sudo fdisk-lsudo fdisk/dev/sdbHelp commandCommand (mfor help): mCommand ActionA toggle a bootable flagb Edit BSD DisklabelC Toggle the DOS compatibility flagD Delete a partitionL list known partition typesM Print this menun Add a new partitiono Create a new empty DOS partition tableP Print the partition tableQ Quit without saving changess create a new empty Sun Disklabelt change a partition ' s system IDU Change display/entry unitsV Verify the partition tableW Write table to disk and exitX Extra
hard drive1. Check the current drive usage status:Df-h2. To view the new hard drive, DISK/DEV/SDA 4T hard drive is required to mount.#fdisk –lDevice Boot Start End Blocks Id System/DEV/SDB1 * 1 512000 LinuxPartition 1 does not end on cylinder boundary./DEV/SDB2 36405 291908608 8e Linux LVMdisk/dev/sda:4000.8 GB, 4000787030016 bytes255 heads, Sectors/track, 486401 cylindersUnits = Cylinders of 16065 * 8225280 bytesSector size (logical/physical): bytes/512
of 6 is similar to that of 4, but the volume is reduced. Therefore, we recommend that you use 6 to set the dynamic bit rate.
The configuration parameters of audio and video during the conversion process are described above. The Common commands for conversion are as follows:High quality: FFMPEG-I infile-AB 128-acodec libmp 3lame-Ac 1-ar 22050-r 29.97-qscale 6-y OUTFILELow Quality: FFMPEG-I infile-AB 128-acodec libmp 3lame-Ac 1-ar 22050-r 29.97-B 512-y
From: http://www.dz3w.com/mcu/c51src/0079894.html
Data read/write method and source code of NAND Flash
The data in NAND Flash is bitIn memory cell. Generally, only one bit can be stored in a cell. These cells are connected to bits in 8 or 16 units.Line to form the so-called byte (X8)/Word (x16), which is the location width of the NAND device. These lines form a pageFlash has multiple structures. The NAND Flash I use is k9f1208. The following content is for Samsung's k9f1208u0m). Each page cont
Algorithm series 9 MD5, algorithm 9 md5
MD5 is the Message-Digest Algorithm 5 (Information-Digest Algorithm 5), which is used to ensure the integrity and consistency of information transmission. It is one of the widely used Hash Algorithms in computers (also translated digest algorithms and hash algorithms). mainstream programming languages generally have MD5 implementations.Computation of data (such as Chinese characters) into another fixed length value is the basic principle of the hash algor
Add partitions in non-interactive mode and add partitions in interactive mode
Add partitions in non-interactive mode
Method 1
Add a partition under/deb/sdb, in fact, the location is 1 to 1000 M, the second partition location is 1001 to 3000 M, the location cannot be specified Error
parted /dev/sdb mkpart primary 1 1000Mparted /dev/sdb mkpart primary 1001 3000M
Method 2
(1 write the command you want to input in the partedcommand line into a file, such as part.txt
(2 after part.txt, t
, ecc_code [I], ecc_calc [I]);
If (STAT
MTD-> ecc_stats.failed ++;
Else
MTD-> ecc_stats.corrected + = Stat;
It seems that an ECC error has occurred, but I use hardware ECC verification. How can I see an ECC verification error in almost all pages?
Root @ dm368-evm :~ # Flash_eraseall/dev/mtd3
Root @ dm368-evm :~ # Ubiattach/dev/ubi_ctrl-M 3
UBI: attaching mtd3 to ubi0
UBI: Physical eraseblock size: 131072 bytes (128 kib)
UBI: Logical eraseblock size: 129024 bytes
UBI: smallest flash I/O unit:
Guide
The servers we manage may be running out of disk space as the volume of business grows, such as: the lack of hard disk space for shared file servers, when we need to increase disk space to meet online business, or when we are using Linux, Sometimes because of improper partition when installing the system, there is not enough partition space, and some of the excess partition space can be used to dynamically adjust the partition size using the Fdisk partition tool;
Expand dis
In the previous article we analyzed the principle of Sha, and took SHA1 as an example to implement the relevant algorithm, in this one we will further analyze SHA2 and realize it.1 , SHA Brief IntroductionAs we have already explained in the previous chapters, SHA actually includes a series of algorithms, namely SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. What we call SHA2 is actually a general term in the following 4. The data for various SHA algor
Chown commandChown is a command used to set file owners and file associations in Unix systems. Super User Permissions are required to execute this command. OnlyOnly the file owner of a Super User and a group can change the file association group. Non-privileged users (non-Super Users) may need to set an association groupUse the chgrp command.Usage
# chown root /var/run/httpd.pid
Set the owner of/var/run/httpd. pid to root.
# chown rob:developers strace.log
Set strace. log owner to rob and the fi
The USB interface reads and writes files, that is, the USB large-capacity storage device, that is, the USB flash disk. The project mainly reads data from the SD card of the Development Board as a USB flash drive.
The knowledge involved includes the USB protocol, SCSI interface, and BOT protocol.
This article briefly records the debugging process as follows:
I. Data Analysis on serial port printing: (LBA is the fan area code, Len is the slice length, and one slice is
: not presentBSD: not presentAPM: not presentGPT: not presentCreating new GPT entries.Disk /dev/sdd: 10485760 sectors, 5.0 GiBLogical sector size: 512 bytesDisk identifier (GUID): 5ECA06B5-A105-4DCB-B6DD-96A13D0C1A93Partition table holds up to 128 entriesFirst usable sector is 34, last usable sector is 10485726Partitions will be aligned on 2048-sector boundariesTotal free space is 10485693 sectors (5.0 GiB)Number Start (sector) End (sector) Size Code
512 bytes, even if the size of the block created by the file system is 4096 bytes, the block calculation here is always 512 bytes. for example, if we write a byte to this file, this file actually occupies the size of a block when a file system is created. The holes in the file are used to save the actual storage space. the holes do not occupy the actual disk blocks. the isize display size contains the hole
Connection closed by foreign host.
On this basis, you can write a simple SMTP class.
Class stmp{
Private $mailcfg =array ();
Private $error _msg= ';
function __construct ($mailcfg) {
$this->mailcfg= $mailcfg;
}
Public function Send ($mail) {
$mailcfg = $this->mailcfg;
if (! $fp = Fsockopen ($mailcfg [' Server '], $mailcfg [' Port '], $errno, $ERRSTR, 30)} {
return $this->error ("($mailcfg [Server]:
I believe many new users who want to learn linux are wondering what linux learning courses are good. The following small series will collect and organize several important tutorials for you to learn, if you want to learn more, go to the wdlinux school to find more tutorials.LinuxMount NTFSPartitioning and attaching MethodsIf your disk is in NTFS format, follow these steps to skip the next step.First download a NTFS-3G: Http://www.tuxera.com/community/ntfs-3g-download/Upload the downloaded packag
, with a good one-way iterative function, you can use the appropriate iterative method to construct the iterative hash function, the hash function of the security design theory has the following two points: one is the one-way function, and the other is the randomness of function mapping. The common hash algorithm is MD-5, SHA and so on.Introduction to the 2.SHA1 algorithmSHA (Security hash algorithm) is a standard hash algorithm for the NIST and NSA designs in the United States, originally publi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.