator;
Several ways to view disk mounts under LinuxFirst method: DF command#DF-htfilesystem Type Size used Avail use%mounted ONDEVTMPFS Devtmpfs3.9G0 3.9G0% /Devtmpfs Tmpfs3.9G4.0K3.9G1%/dev/Shmtmpfs Tmpfs3.9G1.2M 3.9G1% /Runtmpfs Tmpfs3.9G0
Installing the Workerman is really simple, as long as a simple Linux password can be done,Here I show you how to install Workerman to enter the terminal process will not have to demonstrate it ...Enter root and password to enter the terminal after
1. Find a line of content in the service. xml file containing the connector contentGrep-N connector./server. xml
2. query the rows matching the specified string from the file content and print the query results.$ Grep "searched string" File Name 3.
The GCC compilation process is divided into four steps:(1) pre-compilation (pre-processing)(2) Compile (Compiling)(3) Assembly)(4) Link (linking)Taking hello. C as an example:# Include Int main (void){Printf ("Hello world! ");Return 0;}
(1)
Function Description: create or modify a file to be kept, or extract files from the file to be kept.
Syntax: Ar [-dmpqrtx] [cfossuvv] [A ] [B ] [I ] [keep files] [member files]
Note: Ar allows you to collect many files and make them a single file.
First, install
Sudo apt-Get install sysv-RC-Conf
Then on the terminal sudo sysv-RC-Conf
In this software, you can use the keyboard's arrow keys to move and use spaces to select them. You can also use the mouse to select them, and then use
There are two main methods:
One is to use GDB, and the other is to use valgrind.
1. Set the environment with ulimit-C Unlimited2. Run againProgram, Wait for segment fault, and the core file should be generated3. GDB core *
The output of
Netcat (NC) is known as the Swiss army knife in the network security field. I believe many people know it. It is a simple but practical tool that reads and writes data through a TCP or UDP network connection. It is designed as a stable backdoor tool
I wrote a service program: Main. C.# Include # Include # Include # Include # Include
// Indicates whether to stop the service program.Int nstop = 1;
Void sig_term (INT ansigno){Nstop = 0;Printf ("sig_term func/N ");}
Int main (){// Implement the
[Uname System Call]
Function Description:Obtain the current kernel name and other information.Usage:# Include Extern int uname (struct utsname * _ name) _ Throw;
Parameters:_ Name: indicates the buffer zone for storing system information. The
In the past, when we were reading "Advanced Programming in UNIX environments", we had a special whole chapter detailing how to compile a background daemon program (genie Program), mainly involving creating session groups, switch to the working
After the power supply is switched on, the x86 series CPU starts to enter the real-time mode. And start the automatic program from the address 0xffffff0, and this address is the address in the ROM-BIOS. That is to say, after the host is turned on,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service