slabtop displays detailed kernel strip cache information in real time. It displays a list of top-level caches sorted by one of the listed sort criteria. It also displays a statistics header filled with slab layer information.
The application scope of this command: RedHat, RHEL, Ubuntu, CentOS, Fedora, SUSE, openSUSE.
Posted on Thu, 14 Nov 2019 15:29:46 -0500 by studgate
Links to the original text: https://my.oschina.net/u/1590001/blog/268230
Fedora 20 release, not rc.local support, in fact, just delete the rc.local file. If you want ...
Posted on Fri, 04 Oct 2019 11:47:41 -0400 by DEVILofDARKNESS
Fedora's software source configuration files can be multiple, among which the system default Fedora warehouse configuration file is / etc/yum.repos.d/fedora.repo, and the system default updates warehouse configuration file is / etc/yum.repos.d/fedora-updates.repo.# Fedora's first mandatory source: RPMFusion (https://rpmfusion.org/Configuration) ...
Posted on Sun, 07 Jul 2019 23:02:16 -0400 by ppatwari
yum, full name "Yellow dog Update, Modified", is a Shell Front End Package Manager in Fedora, RedHat, and CentOS.Packages that can be downloaded with yum include Fedora's own package and Fedora Extras from rpmfusion and rpm. All are maintained by the Linux community and are essentially free software.All packages have a separate PGP s ...
Posted on Thu, 20 Jun 2019 12:39:44 -0400 by domerdel
Linux users and OSX users must be familiar with the package manager. Through the package manager, you can install a package by one line of commands, and then the package manager will help you download the package from the source, while automatically resolving all dependencies (that is, downloading other packages on which to instal ...
Posted on Thu, 18 Apr 2019 21:57:33 -0400 by stevenm187
Introduction to Deny Hosts
When your linux server is exposed to the outside world, it is highly likely that the server will be scanned by the scanning software on the Internet, and then try to connect to the SSH port for violent cracking (exhaustive scanning). If you encounter this problem, DenyHosts, a very useful tool, can prevent attempts t ...
Posted on Fri, 12 Apr 2019 17:27:33 -0400 by wisewood
Preface A previous blog post Apache httpd version 2.2 and part of the experiment of version 2.4 In experiment 2, it is mentioned that mod_auth_mysql.so module is used for protocol authentication. This paper will describe the installation and configuration of this module, as well as the support for aes encryption characteristics.Installatio ...
Posted on Fri, 21 Dec 2018 14:18:05 -0500 by Dasndan
ls is the most common command we use in Linux. It can be used to print the current directory or make a list of directories, display some information of files, etc.
Ls-a can display all files (including hidden files) in the directory
Ls-l lists long data strings, including data such as file attributes and permissions
Ls-r ou ...
Posted on Mon, 17 Dec 2018 07:12:04 -0500 by locell