Download source code
Linux Kernel is always evolving. The latest kernel Kernel2.6.0 officially supports USB2.0, and the most significant change in kernel module File suffix is *. o *. ko and so on. We can download the tarball source code package
Sometimes we only need to execute a command with the root permission to su to the root, isn't it inconvenient? In this case, sudo can be used instead.
The Default User Created by fedora is not in The sudo group. You need to edit the/etc/sudoers
Everyone will download the source code of the program sooner or later, and then try to compile it. If you are a loyal follower of RedHat or Debian, you will eventually find that a program is neither too old nor too new, and you are looking for
Let's start with the Free command.
Free
Compared with top, the free command provides a more concise view of the system memory usage:
$ Free
Total used free shared buffers cachedMem: 255268 238332 16936 85540 0 126384-/+ buffers/cache: 26408 228860 26
Configure Java
Sudo apt-get install sun-java6-jdk
After the installation is complete, select the default java:
Sudo update-alternatives -- config java
Then configure the environment variable:
Sudo gedit/etc/environment
Add the following two
Linux memory monitoring is one of the most important resources managed by Linux kernel. The memory management system is the most important part of the operating system, because the physical memory of the system is always less than the amount of
Originally, I could still Access DOS, but later I mentioned modifying grub on the Internet. the conf file is okay. I modified it myself. Now I still have DOS boot, but DOS cannot be used. I have changed it back, but I still cannot enter DOS and can
After 1-2 characters are entered on the LINUX Command platform, pressing the Tab key will automatically complete the following parts (the premise is that you have this thing, for example, when tomcat is installed, enter tomcat to tab ).
Linux view
In windows, you can easily view disk space. But in Linux, you may be confused about the disk space. Don't worry. I will solve this problem for you.
In Linux, the Df command is used to view the disk space system in disk partitions. You can add
BKJIA: When I draft this article, I proposed seven system administrators, but in those seven habits, only three of them stood out. Although the habit is good, sometimes the rule is better, especially when the system administrator processes the
One of the most important tasks of a webmaster or website maintainer is to ensure data security and stable operation.
There are many types of data maintenance. Today we only talk about the underlying data and back up mysq. speaking of mysql
NetlocustsYesLinuxThe file download software in the desktop environment is very similar to the network ant and the network express in Windwos. It has the following main features and will add more content in future versions.
1) It is an HTTP
SylpheedA good email client also has vulnerabilities. Please refer to the following section.
Affected Systems:
Sylpheed 2.4.4
Sylpheed-Claws 2.10.0
Sylpheed-Claws 1.9.100
Description:
Bugtraq id: 25430
CVE (CAN) ID: CVE-2007-2958
Both Sylpheed and
SendmailIt is the most widely used email sending/receiving proxy in Unix environments. Because the sendmail mail server is characterized by powerful and complex functions, we should send the SMTP greetings to do some security work.
When sendmail
KonquerorMany people use it. It is much better than some browsers. This article will teach you how to port konqueror.
1. Compile the QTE Library
Generally, If You Want To develop Qt/Embedded, you 'd better compile Qt/Embedded into two versions: the
KonquerorIt is an embedded browser that runs mainly on Linux and BSD operating systems. In this article, I will teach you how to port konqueror to the poly core development board.
Compile:
Tar-xvf konqueror-embedded-snapshot-20030705.tar.gz
Cd
Figure-Filezilla
File Transfer Protocol (FTP) is a widely used communication Protocol on the Internet. It transfers files (including uploading and downloading files) to Internet users) developed. To transfer FTP files, you must install software
IptablesAndStunThey are a friend. They help each other and help each other!
Iptables and stun
Stun Protocol (Rfc3489, see http://www.ietf.org/rfc/rfc3489.txt) will be roughly divided into four types of NAT, namely Full Cone, Restricted Cone, Port
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service