current location:Home>Technical Articles>System Tutorial
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- What process do you go through when entering a URL in your browser?
- 1: Description of related concepts: 1.1: DNS (DomainnameSystem) cache: (Domain name system) (check the ipconfig/displaydns of the local machine) After the computer resolves a domain name, it associates this domain name with the host IP address , the computer saves this relationship in the DNS cache table. The next time the computer enters www.baidu.com, the computer will know the IP address corresponding to this domain name by searching the DNS cache, and no longer perform domain name resolution, which improves Improved efficiency 1.2: IP address: The IP address corresponds to a house number. We can find the location of the host through this address. 1.3: Domain name: (domainname)
- LINUX 810 2024-08-08 08:16:02
-
- Modify hosts file and hostname: easily realize domain name and IP address mapping
- Directory 1. Modify the hosts file. The hosts file is a configuration file under /etc. The LINUX delete directory records the IP address corresponding to the domain name or host name. Every computer on the Internet will have an IP address, which is similar to a specific door steel number. This machine can be accessed through the IP address. However, it is difficult to remember the IP address and modify it in the linuxhosts file, so you can use the method of mapping the IP address to the domain name to access the specific host by accessing the domain name. The hosts file records this mapping relationship. Change hosts: First, ping Baidu to get an ipvim/etc/hosts. Add the IP copied above to hosts where baidubaidu1 leads to the previous IP two.
- LINUX 906 2024-08-08 01:54:33
-
- What should I do if the Linux command line displays garbled characters? Set the character encoding to UTF-8 to solve the problem
- When the Linux command line displays garbled characters, you can try setting the character encoding to UTF-8. It can be set through the following commands:,, "bash, exportLC_ALL=en_US.UTF-8, exportLANG=en_US.UTF-8," In Linux systems, it is a common problem for the command line to display garbled characters, which is generally due to character encoding. This article will introduce in detail how to solve the problem of garbled characters displayed on the Linux command line due to incorrect settings. 1. Understand character encoding. Before solving this problem, we need to understand the basic concept of character encoding. Character encoding is a correspondence between characters (such as letters, numbers, and punctuation marks) and two's complement numbers (0 and 1). relations advance
- LINUX 303 2024-08-08 01:37:43
-
- Detailed steps and methods for modifying the hosts file in Android system
- For some reasons, it may be necessary to change the domain name specified in the hosts file to the corresponding IP address. Android is a Linux-based system. Similar to Linux, it is set up through the hosts file. Under Android, /etc is the Linux training link to /system/etc. We need to change /system/etc/hosts to achieve this. And this file is read-only and cannot be changed directly through the shell. This can be changed by connecting to a PC using adb. The steps are as follows: 1. Obtain root permissions: adbroot 2. Set /system to be readable and writable: adbremount 3. Copy the hosts file to PC: a
- LINUX 253 2024-08-07 22:43:44
-
- Red Hat Linux system download, installation, system monitoring, and process management tutorials
- Table of Contents of Series Articles Chapter 1: Redhat Linux System Download and Installation Chapter 2: Linux Users and Groups Chapter 3: Linux File Management Chapter 4: Linux Directory Management Chapter 5: Linux Text Editor Chapter 6: Linux File Search and Management Chapter 7: Linux input, output redirection and pipeline Chapter 8: Linux package management Chapter 9: Linux system monitoring and process management Article table of contents Preface The main content of this blog is about system monitoring and process management, etc. The operation is still based on experiments. Follow the old rules and remember to take a snapshot in advance. 1. System monitoring query information uname-runame-alscpuhostnametoptop command
- LINUX 447 2024-08-07 21:36:43
-
- STM32 and Linux: From hardware to software, the key to mastering the operating system mechanism
- Hello, landlord! I'm not going to talk to you about the big ideas like those above, but I'm going to talk to you about the practical things. Linux and stm32 are a software platform and a hardware platform, which are completely different (remember, they are platforms!). Let's put it this way, since you like microcontrollers, you should first learn the detailed explanation of stm32 embedded Linux device driver development and lay a solid foundation for the hardware, especially various buses (usb, iic, spi...), various peripheral modules (infrared , Wenhu, mpu6050...), and then focused on ucosii, that is to say, learn to complete your tasks within the framework of the operating system, rather than simply writing programs - the understanding of the operating system mechanism Grasp is the key to distance yourself from the MCU friends around you;
- LINUX 410 2024-08-07 21:00:24
-
- How to check for updates in Bandi Screen Recording
- How to check for updates in Bandi Screen Recording? Bandi Screen Recording provides a simple screen recording operation method. You can obtain worry-free screen recording and screenshot operations during use. Then you can check the version for updates during use. For this reason, We have compiled detailed tutorials for you to check. According to the tutorials, you can easily check whether the currently installed version needs to be updated. Bandy screen recording check update method 1. Click on the Bandy screen recording file on the desktop and click to open it. 2. Enter the home page of the software and click the About option on the left. 3. Click Check for Updates on the About page. 4. In the pop-up window, you can set the automatic update function, or click to detect updates immediately. 5. Then you can find out whether the current version is the latest version. If it is the latest version, there is no need to update.
- Windows Series 949 2024-08-07 20:58:56
-
- Centos6.4 Installation Guide: Detailed Graphical Tutorial on Installation via USB Disk
- If you want to install Centos6.4, in fact, the first thing you will think of is using a USB flash drive as a carrier. Because the USB flash drive has a relatively high usage rate, is easy to carry and efficient in storage, it is one of the best choices. Tomorrow the editor will explain it to you. Provides detailed graphic and text strategies for installing Centos 6.4 via USB flash drive. 1. First we need to download UltraISO (floppy disk) and Centos6.4 image, install the software, insert the USB disk, open the UltraISO software, find the Centos6.4 installation image (as shown in the figure), delete other files and keep only images and isolinux Two folders and the TRANS.TBL file, only these three files are enough. 2. As shown in the figure, select "Write" under the "Start" button
- LINUX 451 2024-08-07 20:40:53
-
- H2Miner virus invades Windows/Linux platform, beware of long-term persistence of mining programs
- H2Miner alertness level★★★Affected platforms: Windows/Linux virus execution body Description Attackers use vulnerabilities to invade Windows platforms and Linux platforms. On the Windows platform, the attacking host downloads and executes the XML file wbw.xml, executes a PowerShell command in the XML file, and downloads a script named 1.ps1. This script downloads the mining program and mining configuration file and renames it for execution. , create a scheduled task and execute the 1.ps1 script every 30 minutes to achieve persistence and stay on the attack host all year round; on the Linux platform, the attack host downloads and executes an XML file named wb.xml, which is embedded using the same method. Got it
- LINUX 782 2024-08-07 20:40:30
-
- Where is win10 disk cleanup
- Where is the disk cleanup in win10? In the process of using the computer system, a wealth of data will inevitably be generated to occupy the disk. So how to use the disk cleanup function in the system? There are many computer novices who don’t know how to operate it. For this reason The editor has compiled detailed tutorials for you to check out. Interested friends can read and learn more. Win10 Disk Cleanup Location Introduction 1. Click My Computer on the desktop. 2. Right-click the disk you want to clean and click the Properties function at the bottom. 3. Click the Disk Cleanup function on the properties page. 4. On the Disk Cleanup page, check the content that needs to be cleaned and click OK below. 5. Wait for the cleanup to be completed, or click Cancel to cancel the cleanup operation.
- Windows Series 567 2024-08-07 20:31:49
-
- Introduction to popular Linux systems and methods of making USB boot images
- This article mainly introduces several popular Linux systems. Basically, Debian and Ubuntu systems are similar. First, suselinux. What should be noted here is that you must have a Linux or FreeBSD system on hand to use the zcat command. In fact, it must also be a system that can recognize USBStorage. Usually, you can use VMWare to serve any minimal Linux. Then go to the corresponding Linux release version to download a bootable img to the U disk. The download address is as follows: DebianSid:/debian/dists/sid/ma...dia/boot.img.gz (This is to make the U disk boot
- LINUX 848 2024-08-07 19:48:21
-
- Microservice architecture—graceful shutdown solution
- Abstract: Application graceful shutdown in microservice architecture mainly refers to the planned and smooth exit of application instances (that is, no incidents that need to be handled). 1 Introduction Graceful downtime of applications in microservice architecture mainly refers to the planned and smooth exit of application instances (that is, without causing incidents that need to be handled). Application server shutdowns are mainly divided into two categories: active shutdowns and passive shutdowns, of which active shutdowns and most passive shutdowns can achieve graceful shutdowns. If the application does not shut down gracefully, the following situations will occur: Data loss: The data in the memory has not been persisted to the disk. File corruption: The file being written is not updated due to file corruption. Request loss: Queued for processing. Request lost and response lost: the successful transaction has not had time to respond to the transaction
- LINUX 547 2024-08-07 18:47:02
-
- How to put a website into memory to speed up the website under Linux
- /dev/shm/ is a device file, which uses the tmpfs file system (note: under Centos and Redhat, the /dev/shm directory is a link pointing to the /run/shm directory, which corresponds to the tmpfs file system under the Ubuntu system It is the /run/shm directory (you can use the df command to view it), because the /dev/shm/ directory is not on the hard disk, but in the memory. It is the so-called tmpfs. You can view it through the command df-h. The default size of tmpfs is half of the physical memory. Of course, it can be adjusted according to the actual situation. First create a directory wpcachemkdir/dev for WordPress’s cache files.
- LINUX 1011 2024-08-07 18:46:33
-
- How to install and configure ArangoDB
- ArangoDB is an open source distributed native multi-model database. It is a NoSQL database with three data models: graph, document and key/value. ArangoDB uses SQL-like query language (AQL) to build high-performance applications. ArangoDB installation ArangoDB supports installation on Windows, Linux, Docker, Mac and other systems. Installation of ArangoDB under Windows You can download the compressed package version or the executable file version under Windows. I prefer to use the compressed package version. After downloading, just select a directory and decompress it directly. untie
- LINUX 575 2024-08-07 18:19:21
-
- Linux uses instructions to release cache methods
- The caching mechanism of the Linux system is quite advanced. It caches dentry (used for VFS to accelerate the conversion of file path names to inodes), BufferCache (for reading and writing disk blocks) and PageCache (for reading and writing file inodes). operate. However, after a large number of file operations are performed, the cache will basically use up the memory resources. But in fact, our file operation has been completed, and this part of the cache is no longer used. At this time, can we just watch the cache occupy the memory space? Therefore, we still need to manually release the memory under Linux, which is actually the operation of releasing the cache. To achieve the purpose of releasing the cache, we first need to
- LINUX 857 2024-08-07 16:33:47