In the shell script experiment, a problem was found:
"-it" equivalent to "
"-GT" equivalent to ">"??
"-eq" is equivalent to "="??
Take a look at experiment 1 below:
#!/bin/shA=$1B=$2If [-Z $a]| | [-Z $b]Thenecho "Please enter 2 number ..."Exit 1Fi
if [$a = $b]Thenecho "Number A = number B"else if [$a-lt $b]Thenecho "number Aelse if [$a-gt $b]Thenecho "number A>n
The three rings correspond to the inner ring, the four rings correspond to the central ring, the five rings are equivalent to the outer ring, and the six ring is equivalent toShanghai Outer Ring 99km, Beijing five ring 99.3km.According to the level of development, Shanghai is better than the Beijing Five rings, puxi section of the outer ring development similar to the four ring in BeijingBeijing is developi
1. when multiple paths exist at the destination, and the metric values of multiple paths are the same, the equivalent load balancing can be performed, 650) this. width = 650; "src = ".. /attachment/201210/171627301 .jpg" border = "0" alt = "" data-pinit = "registered"/> after completing the configuration, view the neighbor table, topology table, and route table a on R1. neighbors table 650) this. width = 650; "src = ".. /attachment/201210/173147668 .j
BPL English full name Borland Package library is a special DLL file that is used for code reuse and for reducing executables. When compiling BPL, you only need to add the appropriate PAS file for the feature, and if you have a form, you need to add the DFM file. Since it is a DLL file, that is the file that is required at run time. BPL equivalent to DLLs in C + +DCP English full Name: Delphi compiled package, is the package compiled with BPL produced,
generated by the X86 architecture constraints. Pages are moved between the hot list, cold list, and idle list. The mechanism for moving pages between these lists is very similar to that in FreeBSD. Frequently accessed pages will be in the "hot" list. The idle page is displayed in the "cold" list or "idle" list.
Solaris maintains the variation of its LRU replacement algorithm by using the idle list, scattered list, And vnode page list.
1. VMware Tools installation and display settings
Command:
Cp/cdrom/vmwaretools/vmware-solaris-tools.tar.gz/export/home/xxxx
Gunzip vmware-solaris-tools.tar.gz
Tar xvf *.tar
A folder that generates a "Vmware-tool-distrib"
Enter this folder, perform the vmware-install.pl, and then a long set of settings after installation, the mouse can be free to click, Solaris
: RootPassword:
Nov 21 15:22:57 zone01 login: Root Login/dev/consoleSun Microsystems Inc. SunOS 5.10 generic January 2005# Ifconfig-Lo0: 1: Flags = 2001000849 Inet 127.0.0.1 netmask ff000000Pcn0: 1: Flags = 1000843 Inet 10.11.11.94 netmask ffffff00 broadcast 10.11.11.255# HostnameZone01
In this way, you can log in and use it independently as a Solaris 10 virtual machine.
Ping 10.11.11.94 from outside.
Note:
When creating the zone directory, you mu
Solve the problem of Internet access and remote logon in Solaris, and perform remote logon in solaris.
Reference http://www.jb51.net/ OS /Solaris/1656.htmlSolution to display garbled characters on solaris
Symptom:
Use the command: LANG = zh; export LANG. Or LANG = C; export LANG
Of course, we can also set them all. L
First, ensure that the software packages installed in solaris meet the requirements (refer to the basic requirements of the official installation of SolarisStudio12.3, at least the necessary packages must be installed and developed ).
Because it is installed in a virtual machine, the pre-allocated swap space is relatively small, you need to temporarily increase the swap space, refer to Solaris temporary inc
Article Title: Solaris Study Notes: About the Solaris syslog mechanism. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The syslog mechanism is responsible for sending and recording the information generated by the system kernel and tools. It consists of the syslog () ca
, cached, and feee pages. Based on usage, the page is walking around these linked lists. Frequently accessed pages are active. The data page of the exited process will be immediately put on free. If vm_pageout_scan cannot scan all the memory due to load, the FreeBSD kernel may swap out all the processes. If the memory shortage is serious, vm_pageout_scan may kill the largest process in the system. Linux also uses different page linked lists. Physical memory is divided into three zones: One DMA p
Solaris service management, solaris Service
Remote logon Protocol
Telnet \ ssh. Of course, we can check who has logged on to my system and who can use ftp to record logs.
1. SMF: Service Management Tools
Advantages: Automatic Recovery of accidentally terminated Services supports service dependencies. A service can have multiple instances, provides command line management tools, and supports concurrent start
Solaris software manages FTP and solaris software ftp
Install Common Software
Relationship between applications and system commands:
The system command file is located under/bin/sbin or shell commands to complete basic management of the system. Generally, it is run on the Character operation interface; it generally includes command words, command options, and command parameters.
The application file is loca
Putty is a very useful open-source terminal software. Supports most remote logon protocols.
However, in addition to terminal, Solaris does not seem to have terminal software such as securecrt and putty.
Putty is open-source and the code can be downloaded in the http://www.putty.nl/download.html.
The following describes how to compile Putty:First, download to putty0.6, go to the Unix directory, and run./configureThis will automatically generate makefi
A while ago, I was working on a program module. Its basic function was to read a file in a specified format, and then organize the file's descriptive content into a data structure in the memory. In this development task, we only need to generate memory data, and how to process the data is done by other groups. Therefore, the data structure is also defined by the other party. After a series of design, development, and testing, we successfully completed the development of modules on Windows and in
Article Title: Use Role access control to make the Solaris server safer. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
I. Role Overview
For traditional Unix security models, superusers have full superuser privileges, while other users do not have sufficient permissions to solve their own problems. With role-based
B. Equivalent Strings time limit per test 2 seconds memory limit per test megabytes input standard input output Standa RD output
Today on a lecture about strings Gerald learned a new definition of string equivalency. Strings A and BoF equal length is called equivalent in one of the both cases:they is equal. If we split string A into the halves of the same size A1 and A2, and string B into the halves of the
-dcom.sun.management.jmxremote option. Note: In the Java SE 6 software, this requirement is no longer available. When you start the application, you do not need a specific command-line option.Application in the production systemJconsole launches a JMX agent inside the JVM of the observed Java program. Running another part of the code has only a slight effect-but the impact is minimal.In addition, although jconsole is useful in monitoring the development of local applications and rapid prototypin
Author: yiming GongHttp://security.zz.ha.cnDisclaimer: The above author and HTTP address must be retained for any form of excerpt
Solaris log IntroductionAssume that you are a website administrator using the Solaris operating system. One day, you accidentally saw the following similar content in the messages file on your hard disk/var/adm directory:Apr 24 20:31:04 nmssa/usr/dt/bin/rpc. ttdbserverd
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.