We recommend a good online Linux learning platform (without installing the system)

Find a good UNIX learning platform, do not install the system, just use SSH to log on to the system online, you can experience the functions of the system. If you do not want to install the system, you can log on online to solve your problem. The

Test results of inter-process communication latency of IPC latency in Linux

For more information, see vloveiyhttp: // ffown.sinaapp.com /? P = 40 CPU name: Intel (r) Xeon (r) CPU e5405 @ 2.00 GHzProcessor: 4CPU MHz: 1995.021 IPC latency: IPC type: messagesize: average latency:UNIX socket 10 k 9usLocalhost TCP 10 k

Create a function library in Linux (1)

1. Introduction How can we create our ownProgramFunction library?A "program function library" is simply a file that contains some compiledCodeAnd data, the compiled code and data can be used by other programs after the event.The program

Design and Implementation of Linux kernel (1)-features of Linux kernel development

Features of Linux kernel development Compared with applications in a user spaceProgramThere are many differences in development and kernel development. The most important differences include: 1) The C library cannot be accessed during kernel

Windows Linux File sync cwrsync Tool

Cwrsync client server synchronization software configuration from windows to Windows Prepare two machines. Server IP Address: 192.168.1.18 Client IP: 192.168.1.139 Download the cwrsync software: Server: cwrsync_server_2.0.10_installer.exe

Linux tar details

TarCommand nameTar-tar file management Program . The following sections describe their meanings one by one.OverviewTar [-] A -- catenate -- concatenate | C -- create | D -- diff -- Compare | r -- append | T -- list | u -- Update | X-extract -- get [-

Implementation of DNS-based multi-machine load balancing in Linux

A server was added to a customer two days ago. Jointly undertake the operation of a forum. However. To achieve load balancing. It is indeed difficult. I have tried several methods before, I. DNS rotation .. Advantages: simple implementation.

How to Use valgrind to detect memory leakage in Linux

This article from valgrind official site of the "Quick Start Guide", it is recommended that readers directly to their website for more detailed information: http://www.valgrind.org/docs/manual/quick-start.html#quick-start.prepare 1. Introduction The

Convenient socket read/write Viewer (socktop) in Linux)

Original article, reprinted Please note:Reposted from non-amateur Research on System Technology Link:Convenient socket read/write Viewer (socktop) in Linux) In the evening, Diao Liang said he was looking for a tool to investigate the sending and

Analysis of syscall and shellcode in Linux and FreeBSD

Analysis of syscall and shellcode in Linux and FreeBSD Created on:Article attributes: originalArticle submission: 7all (sgh81_at_163.com) = Www.cciss.cn. == Bbs.cciss.cn. =Analysis of syscall and shellcode in Linux and FreeBSD | = --------------- = [

Bare metal source Linux, do what you have never done (LFS + blfs for Linux cainiao)

I have been using Ubuntu for two years. From dapper-6.06 to the current hard-8.04 (it took only one month ). At the beginning, I felt that Linux technology was booming. Progress is very slow after a period of time. I think I am a beginner at the

Linux programming files and I/O (6): fcntl functions and file locks

I. fcntl Functions Function: manipulate the file descriptor to change the attributes of an opened file. Int fcntl (int fd, int cmd,.../* Arg */); The cmd value can be as follows: Copy file descriptorF_dupfd (long) Set/Get file descriptor

8 Linux commands that every programmer should know

Document directory Cat Sort Grep Cut Sed Uniq Find Less Every programmer, at a certain point in his career, will always find that he needs to know some Linux knowledge. I am not saying that you should be a Linux expert. I mean, you

Linux Device Driver 3 (2)-character device driver source code analysis (continued)

Some time ago, I have been engaged in the application software of the GPS navigation system. Recently, it has come to an end. I continue to pick up the driver of the Linux device! The last time I recorded the module initialization code, I checked

Use MMAP/dev/MEM to read and write Linux memory-root permission

Use MMAP/dev/MEM to read and write Linux memory Category: Linux Kernel 114 reading comments (1) Favorites Report Use hexedit/dev/MEM to display information in all physical memory. Use MMAP to map/dev/MEM, and then directly read and write it to

Install VM tools on the Linux Command Line

Log on to Linux as the root account, and choose VM> install VMware Tools. Open the terminal: Note: You must be case sensitive when entering "command" or "software name" under various Linux Command lines !!! [Root @ rd01 ~] # Cd/mnt/CDROM [Root @ rd0

How to Set environment variables in Linux

In Linux, how to set environment variables is summarized today. I am going to share it with you. I hope it will be helpful for your learning. I will not talk about it much, but I will see how it works... 1. Summary background Download and install

Linux Kernel cropping-No module support

Document directory 2.1 Linux Startup Process 2.2 role of initrd. img 2.3 grub. config file 2.4 Analysis 4.1 Linux Network Configuration 4.2 Kernel Panic 4.3 Ctrl + S 4.4 SELinux latency 4.5 make localyesconfig is unavailable 4.6

Europe's Linux power has been elevated. boolean computers signed a contract with Lenovo yesterday

Unlike the overbearing strategy of Microsoft, the American software giant, French IT vendors are very open and free to enter China. This time, they are "secure" as their own "stepping stone ". Yesterday, the French IT giant Boolean Group

Microsoft said the "Security myth" of Linux is about to be broken.

A senior executive of Microsoft recently said that it is an absurd idea to regard Linux as a security platform, according to a report from the Internet on September January 30. In fact, the development form and process of the Linux operating system

Total Pages: 5467 1 .... 607 608 609 610 611 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.