current location:Home > Technical Articles > System Tutorial > LINUX
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- c/c++ compiler running process based on command line input
- Directory first: c/c++ compilers gcc, cc, c++, g++ included in linuxgcc Second: gcc features Third: gcc running process Fourth: gcc options Fifth: Some of the conventions and rules followed by gcc First: The c/c++ compilers included in linuxgcc are gcc, cc, c++, and g++. gcc and cc are the same, and c++ and g++ are the same. Usually c language programs are compiled with gcc. How to compile linux with gcc. How to compile linux with gcc, c++ The program is compiled with g++. Second: gcc features gcc is a portable compiler that supports multiple hardware platforms. Such as ARM, X86, etc. In addition to being a local compiler, gcc
- LINUX 993 2024-06-01 21:57:27
-
- On data loss in large clusters
- There are three commonly used replication routines: The database ensures that each copy of the data is copied to three independent disks on three different computers. The reason for this is simple: disks only fail at a certain moment. If one disk dies, you have time to replace it, and you can still take one of your other two copies. to restore the data and write it to the new disk. The probability that the second disk will die before you restore it is so low that the probability of both your disks dying at the same time is as slim as an asteroid hitting the earth. We also made special calculations. The probability of one disk failure is almost 0.1% (maybe rough). The possibility of two disks failing is almost 10 to the power of 6. Three disks fail at the same time.
- LINUX 413 2024-06-01 21:33:50
-
- Methods to solve the Chinese garbled problem of vim in Linux server and introduction of related parameters
- When logging in to a Linux server remotely and using vim to edit and view files in the terminal, various English garbled problems often occur. Making the following settings can basically solve the vim English garbled problem. First check the system's support for English locale-a|grepzh_CN output sample is as follows zh_CN.gbkzh_CN.utf8vim can only correctly identify the English encoding files in the list. If you need to identify other encoding types of English file, you need to do a system upgrade vi~/.bash_profile file and add exportLANG="zh_CN.UTF-8" exportLC_ALL="zh_CN.UTF-8" at the end of the file
- LINUX 781 2024-06-01 21:20:24
-
- Analysis of CPU usage metrics!
- Yes, what I'm talking about here is the "%CPU" metric that everyone uses everywhere, in every performance monitoring product. Use the top(1) command to view it. You might think that 90% CPU usage means: When actually it might mean: Stalled means the processor is making no progress processing instructions, usually due to the processor waiting for memory input/output. The ratio I drew above (between busy and stuck) is what I see often in real production environments. It's possible that you're basically at a standstill and don't even know it. What does this mean to you? Knowing how much of your CPU is stalled can guide performance tuning efforts between reducing code or reducing memory I/O
- LINUX 606 2024-06-01 21:18:08
-
- Uptime command introduction
- The Linux uptime command is self-explanatory. The uptime command tells you how long the system has been up (running). This is the syntax: uptime [options] The man page of this tool says this: uptime will display the following information in one line: the current time, how long the system has been running, how many users are currently logged in, and the top 1, 5 and 15 The average load of the system in minutes. The following cases in question and answer format should give you a better understanding of the uptime command. Q1. How to use the uptime command. The basic usage of uptime is very simple - just enter the command name and press Enter. This is the output: Here, the first item is the current time, and up means that the system is
- LINUX 1415 2024-06-01 21:02:58
-
- arm-linuxgtk, a port of gtk in ARM
- #主机安装gettextlibglib2.0-devsudoapt-getinstallgettextlibglib2.0-devexportPREFIX=/gtkdfb&#installglib2.16echoac_cv_type_long_long=yes>arm-none-linux-gnueabi.cache&echoglib_cv_stack_grows=no>>arm-none-linux-gnueabi.cache&echoglib_cv_
- LINUX 789 2024-06-01 20:32:10
-
- Don't worry about old versions of Linux—use DKMS to easily create RAID card drivers
- Technical students may have felt something like this - they encounter new problems or learn new knowledge every day. However, although a person's time and energy are limited, not all positions can be done personally, and everyone's areas of expertise are also different. In order to help engineers who have experienced pitfalls and practical experiences and experiences, it is particularly valuable to record and share their experiences. This is the purpose of our "Engineer's Notes" column. Don’t worry about old versions of Linux—use DKMS to easily create RAID card drivers. In our technical support work, we often encounter customers who need to install old versions of Linux operating systems on our new servers, and there are no external new versions of Linux available. Hardware
- LINUX 872 2024-06-01 20:16:56
-
- How to use force uninstall technique to uninstall software in Linux?
- Linux is a very stable and secure operating system because the software is designed to only access the resources it has been granted. This means that if you use Linux's default package manager to install software, it is also extremely easy to uninstall it. Moreover, sometimes you may encounter some software that is difficult to uninstall using the package manager. In this case, you need to use the forced uninstall method. In this article, we will explain how to use the force uninstall method to uninstall software in Linux. We'll cover three basic methods: using the command line, using uninstall tools, and automatically deleting files. Understanding this approach will help you better manage your Linux system. Using the command line to force uninstall software The most common form of force uninstalling software in Linux is to use
- LINUX 1066 2024-06-01 18:53:54
-
- PHP scheduled task click 'Run' to try Linux Crontab to execute PHP
- How to implement PHP scheduled tasks that support Windows and Linux Update time: November 04, 2014 10:14:53 Submission: shichen2014 This article mainly introduces how to implement PHP scheduled tasks that support Windows and Linux, with a more detailed description Understand the PHP program implementation methods, Windows planning task implementation methods, etc. involved in PHP planning tasks. Students in need can refer to the following
- LINUX 1207 2024-06-01 18:36:27
-
- Detailed explanation of CentOS anti-intrusion through logs
- 1 View the log file Linux View /var/log/wtmp file View suspicious IP login last-f /var/log/wtmp This log file permanently records the login and logout of each user and the startup and shutdown of the system. Therefore, as system uptime increases, the size of this file will increase, and the rate of increase depends on the number of user logins to the system. This log file can be used to view the user's login record. The last command obtains this information by accessing this file and displays the user's login record in reverse order from back to front. Last can also display the corresponding information based on the user, terminal tty or time. Record. Check the /var/log/secure file to find the number of suspicious IP logins 2
- LINUX 781 2024-06-01 18:25:01
-
- Focus: Summary of common Xshell running commands under Linux systems
- First of all, we want to start with the simplest thing. After we enter the Xshell interface, we connect to the Linux server. When we first enter, we don’t know what files we have. At this time, we can use the ls command to display what files we have. Or use ls-l, the easiest is ll. The ls command will display the files horizontally, which is uncomfortable to look at. ll and ls-l have the same effect. It is recommended to use ll because it is the simplest. After we already know what files there are, we need to know how to enter the file we want to enter. In a graphical system like windows, we can use double-click to open the file we need to open. In Xshell, what we need to use is: cd command. After we enter,
- LINUX 747 2024-06-01 18:02:54
-
- Linux file permissions Speaking of permissions, Linux file calling permissions are divided into three types of permissions
- 1. Linux file permissions Speaking of permissions, Linux file calling permissions are divided into three types of permissions for all objects: user, group, and other people. Each object has three permissions: r: read, w: write, x: execute. Madmen like to use numbers to represent them, such as: rwx is the two's complement 111, which is the ten's complement 7. For example, we view the information of all files in the current directory ls-l: 1. The first digit in the circle 1 indicates the type of the file, - indicates an ordinary file, d indicates the directory, and l indicates the link; the next nine digits can be divided into three groups rwx, each group corresponds to all objects with each permission. This means that user has rwx read, write and execute permissions, group has r-x read and execute permissions, o
- LINUX 600 2024-06-01 17:34:33
-
- Simple method to uninstall software under Linux Uninstallation on Linux is not used
- A simple way to uninstall software under Linux Linux is an open source operating system that can run Linux server maintenance on almost all types of computers. It has been widely used today. Sometimes, we need to install some applications on Linux to meet different needs. And Linux uninstall software command, sometimes we also need to uninstall such programs, especially when they are no longer used. Uninstalling software under Linux is easy, and there are many ways. Here are some of the most commonly used techniques. 1. Use the dpkg command: You can use the dpkg command to uninstall a file. The most commonly used format is as follows: sudodpkg-r2. Use the apt-get command: apt-get is De
- LINUX 1088 2024-06-01 17:27:43
-
- Detailed explanation of Linux file attributes and permissions
- In Linux, any file has three identities: "User, Group, Others" (user, user group, others). One of the most useful functions of user groups is when you develop resources in a team, and each Accounts can have multiple user groups supporting Linux file attributes: 1. After logging in to Linux as root, execute "ls-al" (ls:list, which displays the file name and related attributes of the file; -al: indicates listing all Detailed permissions and attributes of the file (including hidden files)); first column: file type and permissions. The first letter represents the file type: d directory-file l link file b interface device available for storage in the device file c Represents the serial number in the device file
- LINUX 471 2024-06-01 17:06:00
-
- linux kernel explained in detail kernel explained in detail kernel kernel kernel
- linux kernel explanation linux kernel explanation linux kernel explanation linux kernel explanation and explanation Download the USB+ device driver of the Linux Bluetooth contract stack immediately Summary: Based on the analysis of the BlueZ source code of the Bluetooth contract stack under Linux, the organizational structure and characteristics of BlueZ are given. Analyze the Bluetooth USB transmission driver mechanism and data processing process, provide the important data structures and processes for implementing Bluetooth device drivers, and summarize the common techniques and key technologies for developing Bluetooth USB device drivers under Linux. Keywords: Linux system; Bluetooth contract stack; device driver USBDeviceDriverforLinuxBluetoothStackLIANGJun
- LINUX 543 2024-06-01 16:50:03