Linux Kernel Driver bit operations

The bitwise operation of the Linux kernel driver atomic_t is good in integer arithmetic. However, it cannot work well when you need to perform an atomic operation on a single bit. Therefore, the kernel provides a set of functions to modify or test a

Zabbix monitoring build script

Zabbix monitoring build script #! /Bin/bash www.2cto.com #1.0 install zabbix In the lazy package yum install-y httpd php mysql-server gcc * php-mysql httpd-manual mod_ssl mod_perl mod_auth_mysql php-gd php-xml php -mbstring php-ldap php-pear

Common nginx commands

Common nginx commands 1. View nginx process 1 ps-ef | grep nginx Description: The nginx process consists of the main process and working process. Www.2cto.com 2. The nginx 1nginx startup result shows the main thread and worker thread of nginx. The

[Shell] Using getopts in Functions

[Shell] Before using getopts in a function. bashrc has written a function that uses getopts, But it is strange that after this function is called once, the parameter cannot be parsed again and then queried, the error is caused by the OPTIND variable.

Linux storage experiment 2: RAID operations

Linux storage experiment 2: RAID operationsLinux storage experiment 1: Creating a file system http://www.bkjia.com/ OS /201303/194226.html on a hard diskThe basic knowledge part is not detailed design, in short several common patterns: raid0, raid1,

Configure dual-host SSH trust in Linux

Configure dual-host SSH trust in LinuxI. Implementation principle using a "public/private key" authentication method for ssh login. A simple explanation of the "Public/Private Key" authentication method is: first, create a pair of public/private

System memory statistics after memory file system is used

After the memory file system is used, the system memory statistical method [Problem description] in Linux, memory can be divided into a part of space for use as a disk, called Ramdisk. This part of memory space has the feature of High-Speed reading

Bind multiple NICs in CentOS

Binding multiple NICs in Linux CentOS recently touched on a piece of server load. The following describes how to bind multiple NICs to IP addresses in Linux. Here is an experiment using CentOS6.3, the environment is completed under VMware

Self-made small linux System

Self-made small linux SystemLinux boot processBoot self-check: Program postMBR boot: the mbr Master Boot records on the hard disk are 446 bytes (the first phase of the grub boot program reads the kernel), the partition table (64 bytes), and the id

Learning about grub

Learning about grubI have installed many ubuntu systems recently and have some knowledge about grub. I will share my recent studies with you today. If you have two ubuntu and windows systems (ubuntu is installed in win7 recently) and want to enable

Linux environment configuration file

Before learning about the linux environment configuration files, login and non-login shell first understand login and non-login shell, because the two obtain bash, login shell is caused by inconsistent data in the configuration file: the complete

Set environment variables in Ubuntu

When setting environment variables in Ubuntu in linux, you can directly use the set or export command in shell to set the environment variables temporarily, if you want this environment variable to be automatically set every time you start the

Linux built-in command free output details

Linux built-in command free output detailed background: recently assisted QA to test the self-developed server module, pressure test to observe the process memory usage, use the linux built-in command free, have to say, for new Linux users, the

Aux and-ef parameters of PS

The aux and-ef parameters of PS have always thought that ps aux can list all running processes. Recently, we found that there are still some defects. The results obtained using ps aux and-ef are different, try to use the-ef parameter later. This is

In-depth understanding of Linux soft links and hard links

In-depth understanding of Linux soft links and hard linksI have never had a deep understanding of the link. A friend asked me this question last night, which suddenly aroused my interest. This morning, I looked at laruence's book and found it on

How does one skip the password when transferring files on a linux server?

In a linux environment, how does one transmit files on a Linux server without a password? The scp command is usually used to transmit files between two hosts.You must enter a password for ssh to obtain the files on the other linux host. However, by

7. Usage of common linux commands

7. Usage of common linux commands 6: linux X window systemhttp: // www.bkjia.com/ OS /201303/197061.html system information uname-m Display Server Processor Architecture (2) uname-r shows the kernel version in use. uname-a lists all things

Configure the Telnet server in Ubuntu

Configure the Telnet server in Ubuntu. first, we will introduce that the linux Daemon has a special Daemon in Linux, which is used for InterNET standard services and usually started at system startup. The configuration file of inetd can be provided

Install USB view in Ubuntu

Install USB view in UbuntuUsb view is a USB device analysis software. This tool is used to detect the PID and VID information of a usb device. The so-called VID refers to the Vendor ID, that is, the manufacturer ID, PID is the product ID. With the

[O & M engineer _ 03] 20 built-in Linux monitoring tools: w and ps

[Personnel in O & M _ 03] 20 built-in monitoring tools for Linux systems: the third article of w and ps personnel's O & M on chinamoocs has been published, and I have to seek help from each other. If you are interested in the theme, please refer to

Total Pages: 5467 1 .... 4702 4703 4704 4705 4706 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.