Tag:operating system
-
Detailed explanation of Linux operating system kernel startup parameters
Time:2022-7-26The Linux kernel can receive some command line options or startup parameters at startup. When the kernel cannot recognize some hardware and cannot set hardware parameters, or in order to prevent the kernel from changing the value of some parameters, these parameters can be manually passed to the kernel in this way. If you don’t […]
-
Research on industrial robot system of Baijiu steamer
Time:2022-7-8In the thousand year history of Baijiu development in China, the traditional brewing process has been continuously innovated and developed while retaining. Steamer is actually a steamer in ancient China. In the process of steaming Baijiu, the steamer material is evenly spread into the steamer layer by layer to ensure that the steam penetrates from […]
-
Common system management commands on Linux operating system
Time:2022-7-8For the Linux system, whether it is the central processing unit, memory, disk drive, keyboard, mouse, or users, it is files, and the commands managed by the Linux system are the core of its normal operation. After being familiar with the file processing commands commonly used in Linux, this lecture introducessystemAnd user management commands. df […]
Tags: Administration, command, Commonly used, file, One, operating system, process, system, use, user -
Basic installation and uninstallation of Linux operating system software
Time:2022-7-6Linux SoftwareinstallAnd uninstallation has always been a difficult problem for many new users. In windows, we can use theinstallUninstall the program or “add / Remove Programs” in the control panel. Similarly, there is a powerful software under LinuxinstallUninstall tool named rpm It can be used to buildinstall, query, update and uninstall the software. This tool […]
-
Linux operating system security configuration steps
Time:2022-6-28Brief description of Linux security configuration steps 1、 Disk partition 1. If newinstallsystem, consider the security of disk partition:1) the root directory (/), user directory (/home), temporary directory (/tmp) and /var directory should be separated into different disk partitions;2) the disk space size of the partition where the above directories are located should be fully […]
Tags: operating system, program, root, [email protected], security, step, system, To configure, user -
Operation method of prohibiting single user mode login under Linux operating system
Time:2022-6-18If it is forbidden to enter a single user, first configure the password of grub, and only modify /boot/grub/grub Conf or /etc/grub Conf (/etc/grub.conf is a symbolic link to /boot/grub/grub.conf). For example: VI /boot/grub/grub Conf enter the configuration file for editing In the next line of the splash image parameter, you can add password= […]
-
Description and use of uniq command in Linux operating system
Time:2022-6-15The function of uniq command: display unique lines, and only display those lines that repeat consecutively once! Next, through practical examples: [[email protected] ~]# cat test boy took bat home boy took bat home girl took bat home dog brought hat home dog brought hat home dog brought hat home If you look at the contents […]
-
Solution to Linux operating system crash
Time:2022-6-8After Linux panicYou can ctrl+alt+f1, log in to the root, and view it with the top commandsystemTo find out the cause of the crash. How to terminate a crash caused by running a program? solveSolution: PS -all view all running programs, and then find the PID value of the program you are running Then kill […]
-
Basic knowledge of async program (process, thread, context switch)
Time:2022-5-15Process: as the basic unit for isolating applications For example, after a program is started and loaded into memory, the running instantce is called proces. Each process occupies a memory section. (including programs and related resources) Isolated the operating system, but shared the CPU. Thread: it is the concept used by the operating system to […]
-
[Linux system programming] understand von Neumann architecture
Time:2022-5-3Von Neumann architecture Von Neumann Architecture Text start @ Assassin catalog: Von Neumann architecture 1. Von Neumann model: 2. Derivation of von Neumann architecture: 3. Working principle of the equipment: 3.1 memory: 3.2 CPU: 3.3 bus: 3.4 I / O equipment: 4. How memory improves the efficiency of von Neumann architecture: 5. Architecture related supplements: […]
-
Windows operating system + Korean Red Star + domestic Kirin + Red Flag + penetration special system + Oracle special + technology column [resource collection] | looking for the treasure of station C
Time:2022-5-1Hello, I’m lex. I like bullying Superman. Lex Areas of expertise: Python development, network security penetration, Windows domain controlled exchange architecture Today’s focus: windows series to find the treasure of station C 1. Windows operating system resource collection 2. Collection of adventure hunting operating systems: Korean red star, domestic Kirin, red flag, penetration special system, […]
-
Ubuntu20. 04 installation detailed graphic tutorial (dual system)
Time:2022-5-1Ubuntu installation preface Recently, I want to change my development environment to Linux. After checking, I still find that the Ubuntu desktop is beautiful and the ecosystem as a production system is good. I decided to use Ubuntu. Started looking for ways to install Ubuntu dual systems. There are three types of installation: Virtual machine […]