I'm neutral about Linux, and I think the reason Linux has been slow for so many years is because the desktop is bad or not good enough, so I prefer Ubuntu. As a result of the previous project is makefile, I personally do not like makefile, because he looks more laborious, and compiled after the problem debugging is a big problem, not everyone is proficient in gdb, and VI to start more difficult. So will the
Good Linux kernel reference books-general Linux technology-Linux programming and kernel information. The following is a detailed description. A. Linux Device Drivers, 2nd Edition, with Chinese Translations
B. Understanding the Linux
different, their compiler link principle is the same.2, compiling and linkingGrammatical errors are the basis of comparison, we do not discuss;"#include "-lHere is an example of TEST.O, main->MAIN.O,Each file source code is as follows:Test.h// test.h extern void test ();Test.cpp// test.cpp#include #include void Test () { printf ("Hello world!\n" );}Main.cpp// main.cpp " test.h " int Main (void) { test (); return 0 ;}Correct compilation steps:[Email protected] link]# g++-o main main.
Release date:Updated on:
Affected Systems:Linux kernel 2.6.xUbuntu 11.04Description:--------------------------------------------------------------------------------Bugtraq id: 46732Cve id: CVE-2011-1076
Linux Kernel is the Kernel of the Linux operating system.
Linux Kernel has a denial of service (DoS) vulnerability in dns_key.c. A remote attacker can exploit
Reference Linux fedora code n graphics and character Switching
By default, FC enables logon to a graphical interface.
1, from the graphical interface to the character interface method: CTRL + ALT + F1-F6
F1 single user
F2 multi-user (NFS not supported)
F3 full user
F4 undefined special circumstances
F5x11: Enter the X-window system.
F6tty character user
2. switch from the character interface to the graphic
host name
\ t or \ t
24-hour or 12-hour system time
\ n
Output line break
\ r
The cursor moves to the beginning of the line and does not wrap
\s
The name of the current shell, such as bash
\ t
Insert Tab key
\u
User name of the current login shell
\v
Bash version
\w
Current working directory
\w
Base name of the current working
hostname or displays the full host name
\ t or \ t
24-hour or 12-hour system time
\ n
Output line break
\ r
The cursor moves to the beginning of the line and does not wrap
\s
The name of the current shell, such as bash
\ t
Insert Tab key
\u
User name of the current login shell
\v
Bash version
\w
Current working directory
\w
Ba
Affected Versions:
Linux kernel 2.6.xVulnerability description:
Bugtraq id: rj82cve ID: CVE-2010-0435Linux Kernel is the Kernel used by open source operating system Linux. A null pointer reference vulnerability exists when the Intel VT-x extension is enabled for the processor on the host system. If the simulator is cheated and simulated
The mov to/from DR comm
Release date: 2010-08-20Updated on: 2010-08-23
Affected Systems:Linux kernel 2.6.xUnaffected system:Linux kernel 2.6.34Description:--------------------------------------------------------------------------------Bugtraq id: 42582Cve id: CVE-2010-0435
Linux Kernel is the Kernel used by open source Linux.
A null pointer reference vulnerability exists when the Intel
Linux cluster LVS -- ipvsadm command reference -- Linux Enterprise Application-Linux server application information. The following is a detailed description. For the command reference of ipvsadm, and a simple translation based on your own experience, I hope to help the users
Solve a small problem with compilation in Cocos2d-xfor Cocos2d-x 2.x in the compilation, if the header file introduced the # # "Cocos-ext.h", in the C + + compilation will encounter such as the following error: Undefined reference to symbol ' [email protected] @GLIBC_2.2.5 '/lib/x86_64-linux-gnu/libpthread.so.0:error adding Symbols:dso Missing from command lineGoogle on the internet for a long time, some p
consists of three parts: [Ugoa][+-=][rwxxstugo]. The meanings of each parameter are as follows:
A u-user that represents the owner of a file or directory.
A g-group that represents the group to which the file or directory belongs.
O-other, which means that other users are in this range, except for the file or directory owner or group in which they belong.
A-all, which represents the entire user, including the owner, the owning group, and other users.
+, which indicates
first, the Linux file structureA file structure is a method of organizing files on storage devices such as disks. Mainly embodied in the organization of files and directories.The directory provides a convenient and effective way to manage files.Linux uses a standard directory structure that, when installed, has created a file system for the user and a complete and fixed directory composition, specifying the role of each directory and the file types in
Release date:Updated on:
Affected Systems:Linux kernel 2.6.35-rc1Unaffected system:Linux kernel 2.6.35-rc4Description:--------------------------------------------------------------------------------Bugtraq id: 41432Cve id: CVE-2011-0709
Linux Kernel is the Kernel used by open source Linux.
Linux Kernel's "br_multicast.c" has a Denial-of-Service vulnerability.
Release date:Updated on: 2012-03-13
Affected Systems:Linux kernel 2.6.xDescription:--------------------------------------------------------------------------------Bugtraq id: 52274Cve id: CVE-2012-1097
Linux Kernel is the Kernel of the Linux operating system.
Linux Kernel has a local denial of service vulnerability caused by NULL pointer
"Chapter I."
Before, there was the smell of FreeBSD in the Web server domain has a fast stability such as "rock-solid" high-performance, as an important part of the Unix BSD family, has excellent network and security performance, software rich, concise and efficient, completely free! Browsing the internet also found that the desktop system on top of it is not inferior to Linux.
Previously played Linux distr
A project experiences code porting, porting from UNIX to Linux, compiling the environment, and learning something...The first step is to transplant ace packages, third-party stuff, and get it done in a few minutes.Step 2 transplant a platform component encapsulated by the company, refer to the ace package compilation ParametersCompile and use these parameters:G ++-fvisibility = hidden-fvisibility-inlines-hidden-w-wall-wpointer-Arith-O3-g-pipe-FPICLink
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.