CatalogueThe role of disk
The structure of the disk
HDD interface
Common HDD Profile
Internal drive structure
HDD Disk surface structure
How disks are partitioned
Naming rules for physical devices
File system
File system type
File system and Data sheet
Operation process of hard
Adhu (ASM Disk Header Utility) is one of the three major restoration artifacts of oracle asm, kfed, and amdu, which are not vigorously promoted by oracle (an internal tool ), with the enhancement of the kfed function and the improvement of the automatic backup function of asm disk headers, adhu oracle basically stops development support and can be used as a disk
Note: This article is only used as a link to add to favorites. It is a combination of others' articles, so it is divided into several parts. When searching cloud disk resources, you can try several URLs multiple times, and the directories are duplicated. Therefore, you can refer to the search quality based on the number of repetitions.
/// // Part One ////////////// ///////////
Online storage Search Engine
Turntable Network: http://www.quzhuanpan.com/
hard Disk Interface
The current hard disk interface type is not much, mainly IDE, SCSI, SATA three kinds. Many times the IDE replaces the Ultra ATA, many people are accustomed to the Ultra ATA hard disk is called IDE hard disk, but need to explain that the concept of the IDE is greater than ata--in principle all har
A business trip to the customer site to install the new IBM server, did not think the server did not configure the optical drive, the scene does not have a USB drive, the installation toss enough, so determined to make a U disk installation disk, after many installation groping. Successful implementation of OEL5.8,CENTOS5.8,OEL6.3U disk installation system. The r
Go: http://www.jb51.net/diannaojichu/55058.html active partition is the computer boot partition, the operating system's boot files are installed in this partition, Windows system is generally default to C drive, and Linux is based on the specific settingsWhen you start the system, the operating system on the active partition executes a process called a drive image that assigns a drive name to the primary partition and logical drive. All primary partitions are first imaged, while logical drives a
Today, I met a figure from Google listing the time loss of common operations. For details, see the big picture in high definition:
This figure reminds me of the words Jim Gray has been circulating for a long time when I used redis :"Tape is dead, disk is tape, Flash is disk, Ram locality is king". (Tape is dead, disk is new tape, Flash is new
Linux disk performance monitoring, linux disk Performance
In linux, many commands for viewing processes are also very powerful. Commonly Used Commands include: ps top
However, the disk performance monitoring is not so uniform.
The following lists some disk monitoring commands, which only serve as an example. For detail
Now many users are aware of the damage to the computer virus is very large, the installation of an anti-virus software is very necessary, the anti-virus software installed in Windows have a very friendly graphical interface, only need to use the mouse on two to complete antivirus, do not need too much expertise.But the use of anti-virus software in Windows has a big disadvantage, if the file is being called infected with the virus, antivirus software on it helpless, anti-virus software will reco
1, U disk Startup disk is in a U disk installed a micro-system, you can use U disk to start into the computer, the hard disk system maintenance.
2, before, we are using CD-ROM boot system, and now, you can use U disk instead of t
Original Works are allowed to be reprinted. During reprinting, please mark the article in hyperlink form
Original source, author information, and this statement. Otherwise, legal liability will be held. Http://cutebunny.blog.51cto.com/301216/624567
This section describes how to obtain all the partition numbers on the disk based on the physical drive number. The deviceiocontrol function does not provide an operation code to directly perform this operat
In many cases, we need to know in the program which partition or physical disk the operating system is installed on, and then perform some operations or avoid some operations on it. For example, to avoid deletion of the system disk partition table. This section describes how to obtain the logical Partition Number and physical drive Number of the operating system.
Or code first.
/****************************
Provide domestic futures and outer disc Futures simulation disk, with wind control and counter management backstage.can open sub-account, can free access to gold, there is a perfect disk stroke control and stop out function.Software completely independent development, has a perfect after-sales service and protection.You can build your own server and maintenance, and can also be customized to develop on dema
features of the mobile data recovery software of xunlong USB flash drive is the silly operation. convenient and quick file retrieval is the goal of the software. Let's briefly describe how to use this software. After installation, open the interface, select the recovery option based on your actual situation, and then scan the USB flash disk, the names of the files to be repaired or restored will appear in the list. After selecting the files, select t
Mount a remote disk to a local disk through NFS in Linux
Recently, due to project reasons, we need to connect to the other two companies and retrieve the image data from the server of the other party. The original agreement was that the third party communicated through the http protocol, but the other party did not cooperate, the files are stored on their servers. Therefore, you can attach the
View disk space usage on mac, mac disk space
Today, I found that the disk space is insufficient. First, find the folders that occupy the disk space.DuThe command is easy to use.
Du-c-d 1-m | sort-n
-CDisplays the total space occupied by the current folder.
-D 1The level is 1, that is, only the size of the level
Stat/etc/passwd to view the file information,
The field Access time (Access time) file data is updated after each read,
The field Chage time (Change time) file inode information is updated after each change
The field Modify time (modification time) file data is updated after each change.
Ls-l/etc/passwd
-Rwx ------. root 1704 January 10 08:44/etc/passwd
I:
. Point indicates that the file has a seliunx flag. Only a specific process with the same flag can use the file.
Ls-Z/etc/passwd to view hidd
How to install fedora15 and hard disk partition on a USB flash drive-Linux general technology-Linux technology and application information. The following is a detailed description. I felt a little timid and did not dare to try the system, because I used to delete the Startup Program, and the computer would not start.
I searched for a lot of different sayings on the Internet, so it was strange. I would like to ask some familiar experts for help and ex
Popular Links: https://wiki.archlinux.org/index.php/Disk_encryptionThe previous link about hard disk encryption, said a few, basically is selected Dm-crypt with LUKSIn grub, decrypt the root partition and the/boot partition.Dm-crypt Document: Https://wiki.archlinux.org/index.php/Dm-cryptUse Dm-crypt to encrypt a non-root partition. Https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_a_non-root_file_systemTwo encryption methods for Dm-crypt: PLAIN
File Class (java.io.*) can represent a file, or it may be a directory (in Java, files and directories belong to this class, and the distinction is not very obvious).The method under Java.io is to perform disk operations on the files on the disk, but the contents of the file cannot be read.Note: Creating a File object and creating a file in Java is two different concepts. The former creates a file in the vir
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.