How to view the Linux version

Http://www.enet.com.cn/article/2008/0828/A20080828351133.shtml How can I know what version of Linux I am using? The following methods will give you the answer! 1. Run the following command to view the kernel version: 1) [root @ q1test01 ~] #

Linux haowen collection

There are a lot of Linux materials on the Internet, but there are a lot of mixed information. Below is a good point for me to collect some information.ArticleIt is carefully written, so you do not have to go online to seek out information during

Description of error codes of errno. h in Linux

In centos6.2, there are two files, one in/usr/include/ASM-generic/errno-base.h, and the other in/usr/include/ASM-generic/errno. h. The/usr/include/ASM-generic/errno-base.h file contains the following content: # Defineeperm 1/* operation not

[Linux] how to configure JDK environment variables in Linux

This article describes several common methods for configuring JDK environment variables in Linux. First, install JDK in Linux. If you are prompted that the permission is insufficient (and root prompts that the permission is insufficient), run the #

Linux system porting key points

1. Build the boot loader compiling environmentStep 1: Before compiling the boot loader, you must first ensure that the cross-compilation tool chain has been installed. You can use the which arm-Linux-GCC command for detection. In

Why does Linux not need disk fragmentation?

If you are a Linux user, you may have heard that you do not need to fragment the disk of your Linux File System. You may have noticed that there is no disk fragment tool in the liunx installation package. Why? To understand why Linux file systems do

Common Linux decompression commands

Tar 1) tar calls GzipGzipis a program developed by gnuorganization. The file ending with .gz is the result of gzip compression. And GzipThe relative decompression program is gunzip. Use the-Z parameter in tar to call gzip. The following is an

Simple Analysis of Process Communication Methods in Linux

The process communication methods in Linux are basically inherited from the process communication methods on the UNIX platform. The Bell Labs and BSD (Berkeley Software release center at the University of California Berkeley), which have contributed

Compilation and loading of Linux kernel driver modules

HOST: Windows 7 flagship edition, vmware7.1.2, fedora9 Compiling environment: Arm-Linux-GCC 4.4.3 Linux: linux-2.6.32.2 Busybox version: busybox-1.19.4 Target Board: friendly arm micro2440 How to compile and use the kernel module: Write a simple

Linux Kernel scheduling policy and algorithm analysis (1)

Transferred from Http://hi.baidu.com/mychaoyue2011/blog/item/6df45895c3d63243d0135e01.html Analysis of this reportLinux2.6 kernel Scheduling Policies and algorithms.LinuxThe kernel supports multiple CPUs, and each CPU executes a similar policy.

Linux operating system header file and library file search path

From: http://www.zxbc.cn/html/20080712/60742.html Include header file, dynamic link library, system definition, there are a total of the following sources designated GCC to find there. The ~ Gcc/GCC/collect2.c: locatelib () It is written in specs

Linux: Command Execution Control & |

1 ,&& Mode: command1 & command2 If command1 is successfully executed, execute command2 -RW-r -- 1 Kevin 0 September 11 00:55 1.log [kevin@kevin test]$ ll Total usage 4 -RW-r -- 1 Kevin 0 September 11 00:55 1.log [kevin@kevin test]$ mv 1.log tmp.log &

Linux: Use () to execute a group of commands

Execute a group of commands in the sub-shell. Method: (command1; command2; command3) If no () exists, it is executed in the current shell. [kevin@kevin ~]$ ll Total usage 8 Drwxrwxr-x 2 Kevin 4096 September 11 01:07 Test [kevin@kevin ~]$ pwd;cd test;

Linux User Permissions

In our Linux system, all the users on the system are connected to normal users, and the root user is connected to each other, all records are stored in the/etc/passwd case. As a result, the password is recorded in the/etc/shadow case. In addition,

Linux Device Node

A few days ago, when learning Android often encounter XXXX node, so now refer to: http://blog.csdn.net/Bestrem_9/archive/2009/03/19/4004335.aspx (there are other documents) will summarize the concept of node is as follows: The concept of a node is

Device Name in Linux

Http://wf66.com/page/20069/217573456C.htm During the installation and use of Linux, you will inevitably be exposed to many device names such as hda1, ttys0, and eth1. Indeed, they are very different from common windows, so you need to know about

Grub enters Windows and Linux

After the Windows and Linux operating systems are installed, the Startup menu does not appear, but appears [Minimal bash-like line editing is supported. For the first word, TabLists possible command completions. Anywhere else tab listsPossible

How-to: getting started with Linux

Table of contents 1. What is man manual? 2. obtain useful information from the man Manual 3 man manual page operations 3.1 exit man 3.2 search 3.3 print 1. What is man manual? First, man is the abbreviation of manual. A Chinese

Meanings of ulimit parameters in Linux

Ulimit: displays (or sets) limits on resources that a user can use. These limits are divided into soft limits (current limits) and Hard Limits (upper limits ), the hard limit is the upper limit of the soft limit. The system resources used by the

Linux mobile DIY. xiaxin e600 and Philips 968 installation packages

Linux mobile DIY. xiaxin e600 and Philips 968 installation packages Papayas 2006-10-25 I. Sequencing Both xiaxin e600 and Philips 968 only recognize the tar format package files in Linux.In Windows, the tar package generation tool is similar to the 7

Total Pages: 5467 1 .... 4850 4851 4852 4853 4854 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.