[Shenghao @ localhost] $ cal 9 1752 July 22, 1617, 2324, 26, 27, 28, 29, 30
Today, cal is used to output the last 14 days of June September 2, 1752. I found the answer on the Internet:
In May February 1582, the Holy See would need to subtract 10
Http://lxr.free-electrons.com/source/drivers/media/rc/gpio-ir-recv.c
Simple Analysis
1. Use the Device Tree to select the rc gpio
2. Set the interrupt of the rising and falling edges, provided that the GPIO connected to RC must support the
Create a new dag. repo File# Touch dag. repo# Vi/etc/yum. repos. d/dag. repo
The following content:
[Dag]
Name = Dag RPM Repository for Red Hat Enterprise Linux
Baseurl = http://apt.sw.be/redhat/el?releasever/en/?basearch/dag
Gpgcheck = 1
1. vsftp virtual User Creation1. The odd row of the database file used to create a virtual account is the user name and even the user password)# Vitest_listZhang3123 linuxWang5456 linux2. Generate the authentication File For vsftpd and use the
Xdmcp service in linux: port 177 is used, and xmanager can be used to access linux Desktop processes.
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131227/2352523a4-0.jpg "title =" solft-(3366%8mdw9p6cep8u%ny.jpg "alt =" 1727158
Receiving matching function _ napi_gro_receive (napi, skb) of The Link Layer ):
This function matches messages and does not merge messages.
The matching rule must meet both of the following conditions ):
1. The received dev packets must be the same.
I. Main Lvs Technologies
1. nat address translation technology)
Through Network Address Translation, The lvs scheduler overwrites the target address of the request message and assigns the request to the real web server at the backend Based on the
The core of Linux security system is user accounts. Each user who can access the Linux system is assigned a unique user account. The user's access to objects on the system depends on the account they use when logging on to the system.
User
The extension name of gzipw.gzipcompressed file is .gz. Its syntax is as follows:
Gzip [-cdtv #] filename-c: Compression-d: extract-t: Check file consistency-v: Display compression ratio and other messages-#: Compression level, value range: 1 ~ 9, 9
I. Linux Startup Process Analysis
1. Currently, grub is the mainstream boot loader in major Linux versions.
2. The system startup process is as follows:
1. Load BIOS hardware information and perform self-testing, and obtain the first device that can
Differences between Linux and Windows: System partitions and file management methods.
Virtual Machine Software VMware's most popular virtual computer software.
Multiple computers can be virtualized and used as a test platform. [Download
Not recommended: Follow books like command book!
There are about 200 Common commands.
File naming rules:
A) All characters except '/' are valid!
B) It is best not to use these characters.
1. space character, Tab character, return character
2.
1. man [manual]:/usr/bin/man
Obtain the command orConfiguration FileTo view the help documentation of the command first.
Man [command or configuration file] // call more
E.g. manls
Manservices
Appendix: there are nine types of help files in
1. Introduction to open source software installation and upgrade
1 The software on Linux is almost always authorized by GPL, so almost every software provides the source code, and you can modify the program code on your own.
2 in Linux, whether a
Ftp and ssh are similar. ssh is mainly used to operate commands on remote servers, but ftp focuses on file transmission. It is relatively simple to install ftp on linux, I will share with you my experiences and experiences in installing and using
File Search command:
1. which/usr/bin/which
Displays the directory where the system command is located. It is an absolute directory and cannot find files.
Which [system command]
E.g. whichls
* Whereis ls
Note: Unlike whereis, which lists the alias
Conditional Test
Test conditions test content
[Test Conditions] # more widely used
1. Test file type
Test-e file name test file exists, true
[-E file name] Note: spaces must be added on both sides!
Appendix: test results are not displayed. echo $?
Basic Policy Routing commands (Linux)Policy Routing Strategy refers to the routing of IP packets based on the policies set by the network administrator as needed. For example, we can have A policy like this: "select X path for all packages that come
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service