CTime refers to the change time.Mtime refers to modify time.The difference between Mtime and CTime is that only if the contents of the file are modified, the mtime of the file will be updated, and the renaming of the file and the owner of the
linux-pam Authentication ModuleWhen the user accesses the server, one of the server's service programs sends the user's request to the PAM module for authentication. The PAM modules that correspond to different server applications are also different.
A process can system invoke mmap () to map the contents of an open file to its user space with the following user interface:Mmap (void *start, size_t length, int prot, int flags, int fd, off_t offset).The parameter fd represents an open file, offset
The main understanding of the Linux process stack and function of the stack frame differences and contactis depicted in a Linux process structure diagram, where this article wants to focus on the stack as shown in the 0xc0000000 address decrement of
tree--lists directories and files in tree formUnder Linux, the colors of different files represent meaningBlue--CatalogueWhite--General documents, text, configuration, source code, etc.Light blue--linked files, mainly files created by the LN
Subversion ( svn) is a version management tool that has risen in recent years and is the successor to CVS. SVN server has 2 modes of operation: standalone server and Apache. There are pros and cons to each of the 2 ways.
file:///
1. Inverted quotation marks indicate commandecho now is ' date ' or Echo now is $ (date)2. Single quotation markName=andy no problem,If you want to Name=andy Niu, error: Bash:niu:command not found, the program considers the first space after the
In some large companies often appear such a situation: the company or some institutions of internal business System Application server and data are made of multi-machine cluster deployment and basically are Linux system, and are internal network,
Ref:http://www.blogjava.net/fjzag/articles/317773.htmlProc File systemThe/proc file system is a pseudo-file system that only exists in memory and does not occupy external memory space. It provides the interface for the kernel to communicate with the
In the previous three articles, we briefly introduced the Linux system user management, file operation and so on, are relatively superficial basic operations. We're going to go into this section, from the filesystem we want to see the disk system.
Basic Operations Command:
PS-AJX/-AUX/-EF view inter-process status/relationships
Top dynamic display of processes in the system
Nice run/renice by the specified priority change the priority of the running process
Kill-9 Kill Process
OverviewA virtual device is an abstraction built on one or more real devices. The correspondence between a virtual device and a real device is many-to-many, but not all combinations can be defined or supported by the kernel. Some of the more
bo Master profile: Bo Master graduated from a general undergraduate in Shandong, the study is not computer science, the foundation is relatively weak. September 14 enrolled in the Amin Linux training, the current course is about to end, feel Amin
Directory structure
Directory structure
Hosts file
Hosts format configuration
Hosts file format
Hosts file role
Hosts fileHosts--the static table lookup for host name (host name query for still tables).The
Virtual Linux in VMware Workstation Shares the Internet through NAT
Under the VMware Workstation Virtual Machine, Linux virtual machines need to access the Internet, which is usually in the bridging mode. However, my computer has different Internet
How to install new fonts on Ubuntu 14.04 and 14.10
Ubuntu has many fonts by default. But sometimes you may not be satisfied with these fonts. Therefore, you can install additional fonts on Ubuntu 14.04, 14.10, or other Linux systems such as Linux
Install the system rpm package required by Websphere MB in Linux
Linux is rarely used. This time, the user has a job to build Websphere MB/MQ in Linux. I tried it several times but I couldn't do it. After many inquiries, I found that the rpm
Simple use of GPG in Linux
This article briefly describes how to encrypt and use GPG in Linux.
1. Generate a key
Gpg-gen-key
The following screen may appear,
> This information prompts you to create random activities on the system. You can
Ruan Yifeng: Make command tutorial
The code is converted into an executable file, called compile. compile this file first, or compile that file first (that is, the compilation schedule), called build ).
Make is the most commonly used build tool. It
One-click LAMP yum installation script in CentOS
Applicable environment:
Supported systems: CentOS/Redhat/Fedora
Memory Requirements: ≥ 64 M
Hard Disk requirements: 2 GB or more remaining space
The software source and Internet connection must
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service