1. PrefaceTest the execution time of a program, including user CPU time, system CPU time, and clock time. Before the time is obtained before the main function of the program is implemented with the time function, this can only roughly calculate the
I. Common compressed files Windows. rar. zip. 7zLinux. Zip,.gz,.bz2,.xz,.tar.gz,.tar.bz2,.tar.xzFile compression saves memory and can save transfer speedIi.. gzipFirst, create a folder/tmp/d6z/Found some big files to write 1.txtFor examplefind /etc/
Recently made an SPI device driver upgrade from board-level device driver to device-tree device driver, which needs to understand the parsing of the SPI Device tree code.
The device tree is configured as follows:503&spi0 {504Status
Iptables is an important means of access control in Linux and is an important part of Linux firewall system. Here are some common operating instructions for iptables firewall rules. The following operations are based on CentOS and should be similar
One, Linux installationFirst I downloaded the VirtualBox 5.2.6 and Ubuntu 16.04.3 according to the steps the teacher gave me. There is a simple process download, but there are still some problems in the process of downloading.1, VirtualBox can only
20165230 pre-Job 3 Linux installation and learning install Linux operating systemThrough the learning practice based on the VirtualBox virtual machine installed Ubuntu Graphics tutorial, started the installation of virtual machines, according to the
After entering the new 2018 years, it is also expected that the Linux introductory learning route should be updated. In the past year, the Linux version has been updated a lot of versions, and many new technologies have impacted the application
System environment: CENTOS6, 7Command information:1, LSBLK list partition information, you can view the partition of the light in the directory and usage (read the partition table information in memory)2. Fdisk is used to create MBR partitions (you
Linux User and User group managementLinux system is a multi-user multi-tasking time-sharing system, any user who wants to use system resources must first request an account from the system administrator and then enter the system as this account.On
File directory/represents the root directory the entire system is all in the root directory/boot Store Boot configuration file recommendations, separate into a partition/dev Device file directory such as: CD, HDD/etc store all the configuration
Virtual machine Installation
In the installation of VirtualBox when my computer has not opened the official website, fortunately, there can be opened later, so I successfully downloaded the good VirtualBox. The following error occurred
Redis persistence CacheRedis persistent cache:
I. snapsho (snapshot method-"binary file)
① Periodically generate snapshots
② Generate snapshots quantitatively
Observe the settings of the SNAPSHOTTING setting module in the redis configuration file.
Linux basics-shutdown and restart commands such as shutdown and reboot, shutdownrebootI. Functions of the shutdown and restart command
I believe that people who have been in touch with computers, especially for windows systems, will feel a little
Sickle: A high-quality ShellCode development tool is recommended.
Sickle is a shellcode development tool used to accelerate the steps required to create a normal shellcode.
Sickle provides the following functions:
Identify the bad characters that
Common commands in linux and Common commands in linux
Common commands in linux. We should first learn some very basic commands, but the usage is very high. Otherwise, the subsequent courses will not be available. Without a doubt, these commands must
Linux memory management series 4: linux memory management series
The previous three sections focus on how to allocate kernel space memory in the kernel. The memory of the user space of the process is also controlled by the kernel. The address memory
CentOS sets the network (modify IP address & modify gateway & modify DNS), and centos network modifies ip Address
CentOS IP address Modification
# Ifconfig eth0 192.168.1.80
In this way, the IP address is changed192.168.1.80(If you find that the
How to obtain a Kubernetes image in China
I. background
As we all know, due to domestic network reasons, when building a Kubernetes environment, we often encounter situations where necessary images cannot be found. After all, it is not a good way to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service