Shared memoryShared memory is a portion of physical memory that is shared by multiple processes. Shared memory is the quickest way to share data between processes, where a process writes data to shared memory, and all processes that share that
TCP/IP three-time handshake process for establishing a connection :A total of three packet are required to establish a TCP connectionclient--> syn=1 , Ack=0,fin=0---Serverclient , ack=1,fin=0 client--> syn=0 , Ack=1,fin=0---ServerTCP/IP Four
Linux Command Tools Top The top command is a common performance analysis tool under Linux that shows the resource usage of individual processes in the system in real time, similar to the Task Manager for Windows. Top is a dynamic display process
Partitioning is an important prerequisite for installing Linux, and if the partition is not planned at the time of installation, it will bring a lot of trouble to the daily operations.Usually we divide the following disk blocks:
/
/boot
http://www.ibm.com/developerworks/cn/linux/l-cn-udev/[Email protected] ~]# uname-r2.6.32-431.el6.x86_64Udev-147-2.51.el6.x86_64This version of Udev changes significantlyWhat is Udev?Udev is a feature in the Linux2.6 kernel that replaces the original
I. Overview of interprocess communication:1. Purpose: Why do interprocess communication?1) Data transfer: One process needs to send his data to another process.2) resource sharing: coordinating shared resources.3) Notification event: A process needs
First, create the syntax:ln [options] Existingfile NewFileln [options] Existingfile-list DirectoryCreate a soft link with-s without creating a hard link with-S.-F is created, it is deleted with the file name.-I ask before deleting.Second,
The various environment variables under the Linux system are implemented by modifying the/etc/profile file. Because it is a system file, you need root permission to modify this file. Therefore, the user must have root privileges to implement the
Terminal most common shortcut keysNew terminal window: crtl+shift+nTerminal Drift/Toggle:shift+ left and right arrowsPending:Crtl+sLift pending:crtl+qClear screen : Crtl+lCommand line cursor movement: crtl+a Move to the beginning of the
User ManagementDifferent users of the online server are responsible for different parts, such as architecture engineers need web-related permissions, and DBAs need database-related permissions. Coordinate availability and security, how do I manage
Download their corresponding version first (tar.gz)Then extract to usr/local/.Command: TAR-ZXVF ... tar.gzConfiguring the JDK environment variablesCommand: Vi/etc/profile#set Java EnvironmentJava_home=/usr/local/jdk1.7.0_60Classpath=.: $JAVA
Under the Linux operating system, almost all of the software is installed, uninstalled and managed through RPM. RPM is all called the Redhat Package Manager, and is a software proposed by Redhat Corporation to manage packages under Linux. Linux
[email protected] ~]# RPM-QF/SBIN/IPiproute-2.6.32-31.el6.x86_64IP is a command, there are many functions of IP command! Basically, it integrates the two commands of Ifconfig and route.Ip-show/manipulate routing, devices, policy Routing and
Install and update libraries using external devices (optical drives) and linux external devices1. Mount the optical drive (the directory does not exist, create)Mount-t auto/dev/cdrom/mnt/cdrom2. Modify the index file to read the local
In linux, view and terminate processes. In linux, terminate processes.1. Check which process occupies the port.
Example: netstat-anp | grep 1160
Ps: Check that port 1169 is occupied by that process.
2. Search for processes
Example: ps-ef | grep
Bind the ip address and host name in Linux.
1: Enter the command gedit/etc/hosts
In this way, you open a text and add the following content at the end of the text:
IP address Host Name
192.168.0.125 hadoop
Save and exit.
How to resolve a linux
Use SHELL scripts to implement the file integrity check program,
I. Development Background
As a result of the current situation, you need to monitor the file system of the server. Although there are many intrusion detection and anti-tampering
This chapter -- the tool used to send and receive emails is Thunderbird.
Install
# Yum install dovecot-mysql.x86_64 dovecot. x86_64-y
Edit File
Vim 10-mail.conf
Mail_location = maildir:/home/vmail/% d/% n/Maildir/first_valid_uid = 800
Enable
!
Applications of the kernel linked list and applications of the kernel linked list
This article builds a two-way circular kernel linked list, then traverses the linked list, prints data, and finally releases the linked list node. The data structure
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service