Multi-channel multiplexing
Function description
We all know that the Fcntl () function solves the problem of file sharing, if you don't know, please see: http://blog.csdn.net/mybelief321/article/details/8993138. The next step is to handle I/O
Exit () and _exit () functions
Function description
The create process uses the fork () function, the execution process uses the EXEC function family, and the exit () and the _exit () function are used to terminate the process. When a process
I. Concepts of users and groups
1. Understanding Linux multiuser, multitasking features
Linux is a real, full multi-user multitasking operating system, multi-user multitasking is to build multiple users on the system, and multiple users can log on
Pthread_server.c
/*************************************************** * FileName: pthread_server.c * File Description: Create a child thread to receive the client's data ***************** /#include
While Linux operating systems are increasingly popular with businesses. Compared with the Windows operating system, it has the characteristics of free, stable and so on. However, it is still an impossible task to popularize the Linux operating
Introduced
Do you know that linux® is now the world's second server operating system? Today, does your application run on Linux? If not, this article will give you tips and tricks to guide you when porting your application to Linux. This article is
People who have played Linux know that in the original system installed Linux, the system boot will show the Linux boot management interface, when we deleted the Linux one day, but found that the Linux boot management interface is still in, then we
For many people, migrating to Linux is a pleasure. For others, it was a nightmare. Especially for some administrators who just stepped into Linux management, if you don't avoid some common mistakes, it's easy to pose a security risk to your
The network content "pushes" the technology is the new generation Internet development inevitable trend. It provides a lot of convenience for information publishers and receivers, and greatly reduces the cost of information flow.
The advent of RSS
The clock speed not only can update the system clock from the NTP server, but it can also calculate the clock frequency and manage the system time accordingly.
Many people who want to keep an accurate computer clock use network time Protocol (NTP)
Linux one-click to install the Web environment full introduction
Tools: update_source.sh
Uploading download files using the SFTP feature
Tools: auto_fdisk.sh
Teach you nginx how to add pseudo static
Tools: install_vnc_server.sh
REDHAT5 and
Do you want to know what your server is doing? Then you need to know the basic commands described in this article. Once you've mastered these commands, you're laying the groundwork for becoming a professional Linux system administrator.
You can use
Mpstat
Mpstat is the abbreviation of multiprocessor statistics, a real-time system monitoring tool. Some statistical information about the report and CPU, which is stored in the/proc/stat file. In a CPUs system, it is not only possible to view the
Installing the JDK in Linux is as follows:
1. Download the JDK from the internet first, download it and put it in the/home directory, but other places are OK.
Enter the installation directory
#cd/home
#cp jdk-1_6_0_03-linux-i586.rpm/usr/local
First, firewall overview
Network firewall technology is a special network interconnection device which is used to strengthen the access control between the network, to prevent the external network users from entering the internal network through the
When dealing with a variety of failures in a Linux system, the symptoms of the failure are the first to be discovered, and the cause of this failure is the key to eventual troubleshooting. Familiar with the Linux system log management, understanding
Linux has a pam_tally2.so Pam module that limits the number of user logon failures and, if the number reaches the set threshold, locks the user.
Compiling Pam's configuration file
# Vim/etc/pam.d/login
#%pam-1.0
auth required pam_tally2.so
As mentioned above, the process of communication between processes is on the same computer, while the process of communicating using the socket can be a process of the same computer or a process on a different computer that can be connected over a
Create a ext2 file of the specified size
Generate a 1G space of a specified size using DD
DD If=/dev/zero of=/home/foobar bs=1m count=1000 create 1G size space
Format created space (at this point the file type is ext2)
Mke2fs-vfm0/home/foobar
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service