High-Performance Network Programming in Linux: Implementing 22 High-Concurrency Models with C++11

High-Performance Network Programming in Linux: Implementing 22 High-Concurrency Models with C++11

Reflecting on a long-overdue blog post about “High-Performance Network Programming in Linux,” I spent the weekend coding to organize this article that implements 22 high-concurrency models using C++11. GitHub code repository: https://github.com/linkxzhou/mylib/tree/master/c%2B%2B/concurrency_server concurrency_server/ ├── base/ # Base component directory │ └── server_base.h # Base class for the server, providing common socket operations ├── benchmark/ # … Read more

Mastering the Linux File System: A Guide to the mkdir Command and Its Practical Applications

Mastering the Linux File System: A Guide to the mkdir Command and Its Practical Applications

Warm Reminder If you like this article, please share it with your friends. If you have questions or want more information, please follow or leave a message. In Linux systems, creating directories is one of the fundamental operations in file management.<span><span>mkdir</span></span> command is a commonly used tool for creating directories, providing convenient options to help … Read more

Using Knoppix for Linux System Intrusion Detection

Using Knoppix for Linux System Intrusion Detection

Knoppix is a Debian-based Live Linux distribution that is very suitable for system recovery and intrusion detection because it can boot directly from CD/DVD or USB without needing to be installed on the hard drive, and it does not modify the target system. Advantages of Using Knoppix for Intrusion Detection No Trace Operation: Does not … Read more

From Symbol Hijacking to Runtime Tracing in Linux: How to Function Hook, Audit Hijacking, and Function Instrumentation?

From Symbol Hijacking to Runtime Tracing in Linux: How to Function Hook, Audit Hijacking, and Function Instrumentation?

Hello, friends! Hooking using LD_PRELOAD Hooking using LD_PRELOAD Hooking using RTLD_NEXT LD_AUDIT linker listening mechanism GCC function instrumentation feature (-finstrument-functions) In this article, we will learn about Linux from symbol hijacking to runtime tracing: function hooking (LD_PRELOAD), audit stream hijacking (LD_AUDIT), and function instrumentation, as well as how to use and leverage these tools. Hooking … Read more

Complete Guide to Installing Nginx on Rocky Linux 9

Complete Guide to Installing Nginx on Rocky Linux 9

Complete Guide to Installing Nginx on Rocky Linux 9 1. Environment Preparation 1. System Update sudo dnf update -y sudo dnf install epel-release -y 2. Firewall Configuration sudo firewall-cmd –permanent –add-service=http sudo firewall-cmd –permanent –add-service=https sudo firewall-cmd –reload 2. Installing Nginx Install via EPEL Repository sudo dnf install nginx -y 2. Verify Installation Version nginx … Read more

Quick Start Guide to Linux Operations: Transitioning Your Windows Habits to Linux

Quick Start Guide to Linux Operations: Transitioning Your Windows Habits to Linux

In the previous two articles, I introduced how to purchase a cloud server for just 99 yuan and set up your own website, and explained how to gradually master user management operations on the cloud server ECS. In this article, we will gradually get started with Linux operations, focusing on command line usage. It can … Read more

In-Depth Analysis of Linux Kernel Linked Lists: The Secrets and Practical Guide to list.h

In-Depth Analysis of Linux Kernel Linked Lists: The Secrets and Practical Guide to list.h

In the world of the Linux kernel, data structures are like the foundation of a building, supporting the efficient operation of the entire system. Linked lists, as a flexible and commonly used data structure, play a crucial role in the kernel. Today, we will delve into the implementation of linked lists in the Linux kernel—list.h—and … Read more

Why Everyone Should Consider Using Linux for Development

Why Everyone Should Consider Using Linux for Development

Follow our public account for Java insightsDelivered promptly👇 Source:cnblogs.com/summertime-wu/p/11140052.html Is Linux usable? Does Linux have a graphical interface? Supports daily development Social communication is not an issue Can Linux replace Windows? Running Android applications on Linux What advantages does Linux have? Linux is elegant Linux is efficient Linux is free Linux can also be beautiful … Read more

Common Linux Commands

Common Linux Commands

1. Delete expired files in Linux find /u01/dsg/supersync/s01/ds/xdt/ -type f -name “*.xdt” -mtime +3 -delete 2. Delete expired files and log the deletions find /u01/dsg/supersync/s01/ds/xdt/ -name “*.xdt” -mtime +3 -printf “Deleting %p\n” -delete | tee deletion.log 3. Step-by-step logging service nginx start 1> /var/log/nginx/start.log 2> /var/log/nginx/start_errors.log Normal logs are recorded in start.log, and error logs … Read more

Using Linux File Locking to Solve Multi-Process Concurrency Issues

Using Linux File Locking to Solve Multi-Process Concurrency Issues

Click on the above“Embedded and Linux Matters” Select“Pin/Star Public Account”Benefits and resources delivered promptly Hello everyone, I am the Information Guy~ As the project gradually comes to a close, I am summarizing some technical points of Linux application development. Since my project is a multi-process system, it involves issues of resource sharing among processes. The … Read more