Memory Debugging with Valgrind on Linux

Memory Debugging with Valgrind on Linux

1. Overview Valgrind is an open-source memory debugging and performance analysis tool used to help developers identify memory errors in programs, such as memory leaks, use of uninitialized memory, illegal memory access, and other issues. It is widely used on the Linux platform and supports multiple processor architectures. 2. Using Valgrind 1. Basic Format valgrind … Read more

Udev Hotplug Rules in Linux

Udev Hotplug Rules in Linux

Word count: 1104, reading time approximately 6 minutes Udev Hotplug Rules in Linux Background Udev is a tool used in Linux systems to manage device nodes. It can dynamically create device files based on the attributes of the devices and execute specific commands, typically used for handling hotplugging. Udev rules are used to specify these … Read more

Resetting Root Password in Linux: A Comprehensive Guide

Resetting Root Password in Linux: A Comprehensive Guide

In the world of Linux, the root password is like a master key to unlock the system’s treasures, holding supreme privileges. However, if this “key” is lost, it can lead to significant trouble. Imagine being excited to log into the server and showcase your skills, only to be met with the unyielding “Password incorrect” message, … Read more

Introduction to Bioinformatics: How to Remotely Login to Linux Server

Introduction to Bioinformatics: How to Remotely Login to Linux Server

After purchasing the server and placing it in the machine room, and having the account and password, the question arises: how can we remotely log into the Linux server from our own computer? How to Remotely Login to Linux Server from Windows To remotely log into a server from a Windows system, I have used … Read more

Configure Application or Script to Start on Boot in Linux

Configure Application or Script to Start on Boot in Linux

Introduction Configuring applications or scripts to start automatically on boot in a Linux system is a common requirement. Whether for critical services in a server environment or for frequently used tools on a personal computer, proper configuration can achieve automated startup, enhancing system availability and convenience. This article will detail how to use Systemd to … Read more

How to Install Applications from Source on Linux

How to Install Applications from Source on Linux

Some applications can only be installed from source code. Here’s how to do it. Translated from Linux: How To Install Apps From the Source by Jack Wallen. When I first started using Linux, there was only one way to install applications… from the original source code. Those days are long gone, and now there are … Read more

A Detailed Guide to the Linux Boot Process

A Detailed Guide to the Linux Boot Process

💻 A Detailed Guide to the Linux Boot Process ✨ Today, let’s take a detailed look at the Linux boot process, which is an important foundational knowledge for using the Linux system! 💕 1. Booting The beginning of everything is, of course, booting. When we press the power button, the entire startup process officially begins. … Read more

Essential Linux Server Scripts

Essential Linux Server Scripts

Follow+Star Public Account Number, don’t miss exciting content System Settings Common Mirror Sources Mirror site addresses Official list provided: https://www.debian.org/mirror/list Some domestic ones: ftp.cn.debian.org mirror.bjtu.edu.cn mirror.lzu.edu.cn mirror.nju.edu.cn mirrors.163.com mirrors.bfsu.edu.cn mirrors.hit.edu.cn mirrors.huaweicloud.com mirror.sjtu.edu.cn mirrors.tuna.tsinghua.edu.cn mirrors.ustc.edu.cn Usage: (generally similar) Tsinghua Source –mirror 'https://mirrors.ustc.edu.cn/debian/' Tencent Source –mirror 'https://mirrors.aliyun.com/debian/' Aliyun Source –mirror 'https://mirrors.aliyun.com/debian/' Huawei Source –mirror 'https://mirrors.huaweicloud.com/debian/' SWAP & … Read more

How to Manage Access Control Lists in Linux

How to Manage Access Control Lists in Linux

In Linux systems, Access Control Lists (ACL) are a powerful tool for managing file and directory permissions with finer granularity. Traditional permission management uses a combination of user, group, and other with r (read), w (write), and x (execute). However, as system complexity increases, this method no longer meets the needs for complex permission control. … Read more

Complete Guide to Linux File Systems: Step-by-Step

Complete Guide to Linux File Systems: Step-by-Step

Linux | Red Hat Certification | IT Technology | Operations Engineer 👇1000 people technical exchange QQ group, note [public account] for faster access Components of a Group The following are the components of each group, but not every group has a super block, which will be discussed later. inode table The inode table is a … Read more