For example, if you want to extend the f disk in Windows to/home in Linux, you can use the following method:First, format the f disk to the ext3 format. Command:
Code:
Sudo mke2fs-J/dev/sda8
Then mount the
We have just configured opencv in Ubuntu, and then tested a response to open the imageProgramWhy do I use commands?
"G ++ test. cpp-O test 'pkg-config -- Libs -- cflags opencv '" can be compiled and passed smoothly.
"G ++ 'pkg-config -- Libs --
WC:
This command is used to count the number of bytes, the number of words, and the number of rows of the file and display it. The general format is as follows:
WC [Option] file...
If no file name is specified, select from standard input. If
Today I only read a few simple commands. They are as follows:
1. who command
Displays the user name and related information of the current system. Format: Who [Option] [parameter]. You can use who am I.
The WHO command displays all users who
1. Get the corresponding file descriptor by knowing the file stream pointer
Int fileno (File * stream );
Main Applications: IfProgramPreviously, I used fopen to open a file and wanted to lock it,
For example, int fcntl (INT Fildes, int command,
1. How do I check whether a port is open?
A:Netstat-lThis command will list all listening ports or useTelnet localhost 22This command tries to connect to port 22. If the port is not open, the following error message is returned:
Vadi @ vadi-LAPTOP
The relationship between Linux (UNIX) processes and files is complex. This tutorial attempts to elaborate on this issue in detail. Including: 1. association between multi-process and multi-/single-file in Linux for file streams and descriptors and
Software Installation
In Red Hat Linux, the application installation package usually has two formats:1) rpm packages such as software-1.2.3-1.i386.rpm. It is a package Encapsulation Format created by RedHat Linux.2) tarpackages, such as software-1.2
After reading the introduction of the file organization structure in Linux, I still feel very helpful. I am reading some manuals to introduce such directories. I often try more than the cloud, in the past, Linux directories were also
Common decompression commands
Tar.bz2 command: tar-jxvf * .tar.bz2
Tar. Z command: tar-zxvf *. Tar. Z
Tar.gz command: tar-zxvf * .tar.gz
PS: You can use man to help with these parameters. Note that these parameters are case sensitive.
The software
Inode: each directory and file in the ext file system corresponds to an inode. inode stores the data block number of the file and the actual content stored in the directory, in short, inode is a file index.
Hard link: create a file with the same
Log category
Linux Log Files are generally located in the/var/log folder, which generally includes the following:
Cron: crontab routine transaction log
Dmesg: the detection information when the kernel is started. The output is the same as the dmesg
Abstract:As the amount of data stored in the database increases and the query speed slows down, it is necessary to use the cache server application. This article describes how to install and use memcached.
This article only introduces the php api
Refer to http://www.linuxso.com/command/su.html
UseraddNewuser # The Home Directory of this user is/home/newuser
Useradd username-G group name-D home directory name-P Password
-G specifies the Primary Group of the user.
-G: Specifies the secondary
13. Sort
Sort [Option] File
Note: The sort command sorts all the rows in the specified file and displays the results on the standard output. If the input file is not specified or "-" is used, the sorting content comes from the standard input.
Sort
Tar commandTar can create files and directories. Using tar, you can create a file (backup file) for a specific file, change the file in the file, or add a new file to the file. Tar was originally used to create files on tape. Now, you can create
Common commands in LinuxCD change DirectoryCD Space DirectoryDirTopKillSudo apt-Get installMan info QLsSu// View the following three text filesCatHeadTailForgot Root PasswordWays:1. Enter recovery mode2. Root3. passwd4. Enter the new password.Delete
1. Find the corresponding apache version of mod_rewrite.so. If not, recompile it (find the same apache version on other machines) and put it in the modules directory of Apache.
2. Add loadmodule rewrite_module modules/mod_rewrite.so to the Apache
To be implementedRootTo log on, follow these steps:1. Run sudo passwd on the terminalRoot, IsRootSet a password.2. In system-system management-Logon window-security, select allow local administrator to log on ".After cancellation, you can useRootLog
1: Echo "1">/proc/sys/NET/IPv4/ip_forwardOr change VI/proc/sys/NET/IPv4/ip_forward to 0. 1 indicates that the IP forwarding function is disabled, and 1 indicates that the IP forwarding function is enabled.
2: iptables-T Nat-A postrouting-O eth0-s 19
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service