On the Linux server encountered a small problem, go up and toss half a day. This is the first time that Linux has been aware of the features that have existed over the years: OOM Killer. To put it bluntly, the OOM Killer is a layer of protection
Using GIT commands and GitHub projects under LinuxDescription: Tested OK on August 26, 2017 (metalworking)Build a git environment under Linux1, registered GitHub account, website: https://github.com2, Linux create SSH key:Method one: Ssh-keygen #
Linux system: Time-sharing multi-user multi-tasking operating system;Linux system Boot process:In the Inittab configuration file:Defines the 7 levels of the operation of the Linux system: from 0~60, 6: On behalf of the shutdown and restart, is not
Linux/var/log/messages is empty (0k), messages.0, Messages.1 is also emptyFrom:The/var/log/messages is empty, and so is the rotated log files such as messages.0, Messages.1,... (Document ID 2053885.1)Suitable for:Linux os-version Enterprise Linux 4.0
Full file rights
Show all rights to a file
Change the full rights of a file
Permissions for files
Permissions to change files
Change with symbolic notation
Change with digital notation
(1) Process management1. Determine the server health status2. View the processA. Viewing all processes in the system: PSExample: PS aux (using BSD OS command format)A show all foreground processesX Show all background processesU shows which user
Logrotate IntroductionLog files are an extremely important tool for Linux system security. Log files contain useful information about the events that occur in the system, which are often used during troubleshooting or during system performance
The implementation of Linux timing tasks are: cron, Anacron, at, and so on, here mainly about cron services.Noun Explanation:Cron is the service name, Crond is a background process, and crontab is a custom-made scheduled task table.Package
Modify the gem5/configs/common/sysconfig.py, and the following paths are directories for binaries and disks:' /dist/m5/system ' ' /home/chen/gem5-gpu/system ' ]Modify the disk file gem5/configs/common/benchmarks.py,x86root-parsec.img to the disks
1, about/etc/host, hostname and IP configuration fileHosts-the static table lookup for host name (host-Name query-still tables)The Hosts file is a file that is responsible for the fast resolution of IP addresses and domain names in the Linux system,
This article was compiled out of interest in the Linux operating system and a strong desire for underlying knowledge. This article can also be used as an indicator of basic knowledge, and the article covers all aspects of a system. If there is no
In Linux, there is no exec () function, exec refers to a set of functions, a total of 6, namely: #include extern char **environ; int execl (const char *path, const char *arg, ...); int EXECLP (const char *file, const char *arg, ...); int execle
The tackle scheduling, which is the support of the scheduling mechanism to the real-time system needs, is a fast response rescheduling mechanism. Since it is related to the rescheduling, we should review the dispatch and rescheduling.There are two
Sogou Pinyin is a FCITX framework based on the development of input method, support all spell, simple spelling, fuzzy sound, cloud input, skin, Sino-British mixed transmission and other functions.After installing the Fzug software Source: Install
Three scheduling strategies for the Linux kernel:1,sched_other time-sharing scheduling strategy,2,sched_fifo Real-time scheduling strategy, first-come-first service. Runs continuously once the CPU is occupied. Keep running until a higher priority
1. Linux OverviewLinux is a free and open source Unix-like operating system. The kernel of the operating system was first released by Linus Torvalds on October 5, 1991 and became a Linux operating system after adding user-space applications. Linux
Target file:/proc//maps If there is a large amount of 8K or so of memory fragmentation, there is a memory leak. Similarly, if a lot of memory fragmentation occurs in the maps file for the corresponding PID process, a memory leak is also
Under Linux Execute Jar file method: Enter file directory under command line,execute Java-jar file.jar i.e.Can also create a launcher on the desktop, fill in the command bar related commands: Java-jar/file path/file.jar, so that the desktop
CDlinux creates a USB flash drive and a pocket system.
Tools:
1. One USB flash drive of 8 GB or above;
2, CDlinux0.9.7.1 image file, note that other versions may not be successful (portal http://pan.baidu.com/s/1o7P6Gu2 );
3. UltraISO or Unetbootin (
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.