0 personal information
1 purpose of the experiment
Learn more about memory management through programming.
2 experiment content
On the server, we use Vim to write a program: simulate a memory management algorithm, test the result, and explain the running result.
3. Experiment report
Three po ...
Added by bryansu on Sun, 17 May 2020 11:48:25 +0300
come from How to avoid kernel detection in Linux Rootkit
Remember to lock the door when Rootkit is successful.
If we want to inject a Rootkit into the kernel and do not want to be detected at the same time, what we need to do is to hide it subtly and keep it quiet. I have talked about this topic, such as process disconnection, TCP link discon ...
Added by Daddy on Sun, 17 May 2020 06:59:07 +0300
What is a container?In life, our common containers are all kinds of bottles, jars and jars, all kinds of things that can hold other materials are called containers. The characteristics of containers are that they have a good isolation function, which makes different materials isolated from each other. In addition, containers are convenient to t ...
Added by bbbaldie on Sat, 16 May 2020 19:21:00 +0300
1, Date and time functions
1. Function to get the current dateIt's the same. It's different
CURDATE() : Used to get the current date of the system
CURRENT_DATE() Used by the system to get the current date
mysql> select CURDATE(),CURRENT_DATE();
2. Get function of current time
CURTIME() : Used to get the current time of the system
Added by brighton on Thu, 14 May 2020 12:11:49 +0300
Use Prometheus and Grafana to monitor MySQL server performance.Use two exporter s:Node? Exporter: server system data collectionmysqld_exporter: MySQL server data collectionMonitoring architecture:
Prometheus installation configurationInstallation mode binary installation, see here for details CentOS7 deployment PrometheusVersion: current late ...
Added by dhruvasagar on Thu, 14 May 2020 02:15:46 +0300
In many applications, creating multiple processes is an effective method for task decomposition. For example, a network server process can create a new subprocess to process each request while listening for client requests. At the same time, the server process will continue to listen for more client connection requests. Decomposin ...
Added by vinny69 on Wed, 13 May 2020 07:56:54 +0300
The tune2fs command allows system administrators to adjust, set, and view file system parameters on a Linux ext2, ext3, or ext4 file system. tune2fs -l displays only the content on the superblock. Sometimes when using the tune2fs command, you encounter an error like "Couldn't find valid filesystem superblock". This may be because you ...
Added by egroeg41 on Sun, 10 May 2020 17:14:41 +0300
Blocking IO Model (Blocking I/O)
The Linux kernel initially provides read and write blocking operations.
When a client connects, a corresponding file descriptor (0 standard input, 1 standard output, 2 standard error output) is generated in the file descriptor directory of the corresponding process (/proc/process number/fd), such as FD 8, FD 9 ...
Added by eulalyn09 on Sun, 10 May 2020 11:54:46 +0300
Background: for a recent countdown learning time recording project, you need to record the progress of the current page when the user clicks the back button of the browser or directly closes the browser, or directly exits wechat or enters the background. The next time you go in, you need to start the countdown from the last place you left. At f ...
Added by edgev on Fri, 08 May 2020 13:39:14 +0300
All of the following are performed as root
View Linux distribution
[root@localhost ~]# cat /etc/os-release
PRETTY_NAME="CentOS Linux 7 (Core)"
Added by ShaolinF on Thu, 07 May 2020 18:19:26 +0300