Pattern spaces (mode space) and hold space (keep spaces)(h, H, G, G, X)Pattern space: SED handles a temporary buffer of text content lines, and content in the pattern space is actively printed to standard output and automatically empties the mode
1 You may know that a mutex is a necessary tool in a threaded program, but it cannot be omnipotent, such as when a thread is waiting for a condition of shared data to occur. It is possible to repeatedly attempt to lock and unlock the mutex to check
Process management ToolsView processPstree Show Process Tree-P: Display PIDPsSearch processPS | GrepPgrepPidof
System Monitoring Tools
UptimeFreeTopThe first line: The current system time system boot up to now the time elapsed the
Tab command or path completion most commonly used * * * * *CTRL + a cursor quickly back to the beginning * * *Ctrl+e cursor quickly back to line end * * * *CTRL+F cursor moves right one character *CTRL+B cursor moves left one character *Ctrl+insert
PSPS lists processes, process numbers, CPU usage in the systemps-a all running processesPs-efPs-auxPstreeVisualize the child process parent process relationship, no parent process specified, root is initTop' Top ' is a more useful command to monitor
Brief introduction:Describes two download mechanisms: Yum download, and CDROM cd downloadThe yum download mechanism is similar to 360 security defender Software Management, 360 software management There are many software lists that can be downloaded
Compression1. Definition: Compression is a large file through a number of compression algorithms into small files2. Purpose: Mainly to reduce the size of the file, which will save the disk or tape storage file space, and the transmission of these
Landing Xshell When encountered a problem, suddenly can not log on as:1. Check virtual machine Virtual network editor, change to the following configuration, here the name is your network connection is the same, find a connection to the Internet, do
Cat/etc/inittab# 0-halt (do not set Initdefault to this) system down state, system default cannot be set to 0# 1-single user mode, root privileges, for maintenance, login in this mode does not require a password, remote login is forbidden#
Brief introductionHere is a simple example of libfaketime.It is often necessary to test the modification time at work, and if the environment does not allow the adjustment of time, try to adjust the time of the individual process.Compiling the
1.shorthand for Rpm:redhat package manageRPM is a software package name for Linux, with the. RMP end, the installation syntax is: RPM-IVH,RPM package installation has a big drawback is that the file is too large, sometimes installed a software to
Operating effect:Code:1#include 2#include 3#include string.h>4#include 5#include 6 7 voidMytree (CharSzpath[],intDeep )8 {9 //directories are used to traverseTenDIR *Pdir; One //used to store file information A structDirent *pdent; -
The Linux server will require the virtual memory of the current system when installing larger software in the process, assuming that the initialization of the operating system without allocating large enough virtual memory later must manually
Tag: color exec white performs a size CHM gen Short T permissionLinux Memo: Create idea Shortcuts1. Go to the Common Shortcuts directory:cd /usr/share/applications #dir of desktop shortcut2. Create a shortcut file:sudo touch intellij-idea.desktop #
Cross-network communicationRouters are required for cross-network communication, and routers forward data based on routing table pathsRouting classificationsHost routingNetwork routingDefault routeRouting has priority: the higher the precision, the
16.1 IntroductionService is the essence of the process, but is running in the background, usually listen to a port, waiting for other programs, such as (mysql,sshd, firewalls, etc.), so we are called daemons, is a very important knowledge point in
8.1 Basic IntroductionThe Linux system is a multi-user multitasking operating system, any user who wants to use system resources must first request an account from the system administrator and then enter the system as this account.Linux users need
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service