file name and compression ratio for each compressed and decompressed file.
-Num uses the specified numeric num to adjust the compression speed.-1 or -- fast indicates the fastest compression method (low compression ratio), and-9 or -- best indicates the slowest compression method (high compression ratio ). The default value is 6.
Unzip command
How can I expand files compressed by winzip in Microsoft Windows in
create a Windows 98 virtual hard disk under the Linux File System. The disk size is 2 GB or 1 GB. This hard disk acts as the primary master of the virtual machine, that is, the C disk under Windows. Then install Windows, IE, Office, and some common tools such as Ultraedit, Flashget, and Winzip on the Virtual Machine to avoid viruses. Then exit Windows from the VM.
II,Execute the configuration editor comman
Terminal logout exit Terminal exit Exit Ctrl+u the end of the ctrl+d to delete the next ctrl+e move to the end of CTRL + a move to the front ctrl+k delete the four after the cursor, statstat to view the file details[[Email protected]1]# stat/root/1/1. Txt.bak.bak File: '/root/1/1. Txt.bak.bak ' Size:0Blocks:0IO Block:4096Regular Empty filedevice:ca01h/51713d Inode:158242Links:2Access: (0644/-rw-r--r--) Uid: (0/root) Gid: (1003/Ruanwenwu) Access: .-Ten- - A: -:06.221000000+0800Modify: .-Ten- -
Linux system add root certificate linux Certificate Trust List, linux Certificate
1. https certificate access in linux
[root@boss-test-dev001-jydx~]#curl-vhttps://mobile.mycard520.com.tw*Abouttoconnect()tomobile.mycard520.com.twport443(#0)*Trying220.130.127.122...connected*Connectedtomobile.mycard520.com.tw(220.130.127
System callsis a soft interrupt, API function, let the upper application fall into the kernelProcess ManagementProcess scheduling, scheduling algorithm, process three-stateProcess is the minimum unit fork for CPU scheduling resourcesVFS Virtual File ManagementUnder Linux, all the devices are filesDriver Bus Model 2.4 2.6 (TRUE) Support PnPExt3 ext2 vfat File Management system----> Driver Development under the driver bus modelMemory managementProcess l
Programmers are lazy, you know.
Recently in development, you need to use the server's IP and Mac information. But the server is installed on the Linux system, for the multiple network, in the acquisition of IP generated a lot of problems. The following is a method for Java to obtain a local IP on a Windows system. Paste Code:
Package com.herman.test;
Import java.net.InetAddress;
/**
* @see get computer IP
* @author herman.xiong
* @date May 16, 20
WineIs an excellentLinuxThe simulator software on the system platform is used to stably run the software on Windows in Linux. The following describes how to configure it.
Let's take a look at Figure 1 below. You will be surprised to ask: "Wow! Isn't HyperSnap-DX, a well-known image capture software in Windows? When will it be transplanted to Linux ?", You are wrong. This is indeed running HypdrSnap-DX in W
Article Title: Application of Backup Recovery Technology in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
This article describes how to use backup scripts, commands, and commercial software in
Summary of the basic operations of Linux, basic operations of linux
Preface
Linux was a UNIX-compatible operating system developed in 1991 and can be used for free. Its source code can be freely transmitted and can be modified, enriched, and developed by anyone, the original intention of developers is to jointly create a perfect, ideal and free-to-use operating s
Linux Directory Architecture
/root directory
/bin commonly used commands binary file's catalogue
/boot store files that must be read when the system is started, including the core (kernel)
/boot/grub/menu.lst Grub Settings
/boot/vmlinuz kernel
RAM Disk required for/BOOT/INITRD core decompression
/dev System Peripheral Equipment
/ETC System Related setup file
/etc/dir_colors Set Color
/etc/hostname set the user's node name
/etc/networking only yes indi
New users talk about Linux, new users linux
Directory:
What is Linux?
Differences between Linux and UNIX
Comparison between Linux and Windows
What is the Linux release?
Linux applicatio
Whatever the system, the safest way. After debugging, make a backup. If you encounter any major problems, you can recover them directly, which is convenient and easy to handle. The following describes the Linux backup and recovery methods:The backup and recovery system is responsible for backup and recovery beforehand. In the current rapidly developing network environment, no information system on any network can guarantee absolute security. As long a
0. Most commonly used Pstree:[Email protected] temp]# Pstree-a|grep Multe| | '-multepoolser| | '-multepoolser| | ' -2*[{multepoolser}]1. > TopAll system processes can be displayedPress U, and then enter the appropriate execution user name, such as TomYou can see all the processes that Tom user started and the corresponding PID2. > Pstack pidYou can see the running state of each thread under this PID,[[email protected] multepoolserver]# pstack 14944 (PID number of the process)Thread 2 (thread 0x4
[Linux Device Driver] linux address type, linux Device address type
List of address types used in Linux:
User virtual addresses)
The normal address visible to the user space program. The virtual address length is 32-bit or 64-bit. It depends on the underlying hardware architecture. Each process has its own virtual addr
[Linux] linux Command learning-netstat, linux-netstat
Many linux services are related to the network. When the service cannot be called, the startup port is occupied, or the firewall is blocked, you need to query network problems, the netstat command only uses one or two parameters.
Common options:
-A (all) shows
Linux basic Review (1)-Linux System Overview, linux Overview1. What is an operating system? What is the relationship between it and hardware and other software?
An operating system is a system software (or a set of programs) that controls and manages various hardware and software resources in a computer system and effectively organizes multiple programs to run.
Transferred from
Http://beterfly.blogbus.com/logs/23724282.html
Basic commands:Logout: LogoutLog on to login againExit to exit the current user Shutdown: shutdown + timeExample: shutdown now (shutdown now or immediately)Shutdown-C cancel all shutdown settings (shortcut: Ctrl + C)
Restart the computer:Shutdown-r restart timeExample: shutdown-RReboot (immediate restart) is the same as shutdown-R
In Linux, there are seven run_level_number running levels
Tags: share institute public number src inux new VMW http Silicon Valley1.1 Overview 1.2Linux and Windows differences 1.3Centos Chapter 2 installation of VMs and Linux 2.1 VMware InstallationHttp://blog.sina.com.cn/s/blog_c30a9e680102xusf.html2.2 CentOS InstallationHttp://blog.sina.com.cn/s/blog_c30a9e680102xutv.html2.3 Vmtools InstallationHttp://blog.sina.com.cn/s/blog_c30a9e680102xuu3.htmlThis tutorial by the Silicon Valley Institute of Education
Linux services)It is important for Linux users. Disabling unnecessary services can make Linux run more efficiently, but not all Linux services can be disabled. After installing centos Linux today, we found that many services were started when
Nbsp;zip and unzipzip programs for processing. zip files are located in the/usr/examples file to save hard disk space, while compression is required.
Process zip and unzip of. zip filesZip and unzip programs are located in the/usr/bin directory, which are the same as pkzip, pkunzip, and MS-windows Winzip software in MS-DOS, and can be compressed into files. zip File to save hard disk space, and unbind the compressed file when necessary.Zip command for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.