A Linux socket Programming example, the Client connection server

With regard to socket programming, the following articles are well written: http://www.cnblogs.com/xudong-bupt/archive/2013/12/29/3483059.html1. The Accept () function, if the client has not been connected, the server is blocked at the Accept ()

Linux network card (set Gigabit NIC speed and mode)

Ethtool is a command for querying and setting network card parameters.Profile:Ethtool EthX//Query EthX network Port basic settingsETHTOOL–H//Show command Help for EthtoolEthtool–i EthX//query EthX information about the network portEthtool–d

Linux view CPU and memory usage

During system maintenance, it may be necessary to review the CPU usage at any time, and to analyze the system condition according to the corresponding information. In CentOS, you can view CPU usage by using the top command. After running the top

Brother Bird's Linux private dish notes 6------11 Learn Bash

1. Legal shell and/etc/shells functions     shell has multiple versions, including Bourne Shell (SH), C shell, K-Shell, tcsh, etc. Normally Linux uses the Bourne Again Shell (Bash), which is the enhanced version of SH       can check/etc/shells to

Linux command line basic file/folder operations

Operations on files Create an empty file: Touch + filename # is usually the first touch good one file and then vim this file. Curious why it's called touch.Delete File: RM + file name # straight out, not to the Recycle BinCopy the file to the

View firewall current status, turn off, etc. under Linux

Shutting down the firewall from the configuration menu is not working, simply do not install the firewall at the time of installationTo view the firewall status:/etc/init.d/iptables statusTo temporarily turn off the firewall:/etc/init.d/iptables

How to allocate more than 4M large memory in the Linux kernel

In the kernel, Kmalloc is able to allocate a maximum contiguous memory of 2 ( MAX_ORDER -1) page (see alloc_pages function, "if (Unlikely (order >= Max_order)) return N ULL; "), the page size is generally 4K bytes, the MAX_ORDER default is defined

Simple setup of FTP server under Ubuntu (Linux)

ObjectiveIt is only today that the FTP server is super easy to use. Eliminates the data cable and annoying LAN configuration SMB. Of course, there are some shortcomings. For example, only clients can read and write to the server. The server cannot

Basic application Tutorial of Iptables firewall on Linux

Http://www.vpser.net/security/linux-iptables.html iptables is commonly used on Linux firewall software, the following VPS detective to everyone said Iptables installation, clear iptables rules , iptables only open the specified port, iptables shield

Linux_ssky-keygen + ssh-copy-id login remote Linux host without password

Using Ssky-keygen and Ssh-copy-id in the example below, you can log in to a remote Linux host with a simple setup of 3 steps without entering a password.Ssh-keygen create public keys and keys.The Ssh-copy-id copies the local host's public key to the

Linux special symbol parsing--turn

The special symbols commonly used in the shell are listed below:#   ;      ;;      .       ,/\ ' String ' |   !      $   ${}   $?   $$ $* "String" * * *?   : ^ $# [email protected] ' command ' {} [] [[]] () (()) | | && {Xx,yy,zz,...} ~ ~+ ~-& \ +-%=

Linux open ports, linux open ports

Linux open ports, linux open ports In Linux, the server cannot be connected when software access is installed. In this case, check whether the corresponding port is enabled. For example, after svn is installed, unable to connect: When the svn

Performance Comparison Between SUSE and RedHat Systems

Performance Comparison Between SUSE and RedHat SystemsAs early as a few months ago, SUSE officially released the SUSE Linux Enterprise 12 operating system, which enhances cluster software to improve service availability in physical, virtual, local,

Linux learning notes (5) file search commands for common Linux commands and Common commands for learning notes

Linux learning notes (5) file search commands for common Linux commands and Common commands for learning notes(1) find The find command is used for file search. Its path is/bin/find. Its Syntax format is: Find [search range] [matching

Common Linux commands (28th)-diff

Common Linux commands (28th)-diff The diff command is an important tool in linux. It is used to compare the content of files, especially files of different versions, to find the changes. Diff prints the changes of each line in the command line. The

Common Linux commands

Common Linux commands Thank you very much, Mr. Yan, for teaching us a lot about linux! This blog is also designed to thank him! Due to limited memory, the commonly used Linux commands can be sorted out for reference at any time: Linux basic

Introduction to ACL (Access Control List) in CentOS

Introduction to ACL (Access Control List) in CentOS We know that in a Linux operating system, the traditional permission management is divided into three types of permissions (readable, writable, and executable) in combination with three identities (

Install wireless NIC Driver in CentOS 6.5 for wireless Internet access

Install wireless NIC Driver in CentOS 6.5 for wireless Internet access Install wireless NIC Driver in CentOS 6.5 for wireless Internet access 1. Check whether the wireless NIC driver is installed. The above results prove that you are not installed

Git distributed version control system Quick Reference

Git distributed version control system Quick Reference 1. install and configure GitGit is an open-source distributed source code version control system. It is mainly used on Linux/Unix systems and has been transplanted to Windows systems for use.In

How to determine Mapper quantity for Hadoop-2.4.1 Learning

How to determine Mapper quantity for Hadoop-2.4.1 Learning The advantage of MapReduce framework is that it can run mapper and reducer tasks in parallel in the cluster. How can we determine the number of mapper and reducer tasks, or how does Hadoop

Total Pages: 5467 1 .... 412 413 414 415 416 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.