Modify the font configuration file (root permission required) and add the font to the list. Sodu gedit/etc/fonts. conf Font directory list --> Dir > /Usr/share/Fonts Dir > Dir > /Usr/x11r6/lib/X11/Fonts Dir >
To fix several bugs in other architectures, we had to install cross-compilation for multiple architectures.
At the beginning, I used the crosstool script to automatically compile and install the tool. After a day, it was too slow. And the chances
View current configuration: iptables-l
Firewall configuration file:VI/etc/sysconfig/iptables
Open Port 80:/*-A RH-Firewall-1-INPUT-M state -- state new-m tcp-p tcp -- dport 80-J accept test is invalid/
Iptables-A input-p tcp-s 0/0 -- dport 8180-J
Install 32bit in Ubuntu 64bitThe 64bit system architecture is advanced, but it is only an application.ProgramA lot fewer. After several days in the forum, I finally found a solution:
First install a 32-bit DatabaseSudo apt-Get install ia32-libs *
My blog has been applying for a long time, but I have not written anything. I thought it was disabled. log in today and try again. for this reason, I found an article about installing mono under rethad 9.
I have found a lot of information on the
Permission management
Use the ''chmod'' command to change the object ACL. Use ''chown ''to change the object ownership.
For example: chmod 755 xxx chmod a + x xxx chown user: group xxx is used to change the owner user of the file. You can also
Here we will list some common functions and explain the functions one by one with a specific example.
FTP is usually used to log on to FTP, browse FTP content, download FTP files, or upload FTP files.
1. The first step to use FTP is to log
Superblock: records the overall information of this filesystem, including the total inode/block quantity, usage, remaining amount, and the format and related information of the file system;Inode: records the attributes of an archive. An archive
I have been searching the Internet for the RAM-based filesystem in Linux. there are using posts and each one describes its solution and configuration well. however, after reading few of them, it may seem a little confusing because there are 3
When I used putty to operate SystemOut. log today, I forgot how to exit the vi command. I found the following introduction on the Internet and thought it was good. I 'd like to share it with you:
______________________________________________________
The Development Board (or u-boot) cannot ping linux in the Virtual Machine
Solution:
Step 1:
Set Virtual Machine to bridge
Step 2:
Set the IP address to 192.168.1.200 (this is just a reference, but the following IP Address Settings are in
Memcache is a high-performance distributed memory object cache system. It maintains a unified and huge hash table in the memory and can be used to store data in various formats. simply put, the data is called to the memory and then read from the
Today, a friend went to a good foreign company to interview for a linux development position. The interviewer gave the following question:
The following C program is provided and compiled using gcc in linux:
View source
Print?
01 #include
Document directory
Preface
1. Process and thread
2. Reasons for using threads
3. functions related to thread operations
4. Mutual Exclusion between threads
5. synchronization between threads
6. Final question code
Preface
Thread?
In linux, how does one view the currently logged-on user and kill the user you think should be kicked off?I have read some examples in the network. here is a summary. the main Commands used are: w, who, ps, kill, and pkill. view the currently logged-
1,Introduction
OCFS2 is the next generation of ORACLE cluster file system. It has been designed as a common file system. OCFS2 allows all nodes running in the cluster to concurrently access the storage and backup through the standard file system
Engineer a revised the first line of a.txt and submitted it.Engineer B also revised the first line of a.txt and then executed svn up. SVN prompts: (below, you started to assume the role of engineer B)$ Svn upA conflict is found in cmda.txt.Select:
View Code
Username: root Password: ******* 1. Enter the configuration file directory: cd/etc/sysconfig/network-scripts/2, vi ifcfg-eth0 in the file to change the configuration information to the following information; DEVICE = eth0BOOTPROTO =
Directory operation:
Rm-rf mydir/* Delete the mydir directory */
Cd mydir/* enter the mydir directory */
Cd-/* Go back to the upper-level directory */
Cd ../* back to the parent directory with spaces in the middle */
Cd ~ /* Return to the root
Serial Communication Ports COM1 and COM2 -- learning notes
I. Basic principles of Serial Communication.
The essential function of a serial port is to act as an encoding converter between a CPU and a serial device. When data is sent from the CPU
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service