The meaning of each file under the Linux/proc/pid directory

attrProperties of the processCmdLine:Commands to execute when the process startsCwdsoft chain pointing to the current working directory of the processll CWD is a soft connection.EnvironThe environment variables used by the process execution, the

i.mx6 linux tslib Corrupt calibration data

i.mx6 linux tslib corrupt calibration data one, tslib error corrupt calibration data Two, solution: ... if [-f/etc/pointercal];then " i.mx6 touchscreen have calibrate! " Else /usr/bin/ts_calibrate # must pay

Linux for RDP access

Remote access to the Linux system, we often have terminal ssh, graphical interface vnc, but VNC security is not enough, and not fluent. In contrast, I think RDP is better, and it's easy to take advantage of Windows Remote Desktop access.1.

SECURECRT Accessing the Development Board Linux system

Objective:Recently in the use of OK6410 Development Board running Linux system, often on the terminal to knock some instructions, but the Development Board screen is too small to use it very inconvenient, so the use of a terminal can run in the

Linux compiled Wireshark and support for LUA plugins

Because of the work required, I have written a wireshark plugin that resolves the internal communication protocol, and the plugin was written in Lua, so the Wireshark had to support LUA access.Typically, wireshark in Windows is supported with LUA

One Linux command per day (1): Top command

The top command is a common performance analysis tool under Linux that shows the resource usage of individual processes in the system in real time, similar to the Task Manager for Windows. Here is a detailed description of how it is used. Top is a

Two ways to open ISO files under Linux

Method one, Mount Mount command under LinuxThe software disk downloaded on the Internet is in ISO format and can be read in the document without being carved into a disc. No decompression.In terminal with Mount-o loop/mnt/*/1.iso/mnt/cdrom command, (

Beginner Essentials: Learn some of the Linux recommendations

Yue inlay 2012-09-26 14:03:21With the expansion of Linux applications many friends are beginning to touch Linux, depending on the experience of learning windows there is often a sense of confusion: where to start learning. Here are some suggestions

Linux socket Programming-interprocess communication

  First, what is the socketThe socket interface is a api,socket interface for TCP/IP network traffic that defines many functions or routines that can be used to develop applications on a TCP/IP network.There are two types of sockets: Streaming

Linux error First bullet:/bin/sh^m:bad interpreter:no such file or directory

Write a shell script from Windows Sublime, move to Linux, find an error,/bin/sh^m:bad interpreter:no such file or directory cause: This is caused by different system encoding formats: in WI The. sh file that is edited in the ndows system may have

Linux boot auto empty/tmp directory What's going on?

That's depends on your distribution. On some system, it's deleted only when booted, others has cronjobs running deleting items older than n hours. On Debian-like systems:on boot (the rules is defined in /etc/default/rcS ). On Redhat-like

18 Commands & Tools to help you locate Linux performance issues

ack

1.TopThe top command is a performance monitor that displays all the live processes that are running and active in a certain order, and periodically updates the display results. This command shows CPU usage, memory usage, swap memory usage size,

Use FPM tool to create an RPM package

Use FPM tool to create an RPM package This rpm package is made using the fpm tool, and FPM is very easy to use. This command can make the installation and uninstallation of the rpm package more elegant. You can make some preparations before

How to Prevent ssh remote brute-force cracking in linux and how to configure and apply the fail2ban Software

How to Prevent ssh remote brute-force cracking in linux and how to configure and apply the fail2ban SoftwareI. modifying parameters makes brute-force cracking almost impossible. password settings must be complex enough. Try to have uppercase letters,

Vim tutorial, vim

Vim tutorial, vim Vim is a powerful editor with many commands. This document will not be detailed in this tutorial. The purpose of this tutorial is to describe some necessary basic commands. With these commands, you can easily use vim as a universal

How to Learn about camera driver in Linux: (2) how to analyze camera driver by Using Virtual Drive vivi, linuxvivi

How to Learn about camera driver in Linux: (2) how to analyze camera driver by Using Virtual Drive vivi, linuxvivi 1. Run the "strace-o xawtv. log xawtv" command to obtain the following call information:// 1 ~ 7 is called in v4l2_open1. open2. ioctl

Example of the passwd command in 10 Linux

Example of the passwd command in 10 Linux As shown in the passwd command name, it is used to change the password of the System user. If the passwd command is executed by a non-root user, it will ask the current user's password and then set the new

Download from linux and linux

Download from linux and linux[Software Installation Method in linux] 1. rpm package installation method This method is consistent with the installation method of exe executable program files in windows. In windows, we install the software through

If the hard disk is larger than 2 TB, use parted to create a partition and install centos6.5.

If the hard disk is larger than 2 TB, use parted to create a partition and install centos6.5. Centos has never been installed with a hard disk capacity greater than 2.6. We just got a new machine. Like in normal times, when we installed centos, the

CentOS 6.7 compilation and installation of LAMP

CentOS 6.7 compilation and installation of LAMP CentOS 6.7 compilation and installation of LAMP I. Prepare the environment and Software Package [Root @ bkjia ~] # Cat/etc/RedHat-releaseCentOS release 6.7 (Final)[Root @ bkjia ~] # Uname-rm2.6.32-573.

Total Pages: 5467 1 .... 784 785 786 787 788 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.