This article is the last section of the previous articles. When you study this part, there will be many places you don't understand, which doesn't matter. As long as you type out these codes after class and can have the same effect as in the screenshot, you can complete the task.
How to write a component?
One of the most import ...
Posted on Thu, 25 Nov 2021 23:18:09 -0500 by MartinGr
Encapsulate the fd read / write events returned by epoll, set callback functions for each event, store all concerned fd and corresponding events in a data structure, and form a one-to-one correspondence with the red black tree nodes inside epoll. When epoll returns, use data.ptr to get the corresponding entry in our data structure, and ...
Posted on Thu, 25 Nov 2021 21:49:24 -0500 by barry_p
We will create a simple API that allows administrator users to view and edit users and groups in the system.
Create a new django project called tutorial and start a new app called quickstart.
# Create the project directory mkdir tutorial
cd tutorial# Create a virtualenv to isolate our local package dependencies
source env/bi ...
1, Linux basic installation and use Linux Installation idea: VM virtual machine installation system, not graphical interface. The system version is CentOS7. Basically, the next step can be completed in turn.
1. Change IP address Note that the network uses bridging (not copying the physical network), so that the virtual machine and the physical ...
Posted on Wed, 24 Nov 2021 09:34:52 -0500 by DapperDanMan
RAID: Strong fault tolerance to ensure data security; Better I/O transmission rate, effectively matching the speed of CPU and memory; Large storage capacity ensures the storage of massive data; Lower performance price ratio.
RAID 0 Strip mode Data cutting, placing different disks in order The free disk space is the number of disks * the minim ...
Posted on Wed, 24 Nov 2021 06:02:22 -0500 by Lucky_PHP_MAN
Detailed explanation of sudo usage, authorization file, sudoers configuration example
Linux sudo command usage details: system permission management
Purpose and characteristics
The su command allows ordinary users to switch to root to execute some privileged commands, but there are some problems, such as:
Administrator passwo ...
Posted on Tue, 23 Nov 2021 23:53:44 -0500 by trygve
1. EC20 module connection
For embedded Linux, 4G network connection is an easy function to realize. Most 4G module interfaces are MiniPCIE interfaces. After a deep understanding, it will be found that the communication interface of 4G module is USB, so the driver of 4G module often uses USB driver. As long as the USB driver is normal, the ...
Posted on Tue, 23 Nov 2021 19:57:46 -0500 by Jumba
1, ELK overview
-Elastic search: responsible for log retrieval and storage -Logstash: responsible for the collection, analysis and processing of logs -Kibana: responsible for the visualization of logs -ELK is a complete set of solutions. It is the acronym of three software products, which are used by many companies, such as Sina, Ctrip, Hua ...
Posted on Tue, 23 Nov 2021 19:21:37 -0500 by EnDee321
I tossed this thing for half a month and read countless articles and tutorials. I can be regarded as a summary. Open the whole!
SSH software: NxShell
Ports are defined according to personal conditions!
1, Install pagoda panel
2, Install Qinglong panel
3, Install Nvjdc
4, Push &n ...
Posted on Tue, 23 Nov 2021 14:44:41 -0500 by madcrazy1
Today, when I read related books, I saw the question "Maximum number of heap requests in the process". We know that allocating memory using malloc is allocated in heap Heap. If a machine has 8GB of physical memory and 5GB of free memory, can we use malloc() to request 5GB of memory? This is true in theory, because these memory is not ...
Posted on Tue, 23 Nov 2021 13:36:27 -0500 by Vincent III