This article mainly introduces some Linux shell in the relevant knowledge summary, so that the basics of Linux introductory learning, need friends can refer to the
Once a file is created, it has three ways to access it:
1) Read, you can display
The Iostat command can provide rich IO performance status data. Iostat can collect and display statistics on system input/output storage devices. Frequently used to track storage device performance issues, including devices, local disks, and remote
Shared memory: A portion of the physical memory is shared as multiple processes.
Shared memory is one of the fastest ways to share data between processes, a process writes data to a shared memory area, and all processes that share that memory can
Use the Find command to help you locate files that need to be cleaned up.
A problem that almost haunts all file systems-including Unix and others-is the accumulation of files. Few people are willing to take the time to clean up files and file
Qt Creator supports Chinese, starts faster than Eclipse, NetBeans, and has a better interface, and works well with input method FCITX (cursor following).
You can use the QT creator Contemporary Code Editor as a vim helper, the advantage of which is
Find is one of our most common Linux commands, but we generally look for more than just look, there will be further operations, this time the role of exec is revealed.
EXEC explained:
The-exec parameter is followed by the command command, which
What is the reverse proxy?
A reverse proxy is a proxy server that accepts a connection request on the Internet and then forwards the request to a server on the internal (or other) network and returns the results obtained from the server to the
1. What is a process
A process is a program that is in execution and a generic term for all the resources it contains, including virtual processor, dummy space, registers, stacks, global data segments, and so on.
In Linux, each process is created
first, the RPM package installation method steps:
1, find the appropriate software packages, such as soft.version.rpm, download to a directory of this machine;
2, open a terminal, Su-as root user;
3, CD soft.version.rpm in the directory;
4,
First step:
Go to the/etc/samba directory, back up the smb.conf, then delete the file, rebuild one yourself, and enter the following
The code is as follows:
[Global]
Workgroup = Workgroup
NetBIOS name = www.e2fsck.org # Here's the focus, the
In the Linux system there are many command programs to assist the normal and convenient operation of the system, then there is a system called the GDB command program, then we today to understand the knowledge of the GDB command!
First, the general
Linux generates random password methods:
Strings/dev/urandom | Grep-o ' [[: Alnum:]] ' | Head-n 30 | Tr-d ' n '; Echo
Linux Modify Password Method:
passwd Root
Then enter the new password two times
Root can be replaced by the user who needs to
Putty is a free, Windows 32 platform Telnet, rlogin, and SSH client, but the functionality is no less than the commercial Telnet tool.
Using it for remote management of Linux VPS is very useful, its main advantages are as follows:
Completely free;
In an accidental case, know about [Svn][linux][uuid] mismatch problem, installation is not successful, this can do! To play the game but can't play, so today the problem to see what solution!
Today began to play Sina app engine.
After installing
In Linux gateway mode, the wired LAN and Wireless LAN share network segments are interconnected within the LAN:The idea is actually very simple: will be virtual out of a bridge port, the corresponding wired LAN and wireless LAN are bound to the
Workaround: Log in as root in the console, modify the/etc/ssh/sshd_config file with VI or another editor,#PasswordAuthentication NoChange one line intoPasswordauthentication YesExit after saving the changes. To re-start sshd:myhost# kill-hup '
First, configuration scenario: Due to machine aging, considering the reliability of the machine, decided to replace the server, because the old server is 3 network (telecommunications, Unicom, mobile), so on the new machine needs to configure 3
Recently, it is quite new to see that the report generated by the Java program is often sent with the MAIL/MAILX command in the project. The following is a brief introduction to the following MAIL/MAILX command usage. This article has the same
Objective:In Linux, when a GPIO is configured as a serial port or other function, it is no longer possible to export the Gpio (echo xx >/sys/class/gpio/export) in the file system, which is not allowed because your PIN is already in use as a function
The Linux kernel introduces the concept of the device tree starting from 3.x, which is used to separate the driver code from the device information . Before the device tree appears, all specific information about the device is written in the drive,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service