In linux, I use the common software-general Linux technology-Linux technology and application information. The following is a detailed description. To use linux, you only need to meet your requirements. The commonly used software is as follows (add at any time ):
Image interface gnome
Stardict (stardict 2.4.8)
Web browser Iceweasel (2.0.0.3) Firefox variant
-config checking whether Libxml build works ... (cached) Yes checking for XSL support ... yes, shared configure:error:xslt-config not found. Please reinstall the LIBXSLT >= 1.1.0 distributionYum-y Install Libxslt-develConfigure:error:xml2-config not found. Please check your LIBXML2 installation.Yum-y Install Libxml2-develChecking for PCRE headers location ... configure:error:Could not find pcre.h in/usrYum-y Install Pcre-develConfigure:error:Cannot find MySQL header files under Yes. Note that th
Tags: sub too xampp corners Postman Cat Management Suite DevelopmentToolbox appJetBrains Development Toolkit, including phpstorm idea and other development toolsPostmaninterface Debugging tools, there are plug-in version and a separate app two kinds. Similar pawSublimeText editor, similar to notepad++CornerstoneSVN version management toolBeyond CompareText Difference comparison ToolSmartgitGIT management toolsMAMPPHP Development Kit, similar to XAMPP, etc.Sequel ProMySQL Graphics management tool
Architecture Software Development
Abstract:During normal development, you may encounter bottlenecks in various aspects of development, such as performance and system. Have you summarized them? Let's take a look at the classification of these system bottlenecks in this article!
In Zen and the art of scaling-A koan and epigram approach, RussellSullivan makes a very interesting conclusion: 20 traditional system bottlenecks are
used for publishing the web, which is generally 80, in this way, Wingate opens an HTTP proxy service with port 80.2. Go to the bindings page and select allow connections coming in on any Internet connections as the first option.3. On the non-proxy requests page, reject request is selected by default and changed to pipe request through to predetermined. In the server and port columns below, enter the IP address and port (for example, 192.168.0.10 and 80) of the machine that provides Web Services
privileges the on library name. Table name to ' user name ' @' IP address ' identified by ' password ' with
grant
option; flush privileges;
Supplemental Note: library name: The name of the database to be accessed remotely, all databases using "*"Table name: The name of the table under the database to be accessed remotely, all tables using "*"Username: The name of the user to assign to the remote access permissionIP addre
trustVim/etc/sysconfig/iptables//Edit FirewallAdd content # Redis Port-A input-m state--state new-m tcp-p tcp--dport 6379-j ACCEPT //redis default port is 6379 Service iptables restart//restart firewall 13, after configuring the firewall, the external server is still inaccessible, need to configure the redis.conf(1) The bind 127.0.0.1 is commented out, otherwise the external server cannot access (so that you can arbitrarily access without setting the specific IP) (2) Set the pro
Article Title: installation, peripheral mounting, and disk management of common Linux software packages. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
1. Types of common software
steps are as follows.(1) Right-click the title bar of the command Prompt window and select the "Properties" command from the drop-down menu that appears.(2) Select the Options Feature tab, select the Quick edit mode command in edit options, and click the OK button.Once set, you can quickly copy and paste text in the Command Prompt window, as follows.(1) Press and hold the left mouse button to select the text content in the command Prompt window, then click on the shortcut menu to select the "Co
Common vulnerabilities in server systems and software
Vulnerability Name
Allow traceroute detection
The Remote WWW service supports trace requests
Remote WWW service provides support for WebDAV
/robots.txt file exists on the remote Web server
Remote VNC service is running
Remote HTTP server type and version inf
Full name
Alias
Remarks
Argument
ARG
Parameter
Para
Error
Err
Vertical
V
Vertical
Horizontal
H
Horizontal
Buffer
Buf
Clock
CLK
Command
CMD
Compare
CMP
Configuration
Cfg
Device
Dev
Hexadecimal
HEX
Increment
INC
Ascending Order
ASC
Ascending (commonly used in SQL)
D
Reprinted: http://www.csdn.net/article/2012-11-08/2811571-Big-List-Of-20-Common-Bottlenecks
In Zen and the art of scaling-A koan and epigram approach, RussellSullivan makes a very interesting conclusion: 20 traditional system bottlenecks are common in software development. It sounds like there are 20 plots and it depends on how you plan these stories, it may be
It has always been a dream: How nice it would be to discover some vulnerabilities or bugs! So I am studying Computer blind and blind all day. What do I study? Study how to break through the firewall (the firewall here refers to a software-based personal firewall, and the hardware is not conditional .) Hey, you don't have to mention it. I did not have a white research, but I have even discovered common fault
inherit from the IControl interface;2. All types that implement the self-icontrol interface and their subclasses;3. Generic list attribute (ilistAt the same time we are urging ourselves, fast? Do Enterprise Cloud Disk We do not have the first advantage, originally than other late start 2 years, now want to catch up quickly. Therefore, we are very anxious every day. A day without doing anything, my heart is very panic.Static methods, like static variables, are owned by the class, executed at the
For beginners============================================1. Client:SECURECRT 7.1 or putty2.FTPThe main is to upload files to Linux, otherwise we will be inside the virtual machine copy/pasteWincp=======================The SSH service must be configured to connect through it (SSH an encrypted channel for data transfer)=======================Execute command:It is best to bring the full path so that the execution command will always succeedOtherwise, it is configured into the environment variable (
width is too small, causing the first open, some content is hidden behind, but this width can be manually adjusted. Development feels that the problem is small, does not affect the function, but also has the solution, therefore does not think is the bug. This time, it is necessary to play the test of the ability, sweet a little, say good words, gentle attitude. Since it is a small problem, it must not be difficult to solve, patiently urged the development of the rehabilitation of the good. Urge
The Kali rolling is now updated in real time! Attached: Git.kali.org/gitweb/kali Software Library!Can be found in the inside or download it yourself!Apt-get UpdateApt-get Install the software you are installing!Here are some examples:Apt-get Install Open-vm-tools-desktopApt-get Install FCITX fcitx-table-wbpy Chinese Input methodApt-get Install ICEWEASEL-L10N-ZH-CN Chinese browserAnd there's debain, we can u
AIX is connected to IBM storage. Common commands for multi-path software: view the storage disk Path 1. view the storage disk path of MPIO # lspath (applicable to MPIO path queries for all storage) # mpio_get_config-Av (applicable to the MPIO path query of DS3K/DS4K) 2. view the path of the RDAC storage disk # fget_config-Av (applicable to the RDAC path query of DS3K/DS4K) 3. view the path of the SDDPCM sto
1. UML modeling softwareSudo apt-Get install umbrello
(Note: I think this is a bit big. My installation information is as follows:
...............................
Download the 66.8 MB software package.After decompression, 229 MB of extra space is consumed.Do you want to continue? [Y/n] y.................................)
2. flowchart rendering softwareSudo apt-Get install Dia
3. computer typing exercise softwareSudo apt-Get install tuxt
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.