I. Description of the Environment1. System: CentOS 6.4 i386 (min)2. Login User: Root3. Version: CMake 2.8.10.24. Virtual machine: Oracle VM VirtualBoxSecond, installation stepsStep one, install GCC and other prerequisite packages (it is already
Leap second refers to a Linux system that automatically adjusts the system time, which usually occurs at the end of a month, most likely the month of June and December, when a leap second occurs that can cause the application (Java) to be busy,
Basic principles of Linux1, consisting of a small program with a single purpose; a combination of small procedures to complete complex tasks;2, everything is a document;3, try to avoid capturing the user interface;4, the configuration file is saved
A physical network card is virtualized into two virtual network cards (using VLAN method slicing) using the steps of the operation:Pre-planning Preparation:
ETH1 Network card Normal use
ETH1 The switch port configuration trunk allow
Shortcut keys:CTRL + D: Keyboard input ends or exits terminalCTRL + S: Pause the current program, pause and press any key to resume runningCTRL + Z: Put the current program in the background to run, revert to the foreground commandCTRL + A: Moves
RM ' ls | Grep-v "AA" '//Remove all files except with AA stringls | Grep-v Keep | Xargs RM//delete all except keep stringRM ' ls | Grep-v "^aa$" '//delete all files except AA filesRM ' ls | Grep-v "^a$" | Grep-v "^b$" '//delete all files except A
Some commands are very common, but a period of time not to forget, the daily use of the collation down, the specific parameters used to write.
View Image: Display
View File contents: Cat/tail
View process: PSKill process: Kill
Find:
File permissions In addition to R, W, X also have S, T, I, a permission:S: The file owner and group set the SUID and GUID, and the file will be executed as root after the S permission has been set. When setting the S permission, the file belongs to
The first step:Have a certain understanding of the status of the system's current disks. This is going to use the fdisk-l command.Fdisk-l As can be seen/dev/sdb/is not partitioned, the following example we are going to partition the/dev/sdb and
One: View CPUMore/proc/cpuinfo | grep "model name"grep "model name"/proc/cpuinfoIf you feel the need to see more comfortablegrep "model Name"/proc/cpuinfo | Cut-f2-d:Two: View memorygrep memtotal/proc/meminfogrep Memtotal/proc/meminfo |
I'm using two sets . LinuxLinuxa IP : 192.168.10.101LINUXB IP : 192.168.10.102First, we are Linuxa Mount the optical drive and install FTP Serverthen install FTP server (on the same platform, i.e. Linuxa on)Modify FTP The main configuration file
This is mainly in the C language, for example, other languages developed programs, each process will have a similar space. Here is a C code:#include #includeDoublet[0x02000000];voidsegments () {Static ints = the; void*p =malloc(2); printf ("stack\t%0
Recently used Golang to do a project, product demand is "single service to achieve 5000 parallel processing" The hardware configuration is as follows: Cpu:intel (R) Xeon (r) CPU e5-2620 v2 @ 2.10GHz mem:32g DISK:SCSI 600G 10000 Turn/sec Os:centos 6.6
Linux>,>,
1 redirection
1.1 redirection symbols> The output is redirected to a file or device to overwrite the original file.>! The output is redirected to a file or device to forcibly overwrite the original file.> The output is redirected to a
Linux/UNXI system environment variable, linuxunxi environment variable1. What are environment variables? Simply put, it is to specify a directory. when running the software, the relevant program will find the relevant files according to the
How to solve the serious problem of Ubuntu fever
It was quite geothermal when I first installed ubuntu, hot! The direct reason is that there is no corresponding video card driver, and then find the latest Nivida driver in the software update. It is
Linux/etc/shadow file
** In a Linux operating system, a file is responsible for the passwords of all users. That is shadow. The permission for this file must be set:-R---(400) or-rw--(600)That is, the Linux/etc/shadow file is a file that only the
Linux Study Notes (9)
I am using centos because I use some special commands, I have to modify the system time. Here we will summarize the following: date viewing system time date-s 03/04/2013 (set the system date to March 04, 2013) date-s (set the
CentOS upgraded GCC to GCC4.8.2
The GCC version installed on the server is too old to meet the individual's version requirements. Therefore, it is decided to upgrade the GCC version from 3.4.6 to 4.8.2, which is subject to permission restrictions,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service