http://blog.csdn.net/lzc3144/article/details/7643210
Use log4j, when the win system in the normal display of Chinese, but published to the Linux system when Chinese will appear garbled
Because the encoding format (encoding) is not set in the
1.
How to use: ln [option] source_file Dist_file
When-F is established, it is deleted with the file name.
-I to ask before deleting.
LN-S ABC CDE establishes the soft connection of ABC
The LN ABC CDE establishes the hard connections of ABC,
2. The
When you compile a t.c file with MIPS64EL-UNKNOWN-LINUX-GNU-GCC,
The contents of t.c are as follows:
#include
int main ()
{
return 0;
}
Mybox ~ # mips64el-unknown-linux-gnu-gcc-c T.CMybox ~ # Mips64el-unknown-linux-gnu-ld-o-M ELF64LTSMIP t T.
From:http://hi.baidu.com/jorling/blog/item/13db7bec1c38a1d32e2e21d3.html
File compression and archiving
Sometimes we need to store a set of files in a single file for backup or transfer to another directory or even another computer. Sometimes we
Linux ext2 file System Restore deleted filesRelease Date: 2002-08-08Article content:--------------------------------------------------------------------------------by deepin@nsfocus.comHttp://www.nsfocus.comFrom an emergency response, the customer
My experience:
Seeing some of the great God's instructions, I timidly entered the drivers/mmc/host/.
As the use of s3c2440, look at the driver, I will first find s3c words, so I noticed sdhci-s3c.c and S3CMCI.C.
Took a look at Kconfig
Config
Transferred from the "Technology Achievement Dream" blog, http://ixdba.blog.51cto.com/2895551/715742
In the previous article, I gave a brief introduction to several aspects of Linux performance and how to solve them, but how do I find out from the
Chapter One: Introduction to the Kernel
The scope of the processor's activity at any given point in time:
A, run in the kernel space, in the process context, on behalf of a specific process execution;
b, running in kernel space, in the interrupt
OverviewThere are 2 types of devices in Linux: Character devices (no buffering and only sequential access), block devices (with buffering and random access). Each character device and block device must have a primary, secondary device number, and
This article refers to the camera (WEBCAM), especially the USB camera.
Under Windows, the camera driver is developed and provided by the manufacturer. But under Linux, with limited business interests, few vendors are willing to provide
OverviewThe architecture of the entire ASOC is described in the Asoc section, where machine is a key component of the ASOC architecture, with no machine components, and separate codec and platform are not working. So this section starts with the
I believe that all of you have written "Hello World" code in your initial study of C + +. After learning to C + + to enter the Linux system of learning we do not have to start with the "Hello World" entry-level program, after all, has a few years of
Reproduced from: http://blog.csdn.net/orange_os/article/details/7485069
Directory:
1. Linux system call principle
2. Implementation of System call
3. Linux system call Classification and list
4. System call, User programming Interface (API), System
Original address: https://www.cnblogs.com/wuxiang/p/6019509.html
1. When to use the nano. The general network is very card, ssh when a vim/vi on the dead window, or the condition of the crash 2. How to use. Open or create a new file #nano file
The Dos2unix command is used to convert a DOS-formatted text file into Unix (Dos/mac to UNIX text, format Converter).Dos text file line break is \ r \ n, which means that 16 binary is 0D 0 A, and Unix text file newline character is \ n, expressed as
build Postfix mail system serviceThe e-mail system in the Internet is not an isolated system, it needs the DNS server to provide the resolution of the Mail domain, mail collection, delivery and other functions are provided by different
Basic conceptsThe number of open files, as a literal meaning, refers to the number of open files.Previously, I have been thinking, "Open file" is a concept of what. Later, learned a little C language, only to understand that the program to access a
SSH (remote connection tool) connection principle: SSH service is a daemon (demon), the system background listening client connection, SSH server process named sshd, responsible for real-time monitoring client requests (IP 22 port), including public
Linux File and directory permissionsEach file or directory in Linux contains access rights that determine who can access and how to access these files and directories.By setting permissions, you can restrict access by only allowing users to access
Varnish is a high-performance open-source HTTP accelerator, Squid Service is also, the relationship between the two like Apache and nginx,varnish younger and lighter, squid more mature and stable.Varnish4.0 work processes such asDescription of each
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.