Linux technology introduction_linux庐 technology reference-程序员宅基地

技术标签: 随笔  linux  

Linux is a free to use and the spread of free Unix-like operating systems, based on POSIX and Unix is a multiuser, multitasking, and support multithreading and multiple CPU operating system. With the development of the Internet, the Linux software enthusiasts from all over the world got, organization, the support of the company.  It besides in server operating system maintained a strong momentum of development, on personal computers, embedded system has a great progress.  Users not only can directly obtain the realization mechanism of the operating system, and can be modified according to the needs of their own to improve the operating system, to maximize its to adapt to the needs of the user.

A brief history of Linux

The birth of the Linux operating system, the development and growth process is always dependent on five important pillars: Unix operating system, MINIX operating system, the GNU project, POSIX standards, and the Internet.

In the 1980 s, the performance of computer hardware, the growing market of PC, at that time, which can be chosen by the computer's operating system Unix, DOS and MacOS which are the main types. Unix is expensive, not running on the PC;DOS is humble, and source code by software vendors strictly confidential;

MacOS is a dedicated to apple computer's operating system. At this point, the computer science is an urgent need to a more perfect, strong, cheap and completely open operating system. Due to the typical operating system for the use of teaching are very few, so at that time in the Netherlands when American professor Andrew S. Tanenbaum writing an operating system, called MINIX, in order to tell the students internal working principle of the operating system. MINIX while is very good, but is just a simple operating system used for teaching purposes, rather than a strong practical operating system, but the biggest advantage is that open source code. Student of computers around the world by studying MINIX source code to run MINIX operating system in the computer, a sophomore students at the university of Helsinki, Finland, Linus Torvalds is one of them, on the basis of absorbing the essence MINIX, Linus wrote in 1991 of his own Linux operating system version for Linux0.01, marks the beginning of the age of Linux. He took advantage of the core of Unix, remove the multifarious core program, make it applicable to general computer x86 system, and on the Internet for everyone to download, launched in 1994, the core of the complete Version1.0, at this point, the Linux gradually become fully functional, stable operating system, and widely used.

The Linux key features

The basic idea

Linux there are two basic ideas: first, everything is a file; Second, each software has certain purposes. The first article in detail is the system of all boil down to a file, including command, hardware and software, operating systems, process equipment and so forth for the operating system kernel, is treated as have their respective characteristic or type of file. As for Linux is based on Unix, is largely because the basic idea of the two is very close.

Completely free

Linux is a free operating system, users can through the Internet or other ways for free, and is free to modify the source code. This is the other operating system. It is because of this, countless programmers from around the world involved in the modification of Linux, written work, the programmer can according to their own interest and inspiration to change, it makes Linux absorb the essence of countless programmers, growing.

Fully compatible with POSIX1.0 standards.

This enables under Linux through corresponding simulator run common DOS, Windows program. This laid the groundwork for users from Windows to Linux. Many users when considering using Linux, just think of before common program under Windows can run normally, it is to eliminate their doubts.

Multi-user, multi-tasking

Linux supports multiple users, each user for your own file equipment have their own special rights, ensure the mutual influence between each user. Multitasking is now one of the main characteristics of computer Linux can run multiple programs at the same time and independently.

Good interface

Linux also has the character interface and graphical interface. In character interface the user can through the keyboard input the corresponding operating instructions. It also provides similar to Windows graphic interface of the X Window system, users can use the mouse to operate. In the X - and in Windows in Windows environment are similar, can be a Linux version of Windows.

Support for multiple platforms

Linux can run on multiple hardware platforms, such as x86, 680 x0, SPARC, Alpha processor platform. In addition Linux is a kind of embedded operating system, can run on the handheld computers, set-top boxes, or game. Released in January 2001, the Linux kernel version 2.4 has been able to fully support Intel64 chip architecture. Linux also supports multiprocessor technology at the same time. Multiple processors work at the same time, make the system performance is greatly improved.

Advantages

  1. Linux is composed of many micro kernel, its source code is completely open source;
  2. Linux inherits the Unix features, have very strong network function, its support for all Internet protocol, TCP/IPv4, TCP/IPv6 and link layer topology procedures, etc , and can use the Unix network characteristics of developed a new protocol stack;
  3. Linux system tool chain is complete, simple operation can configure a suitable development environment, can simplify the development process, reduce the obstacles in developing simulation tools, the system has strong portability;

System kernel routing forwarding

Linux operating system, embedded in the TCP/IP protocol stack protocol software with functions of routing forwarding. Installed in the routing forwarding dependence as the router's host nic, when a piece of card to receive packets, system kernel will according to the packet's destination IP address, query routing table, and then according to the query results to send the packet to another piece of card, the packets sent out at last, through the network card. The host of the process is to complete a the core functions of a router.

By modifying the Linux kernel parameter ip_forward routing function, the way of system use sysctl command configuration and display in the/proc/sys directory kernel parameters. First in the command line, enter: cat/proc/sys/net/ipv4 / ip_forwad, check if the Linux kernel, IP forwarding functions. If the result is 1, which indicates that the routing forwarding functions already open; If the result is 0 that they are not open. For security reasons, the Linux kernel by default packet routing forwarding is prohibited. In a Linux system, there are temporary and permanent forward two methods to enable function.

Temporary enable: this method only for the current session, no longer enabled after system restart. Temporary open command format: sysctl - wnet ipv4. Ip_forward = 1.

Permanent enable: this permanent enable IP forwarding function, by changing the configuration file/etc/sysctl . Conf statement of the "net. Ipv4. Ip_forward = 0", changed to "net. Ipv4. Ip_forward = 1", save the configuration file after executing commands sysctl -p/etc/sysctl. Conf, configuration immediately.

Safety hidden danger and reinforcement measures

User account login and security

Delete the redundant users and user groups. Linux is a multi-user operating system, there are many different accounts, the role of the system after installation is complete operating system, the system will default to not add xu user groups and users, if part of the user or user group does not need, should remove them immediately, otherwise the hackers are likely to take advantage of these accounts, the server to carry out attacks. What keep account, may be determined in terms of the use of the server.

Shut down unnecessary system services. Operating system installation is completed, it will be in the process of installation, can start independent of the various types of service program content, for the long time running server, the operation of the service program, the more the less then the safety of the system. So, the user or user group will need to apply some service procedures that cannot be closed, the performance, the safety of the hoisting system has a great help.

Password security policy. Under Linux, remote login system has two kinds of authentication in the form of: that is the key and password authentication. Among them, the key form of authentication, mainly is the public key is stored on a remote server, the private key is stored locally. When landing system, and then through the local private key, public key, as well as the remote server matching operation of authentication, if authentication matching degree is consistent, the user can login system unobstructed. Such authentication way, will not be threatened by brute force. At the same time, you just need to ensure the safety of the local private key, so that it won't be hackers steal, the attacker is not able to log in to the system by means of such certification. So, it is recommended to use the key system in the form of landed.

Effective application of su , sudo command. The role of the su command is to switch to the user. When the administrator login to the system, use the su command to switch to the super user role to perform some need super authority command. But due to the large super user permissions, at the same time, need to know the super user password management personnel, so the su command has very serious management risk.

Sudo command allows the system to give ordinary users some super powers, and does not need to ordinary users to switch to the super user. On the management, therefore, should be detailed rights allocation mechanism, using sudo commands for each administrator serve its specific administrative privileges.

The remote access and login authentication security

Remote login use SSH to log in. Telnet is a kind of login authentication services, that pose a safety hazard in the above network to transmit content using clear, hackers can easily through the Telnet packets, won the user's login password. And Telnet service program security verification way there is a big security hidden danger, make it become the target of hackers. The SSH service is to encrypt the data transmission, to prevent cheating and IP spoofing, DNS and transmission of data is compressed, to a certain extent to ensure the security of the remote connection by the server.

Embedded Linux

To make the appropriate changes to your Linux and cut, and able to use the system in the embedded system is embedded Linux operating system. Has the following features:

Linux system is completely open, free of charge. It is open, it can be compatible with each other, and other system to realize information interconnection. And it is free to modify the source code, this is what other system does not have.

Advantage of the Linux operating system is the more users and tasks. Ensures that multiple users to use each other ; Multitasking after independence of each other, greatly improve the efficiency, can give full play to performance.

Equipment is independent. As long as the install driver, the driver of the support and help, any user can like using file, to the operation and use of any device, which makes people without considering equipment specific form of existence.

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/qq_35987486/article/details/103164279

智能推荐

解决win10/win8/8.1 64位操作系统MT65xx preloader线刷驱动无法安装_mt65驱动-程序员宅基地

文章浏览阅读1.3w次。转载自 http://www.miui.com/thread-2003672-1-1.html 当手机在刷错包或者误修改删除系统文件后会出现无法开机或者是移动定制(联通合约机)版想刷标准版,这时就会用到线刷,首先就是安装线刷驱动。 在XP和win7上线刷是比较方便的,用那个驱动自动安装版,直接就可以安装好,完成线刷。不过现在也有好多机友换成了win8/8.1系统,再使用这个_mt65驱动

SonarQube简介及客户端集成_sonar的客户端区别-程序员宅基地

文章浏览阅读1k次。SonarQube是一个代码质量管理平台,可以扫描监测代码并给出质量评价及修改建议,通过插件机制支持25+中开发语言,可以很容易与gradle\maven\jenkins等工具进行集成,是非常流行的代码质量管控平台。通CheckStyle、findbugs等工具定位不同,SonarQube定位于平台,有完善的管理机制及强大的管理页面,并通过插件支持checkstyle及findbugs等既有的流..._sonar的客户端区别

元学习系列(六):神经图灵机详细分析_神经图灵机方法改进-程序员宅基地

文章浏览阅读3.4k次,点赞2次,收藏27次。神经图灵机是LSTM、GRU的改进版本,本质上依然包含一个外部记忆结构、可对记忆进行读写操作,主要针对读写操作进行了改进,或者说提出了一种新的读写操作思路。神经图灵机之所以叫这个名字是因为它通过深度学习模型模拟了图灵机,但是我觉得如果先去介绍图灵机的概念,就会搞得很混乱,所以这里主要从神经图灵机改进了LSTM的哪些方面入手进行讲解,同时,由于模型的结构比较复杂,为了让思路更清晰,这次也会分开几..._神经图灵机方法改进

【机器学习】机器学习模型迭代方法(Python)-程序员宅基地

文章浏览阅读2.8k次。一、模型迭代方法机器学习模型在实际应用的场景,通常要根据新增的数据下进行模型的迭代,常见的模型迭代方法有以下几种:1、全量数据重新训练一个模型,直接合并历史训练数据与新增的数据,模型直接离线学习全量数据,学习得到一个全新的模型。优缺点:这也是实际最为常见的模型迭代方式,通常模型效果也是最好的,但这样模型迭代比较耗时,资源耗费比较多,实时性较差,特别是在大数据场景更为困难;2、模型融合的方法,将旧模..._模型迭代

base64图片打成Zip包上传,以及服务端解压的简单实现_base64可以装换zip吗-程序员宅基地

文章浏览阅读2.3k次。1、前言上传图片一般采用异步上传的方式,但是异步上传带来不好的地方,就如果图片有改变或者删除,图片服务器端就会造成浪费。所以有时候就会和参数同步提交。笔者喜欢base64图片一起上传,但是图片过多时就会出现数据丢失等异常。因为tomcat的post请求默认是2M的长度限制。2、解决办法有两种:① 修改tomcat的servel.xml的配置文件,设置 maxPostSize=..._base64可以装换zip吗

Opencv自然场景文本识别系统(源码&教程)_opencv自然场景实时识别文字-程序员宅基地

文章浏览阅读1k次,点赞17次,收藏22次。Opencv自然场景文本识别系统(源码&教程)_opencv自然场景实时识别文字

随便推点

ESXi 快速复制虚拟机脚本_exsi6.7快速克隆centos-程序员宅基地

文章浏览阅读1.3k次。拷贝虚拟机文件时间比较长,因为虚拟机 flat 文件很大,所以要等。脚本完成后,以复制虚拟机文件夹。将以下脚本内容写入文件。_exsi6.7快速克隆centos

好友推荐—基于关系的java和spark代码实现_本关任务:使用 spark core 知识完成 " 好友推荐 " 的程序。-程序员宅基地

文章浏览阅读2k次。本文主要实现基于二度好友的推荐。数学公式参考于:http://blog.csdn.net/qq_14950717/article/details/52197565测试数据为自己随手画的关系图把图片整理成文本信息如下:a b c d e f yb c a f gc a b dd c a e h q re f h d af e a b gg h f bh e g i di j m n ..._本关任务:使用 spark core 知识完成 " 好友推荐 " 的程序。

南京大学-高级程序设计复习总结_南京大学高级程序设计-程序员宅基地

文章浏览阅读367次。南京大学高级程序设计期末复习总结,c++面向对象编程_南京大学高级程序设计

4.朴素贝叶斯分类器实现-matlab_朴素贝叶斯 matlab训练和测试输出-程序员宅基地

文章浏览阅读3.1k次,点赞2次,收藏12次。实现朴素贝叶斯分类器,并且根据李航《统计机器学习》第四章提供的数据训练与测试,结果与书中一致分别实现了朴素贝叶斯以及带有laplace平滑的朴素贝叶斯%书中例题实现朴素贝叶斯%特征1的取值集合A1=[1;2;3];%特征2的取值集合A2=[4;5;6];%S M LAValues={A1;A2};%Y的取值集合YValue=[-1;1];%数据集和T=[ 1,4,-1;..._朴素贝叶斯 matlab训练和测试输出

Markdown 文本换行_markdowntext 换行-程序员宅基地

文章浏览阅读1.6k次。Markdown 文本换行_markdowntext 换行

错误:0xC0000022 在运行 Microsoft Windows 非核心版本的计算机上,运行”slui.exe 0x2a 0xC0000022″以显示错误文本_错误: 0xc0000022 在运行 microsoft windows 非核心版本的计算机上,运行-程序员宅基地

文章浏览阅读6.7w次,点赞2次,收藏37次。win10 2016长期服务版激活错误解决方法:打开“注册表编辑器”;(Windows + R然后输入Regedit)修改SkipRearm的值为1:(在HKEY_LOCAL_MACHINE–》SOFTWARE–》Microsoft–》Windows NT–》CurrentVersion–》SoftwareProtectionPlatform里面,将SkipRearm的值修改为1)重..._错误: 0xc0000022 在运行 microsoft windows 非核心版本的计算机上,运行“slui.ex