current location:Home > Technical Articles > System Tutorial > LINUX
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- MariaDB database is installed and configured based on GTID master-slave synchronous replication
- Operating system: CentOS Linux release 7.3.1611 (Core) Database: MariaDB-10.2.6-linux-glibc_214-x86_64 Master server: 10.10.10.56 Slave server: 10.10.10.1631. What to do today, one-way master-slave synchronization About MariaDB (MySQL ) For database installation, please refer to "Centos7.3x64-bit Binary Installation (MySQL) MariaDB10.1.20 Database Production". The configuration process of the MariaDB (MySQL) server cluster begins below. 2. In the MariaDB (MySQL) configuration file
- LINUX 1239 2024-08-09 13:32:44
-
- Installation, common formats and parameter introduction of lsscsi command
- 1. View the lsscsi command 1. Introduction The lsscsi command is used to list SCSI devices (or hosts) and their attributes. lsscsi is not an external command. You need to install the corresponding package of lsscsi. After installation, the lsscsi command can be used. The lsscsi command can easily tell what a solid state drive is, which is a SATA disk, and which is an FC disk. If the H:C:T:L parameter is given, it will be used as a filter for linux to view scsi devices and only match the devices it is enumerated. Here H refers to Host, C refers to Channel, T refers to Idlinux to view the scsi device, and L refers to Lun. 2. Install [root@linuxpro
- LINUX 985 2024-08-08 11:23:12
-
- In-depth analysis of the Linux kernel source code and exploration of the essence of the operating system
- 1. Kernel source code I see that the complexity of the Linux kernel code makes many people "daunted". It is precisely because of this that people's understanding of Linux is only at a general level. If you want to analyze Linux and delve into the nature of the operating system, reading the kernel source code is the most effective way. We all know that if you want to become an excellent programmer, Linux kernel source code analysis requires a lot of practice and code compilation. Programming is still important, and often people who only program can easily limit themselves to their own areas of knowledge. If we want to expand the breadth of our knowledge, we need to be more exposed to code written by others, especially code written by people who are more advanced than us. Through these ways, we can break out of the confinement of our own knowledge circle and enter the knowledge circle of others.
- LINUX 1243 2024-08-08 09:33:08
-
- Understand the session garbage collection mechanism in php
- 1. The session generation mechanism in PHP. Let’s first analyze how a session is generated in PHP. The purpose of designing session is to maintain various states of each user to make up for the shortcomings of the HTTP protocol (stateless). We now have a question. We all know that session is saved on the server. Since it is used to maintain the status of each user, what does it use to distinguish users? At this time, you have to use cookies. When we call session_start(); in the code, PHP will generate a file each to the SESSION storage directory (default is /tmp/) and the client's cookie directory. session
- LINUX 454 2024-08-08 09:08:11
-
- What process do you go through when entering a URL in your browser?
- 1: Description of related concepts: 1.1: DNS (DomainnameSystem) cache: (Domain name system) (check the ipconfig/displaydns of the local machine) After the computer resolves a domain name, it associates this domain name with the host IP address , the computer saves this relationship in the DNS cache table. The next time the computer enters www.baidu.com, the computer will know the IP address corresponding to this domain name by searching the DNS cache, and no longer perform domain name resolution, which improves Improved efficiency 1.2: IP address: The IP address corresponds to a house number. We can find the location of the host through this address. 1.3: Domain name: (domainname)
- LINUX 1050 2024-08-08 08:16:02
-
- Modify hosts file and hostname: easily realize domain name and IP address mapping
- Directory 1. Modify the hosts file. The hosts file is a configuration file under /etc. The LINUX delete directory records the IP address corresponding to the domain name or host name. Every computer on the Internet will have an IP address, which is similar to a specific door steel number. This machine can be accessed through the IP address. However, it is difficult to remember the IP address and modify it in the linuxhosts file, so you can use the method of mapping the IP address to the domain name to access the specific host by accessing the domain name. The hosts file records this mapping relationship. Change hosts: First, ping Baidu to get an ipvim/etc/hosts. Add the IP copied above to hosts where baidubaidu1 leads to the previous IP two.
- LINUX 1195 2024-08-08 01:54:33
-
- What should I do if the Linux command line displays garbled characters? Set the character encoding to UTF-8 to solve the problem
- When the Linux command line displays garbled characters, you can try setting the character encoding to UTF-8. It can be set through the following commands:,, "bash, exportLC_ALL=en_US.UTF-8, exportLANG=en_US.UTF-8," In Linux systems, it is a common problem for the command line to display garbled characters, which is generally due to character encoding. This article will introduce in detail how to solve the problem of garbled characters displayed on the Linux command line due to incorrect settings. 1. Understand character encoding. Before solving this problem, we need to understand the basic concept of character encoding. Character encoding is a correspondence between characters (such as letters, numbers, and punctuation marks) and two's complement numbers (0 and 1). relations advance
- LINUX 642 2024-08-08 01:37:43
-
- Detailed steps and methods for modifying the hosts file in Android system
- For some reasons, it may be necessary to change the domain name specified in the hosts file to the corresponding IP address. Android is a Linux-based system. Similar to Linux, it is set up through the hosts file. Under Android, /etc is the Linux training link to /system/etc. We need to change /system/etc/hosts to achieve this. And this file is read-only and cannot be changed directly through the shell. This can be changed by connecting to a PC using adb. The steps are as follows: 1. Obtain root permissions: adbroot 2. Set /system to be readable and writable: adbremount 3. Copy the hosts file to PC: a
- LINUX 1602 2024-08-07 22:43:44
-
- Red Hat Linux system download, installation, system monitoring, and process management tutorials
- Table of Contents of Series Articles Chapter 1: Redhat Linux System Download and Installation Chapter 2: Linux Users and Groups Chapter 3: Linux File Management Chapter 4: Linux Directory Management Chapter 5: Linux Text Editor Chapter 6: Linux File Search and Management Chapter 7: Linux input, output redirection and pipeline Chapter 8: Linux package management Chapter 9: Linux system monitoring and process management Article table of contents Preface The main content of this blog is about system monitoring and process management, etc. The operation is still based on experiments. Follow the old rules and remember to take a snapshot in advance. 1. System monitoring query information uname-runame-alscpuhostnametoptop command
- LINUX 829 2024-08-07 21:36:43
-
- STM32 and Linux: From hardware to software, the key to mastering the operating system mechanism
- Hello, landlord! I'm not going to talk to you about the big ideas like those above, but I'm going to talk to you about the practical things. Linux and stm32 are a software platform and a hardware platform, which are completely different (remember, they are platforms!). Let's put it this way, since you like microcontrollers, you should first learn the detailed explanation of stm32 embedded Linux device driver development and lay a solid foundation for the hardware, especially various buses (usb, iic, spi...), various peripheral modules (infrared , Wenhu, mpu6050...), and then focused on ucosii, that is to say, learn to complete your tasks within the framework of the operating system, rather than simply writing programs - the understanding of the operating system mechanism Grasp is the key to distance yourself from the MCU friends around you;
- LINUX 699 2024-08-07 21:00:24
-
- Centos6.4 Installation Guide: Detailed Graphical Tutorial on Installation via USB Disk
- If you want to install Centos6.4, in fact, the first thing you will think of is using a USB flash drive as a carrier. Because the USB flash drive has a relatively high usage rate, is easy to carry and efficient in storage, it is one of the best choices. Tomorrow the editor will explain it to you. Provides detailed graphic and text strategies for installing Centos 6.4 via USB flash drive. 1. First we need to download UltraISO (floppy disk) and Centos6.4 image, install the software, insert the USB disk, open the UltraISO software, find the Centos6.4 installation image (as shown in the figure), delete other files and keep only images and isolinux Two folders and the TRANS.TBL file, only these three files are enough. 2. As shown in the figure, select "Write" under the "Start" button
- LINUX 698 2024-08-07 20:40:53
-
- H2Miner virus invades Windows/Linux platform, beware of long-term persistence of mining programs
- H2Miner alertness level★★★Affected platforms: Windows/Linux virus execution body Description Attackers use vulnerabilities to invade Windows platforms and Linux platforms. On the Windows platform, the attacking host downloads and executes the XML file wbw.xml, executes a PowerShell command in the XML file, and downloads a script named 1.ps1. This script downloads the mining program and mining configuration file and renames it for execution. , create a scheduled task and execute the 1.ps1 script every 30 minutes to achieve persistence and stay on the attack host all year round; on the Linux platform, the attack host downloads and executes an XML file named wb.xml, which is embedded using the same method. Got it
- LINUX 1086 2024-08-07 20:40:30
-
- Introduction to popular Linux systems and methods of making USB boot images
- This article mainly introduces several popular Linux systems. Basically, Debian and Ubuntu systems are similar. First, suselinux. What should be noted here is that you must have a Linux or FreeBSD system on hand to use the zcat command. In fact, it must also be a system that can recognize USBStorage. Usually, you can use VMWare to serve any minimal Linux. Then go to the corresponding Linux release version to download a bootable img to the U disk. The download address is as follows: DebianSid:/debian/dists/sid/ma...dia/boot.img.gz (This is to make the U disk boot
- LINUX 1103 2024-08-07 19:48:21
-
- Microservice architecture—graceful shutdown solution
- Abstract: Application graceful shutdown in microservice architecture mainly refers to the planned and smooth exit of application instances (that is, no incidents that need to be handled). 1 Introduction Graceful downtime of applications in microservice architecture mainly refers to the planned and smooth exit of application instances (that is, without causing incidents that need to be handled). Application server shutdowns are mainly divided into two categories: active shutdowns and passive shutdowns, of which active shutdowns and most passive shutdowns can achieve graceful shutdowns. If the application does not shut down gracefully, the following situations will occur: Data loss: The data in the memory has not been persisted to the disk. File corruption: The file being written is not updated due to file corruption. Request loss: Queued for processing. Request lost and response lost: the successful transaction has not had time to respond to the transaction
- LINUX 820 2024-08-07 18:47:02
-
- How to put a website into memory to speed up the website under Linux
- /dev/shm/ is a device file, which uses the tmpfs file system (note: under Centos and Redhat, the /dev/shm directory is a link pointing to the /run/shm directory, which corresponds to the tmpfs file system under the Ubuntu system It is the /run/shm directory (you can use the df command to view it), because the /dev/shm/ directory is not on the hard disk, but in the memory. It is the so-called tmpfs. You can view it through the command df-h. The default size of tmpfs is half of the physical memory. Of course, it can be adjusted according to the actual situation. First create a directory wpcachemkdir/dev for WordPress’s cache files.
- LINUX 1221 2024-08-07 18:46:33