Linux operating system is an open source product, but also an open source software practice and application platform, in this platform there are countless open source software support, our common Apache, tomcat, MySQL, PHP and so on, the biggest
Docker is an Open-source tool that runs applications in Linux containers, a lightweight virtual machine. In addition to running applications, Docker also provides tools to simplify the deployment of complex applications by distributing applications
Multiple files under the/proc file system provide system information that is not specific to a particular process, but can be used throughout the system-wide context. The files that you can use vary depending on your system configuration. Command
Before introducing the System V shared memory knowledge, let's take a look at POSIX shared memory and series functions a little bit.
Shared memory is simply a real area of physical memory that can be mapped to a process's address space using some
1.1 Linux device driver classification
Linux device drivers occupy a large proportion of the Linux kernel source code, and the length of the source code is increasing, mainly the increase of the driver. During the continuous upgrade of Linux kernel,
Let's take a look at the technique of using the ls,grep and WC commands to count the number of files of a specified type in a directory. The interaction between commands is done through named pipes.
grep– a command that a user searches based on a
Linux Mint has two versions, cinnamon version is more beautiful, consumption resources are high, mate version of the resource requirements are lower, if you install the cinnamon version, want to switch to the Mate version and do not want to
Usage: TR [options] ... SET1 [SET2]
Replaces, shrinks, and/or deletes characters from standard input and writes the results to standard output.
-C,-C,--complement first to complement SET1
-D,--delete deletes the contents of the matching SET1 and
A classic example of concurrent access to a server using a multiple process approach.
Program Implementation function:
1. The client reads a line of text from the standard input and sends it to the server.
2. The server receives the text sent by
Standard Linux system How to increase the swap partition space small? Quasi-linux installation, swap partition is twice times the size of memory, if the addition of memory, the swap partition will also increase. If you increase the 1G memory, the
The knowledge that Linux enters Single-user mode (single) is a must for administrators because Single-user mode is a way to modify the system configuration or implement maintenance without affecting other users (or other users). Single-user mode is
One, John the Ripper
In Linux, passwords are stored in hash format, you cannot reverse the analysis of a password from the hash table, but you can compare it to a set of word hashes, and then guess the password if the same. So it is critical to
Blogs, wikis, podcasts (Podcast), and RSS feeds have changed people's reliance on traditional portals, so people will change the experience of traditional email apps from Gmail. At the end of last century, when the first generation of internet arose,
1. Login account Management
The management of login user accounts under Linux is achieved through the utmp and wtmp tools. WTMP also records information about system reboots and system state changes. All data related to UTMP and wtmp are stored
apache| Server Introduction
Internet/intranet based on web technology has been widely used in recent years, Intranet is based on TCP/IP protocol, the web as the core intranet, the user through Low-cost, An Easy-to-use client browser can access the
Iv. Major Software Installation
As I said before, it is my custom to install a kernel and compile the system when installing the system, and then to install the other software after a clean system is clear. Another point, unless the source version
User authorization and access control
You may have encountered this situation when you visit certain websites, when you click on a connection, your browser will pop up an authentication dialog box, ask for an account and password, if not, you can
For Linux master seemingly simple network configuration problem, perhaps to say why it is not easy, so there are still too many beginners wandering outside the door is not strange,
Here, the old boy teacher spent some time summarizing this document
Installation Environment and requirements:
1. System: RedHat AS4 (UPDATE2)
2. Package Requirements: cacti-0.8.6j,mysql-5.0.20,php-5.2.0,apache2.0.58 (all of the above are source packages).
To install the configuration process:
1. Install apache2.
Here's how to use Message Queuing for interprocess communication, and Message Queuing has a lot in common with named pipes. For more information about named pipes, see my other article: Linux interprocess Communication--Using Named pipes
First,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service