Previously encountered Kill (PID, 0) situation, due to the usual did not notice the KILL function of the shape parameter 0, do not know its role. A description of the next kill function is viewed with the Man 2 Kill command, and is found to detect
Own small website runs in the Aliyun ECS above, occasionally also analyzes own website server log, looks at the website the amount of visits. See if there's any black-and-wide sabotage! So collect, organize some server log Analysis command, we can
Linux Normal management, is the use of SSH service, this situation without the installation of PUREFTPD or VSFTPD software, such as the use of the SFTP function, to upload or download the files in the cloud host, recommend software: FLASHFXP or
In programming, one of the bitwise operator operators. In C + +, the shift operators have binocular shift operators:> (move right). An expression consisting of a shift operator also belongs to an arithmetic expression whose value is an arithmetic
I. BACKGROUNDSystem administrators often need SSH or telent to telnet to a Linux server, often running tasks that take a long time to complete, such as system backup, FTP transfer, and so on. Typically, we open a remote terminal window for each of
Under the circumstances, we operate and operation of the VPS, the server may be used to crontab timing task configuration, such as the timing of the restart of the server, scheduled backup data and other operations using or more. This is inseparable
Task Manager under Windows is not good (individuals prefer process Explorer some), but also convenient, can easily view the process, CPU, memory ... And it's easy to end the process.
There is no GUI Linux, there are commands to implement Windows
(1) Top mission
The code is as follows
Copy Code
$ top-u Oracle
1. Top command
The code is as follows
Copy Code
top-d 1-p pid [, pid ...]//set to delay 1s, default is delay 3s
1. The relationship between system call and library functionThe system call enters the kernel state from the user state through a soft interrupt int 0x80. Some functions in the function library call the system call.A function in a function library
This chapter explains how Linux systems keeps time and what needs to be done to avoid problems. Usually, you don't have to do anything about time, but it's better to understand it.
Time
Time measurement is based on the most regular natural
The latest version of Linux-madrake 8.0 brings together almost all the current Linux-related new products. The kernel uses 2.4.2, and the desktop system uses KDE 2.1. What do you think? Enough to make people move.
The 8.0 Beta uses a 2.1 desktop
Remote graphical interface control under Windows Everyone is already very adept at it.
The use of VNC to control the graphical interface under Linux is also very simple. VNC is made up of two parts: the client's application (Vncviewer) and the
I. Environmental description
The server of the unit uses Redhat Linux 9.0, the mail server uses SendMail 8.12.8; This server is placed in the intranet, through a Win2000 server as a gateway, connected to the Internet; The Gateway software uses
Most people who use Linux are familiar with wine programs, and wine programs are software that can use Windows without requiring Windows. Wine is still relatively mature, but wine can only run part of the program, and some programs in the runtime
Introduction to Linux environment variables
Environment variables: The bash shell uses an attribute called "Environment variable (environment variables)" To store information about the shell session and the working environment, which allows you to
Linux vsftpd Compile installation and configuration allows local users to log on to FTP
1, download vsftpd source
wget https://security.appspot.com/downloads/vsftpd-2.3.4.tar.gz
2, compile vsftpd source codeThe cp/lib64/libcap.so.1/lib/libcap.so.1
Objective
Make is a very important compilation command, both in Linux and in UNIX environments. Whether you are developing your own projects or installing applications, we often use make or make install. With make tools, we can break down large
Everyone has heard of Linux operating system! Linux was born in the early 90 of 20th century and became famous in the late 90 and began to be used by many people. The famous "open source" movement is to make new Linux programs continue to appear, so
For example, a directory has 1,2,3,4,5 these five files, now I need to delete all except 2 files, then I can use
Find. ! -name 2-exec rm-f {} \;
Of course, you can also cooperate with the-maxdepth to more accurate delete.
The following shows that
The grep command is used to find files whose content contains the specified template style. If the content of a file conforms to the specified template style, the default grep command displays the column containing the template style. If no file
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service