The static library is connected to the target code when the program is compiled, and the static library is no longer needed when the program runs. After compiling the program file large, but loading fast, isolation.Dynamic libraries are not
What is the meaning of the const of C language. In defining constants, why is it recommended to use const instead of # define?Const is read-only meaning, it restricts a variable to be allowed to be changed. The use of const can improve the security
1. System version[Email protected] ~]# lsb_release-ddescription: Red Hat Enterprise Linux Server release 5.10 (Tikanga)2. Open the configuration file[Email protected] ~]# vim/boot/grub/grub.conf3. Modify Line 16thKernel/vmlinuz-2.6.18-371.el5 ro
In the case of hard disk shortage, the usual practice is to use symbolic links or tools to resize partitions (parted), but these practices are only a temporary change of the difficult situation, and after each change in the size of the partition to
Host Ubuntu System:sudo ifconfig eth0 192.168.1.2Patching (patches and kernels in the same directory/home/chris/temp):cd/home/chris/temp/linux-3.0Patch-p1 Development Board U-boot:setenv Bootargs ' root=/dev/nfs rw
Environment:CentOS 6.5 is installed on a USB flash drive. Can carry with you DescriptionI put a system on a USB stick on a machine, the network can be normal use, and then I switch to another machine when the problem arises.is the inability to use
1. FindFind is the most common and powerful look-up command you can use to find any file you're looking for.Find uses the following format:$ find ---If no parameters are added, find searches the current directory and its subdirectories by default,
Want to install a desktop landscaping, the cost of the old nose, online said the basic can not, and finally directly find pack documentation pieces of installation, here Record:Http://packages.linuxmint.com/list.php?release=Rebecca(1) First download
The difference between memory buffer and cache in Linux operating systemFreeThe free command provides a more concise view of system memory usage relative to top:$ freeTotal used free shared buffers Cachedmem:255268 238332 16936 0 85540 126384-/+
the tree command under Linux--linux under directory tree viewSometimes we need to generate a directory tree structure that can be used with ls-r, but the actual effect is not good
The tree command is required, but most Linux systems do not install
Linux tree Command and Linuxtree commandTree commands in Linux
-- View the directory tree in Linux
Sometimes we need to generate a directory tree structure, which can be ls-R, but the actual effect is not good.
Tree Command is required, but
Differences Between TCP and UDP protocols
First, both TCP and UDP protocols run on the transport layer.
UDP protocol: user data packet Protocol
1. UDP is connectionless. That is to say, you do not need to establish a connection before data
Query the user status in Linux and unlock the Locked User
1. If the current user is a root user, switch to the Oracle user first, enable sqlplus, and assign the dba role.
[Oracle @ oa2RedHat ~] $ Sqlplus/nolog
SQL * Plus: Release 11.2.0.1.0
Solution: VMware's 64-bit Linux system does not support full virtualization (VMX)
I. Prerequisites:
Cpu support Inter VT-X or AMD virtualization technology, For details refer to the official site description.
Ii. Problem description:
Under the
Install N64 simulator mupen64 on 64-bit ubuntu
We know that on windows platforms, N64 simulators are no exception. on linux, what are the best solutions for children's shoes who want to play N64? I found an open source N64 simulator mupen64 through
Install php memcache extension in ubuntu
Install memcachedSudo apt-get install memcached
Memcached parameter descriptionMemcached-d-m 50-p 11211-u root-M specifies the MB of cache space used,-p specifies the port to be listened on, and-u specifies
About SUIDSGIDSTICKY in linuxIn linux, apart from reading, writing, and executing file permissions, file permissions also have special permissions for forcible bit and adventure bit.In linux, the File Permission is as follows (the directory in linux
Linux top commandsLinux top commands
The top command is a common performance analysis tool in Linux. It can display the resource usage of various processes in the system in real time, similar to the Windows Task Manager. Top is a dynamic
Centos6.4 install hadoop-2.5.1 (fully distributed)
Environment Introduction:
Install a Hadoop-2.5.1 distributed cluster on two servers with centos6.4 (32-bit) (2 machines for trial use, haha ).
1. Modify the Host Name and/etc/hosts file
1) modify
Iptables package filtering settings for Linux pptpd
Set up a pptpd vpn Server using CentOS. The information is as follows:
Server IP address 192.168.100.1/24
Gateway 192.168.100.254 (NAT firewall, which maps : 1723 to 192.168.100.1: 1723)
Client IP
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service