Position: Home page » Computing » Etc computing power configuration

Etc computing power configuration

Publish: 2021-05-07 15:57:04
1. Get through the ETC system and the original charging parking system
2.

Setting access permission in httpd.conf of Apache only allows access to intranet segment in VPN. In this way, if you do not connect to VPN, you will not get the IP of the intranet, and you will not be able to access it

the details are as follows:

1. Introction

programming is the abbreviation of programming in Chinese, that is, let the computer solve a problem on behalf of the computer, and stipulate a certain operation mode for a certain calculation system, which is the process of the calculation system running according to the calculation mode and finally getting the corresponding results

in order to make the computer understand people's intention, people must tell the computer the ideas, methods and means of the problems to be solved in the form that the computer can understand, so that the computer can work step by step according to people's instructions and complete certain tasks. The process of communication between people and computing system is programming

2, assembler

assembler. Using assembly language to write computer programs, programmers still need to be very familiar with the hardware structure of the computer system, so the programming itself is still inefficient and cumbersome. But just because of the close relationship between assembly language and computer hardware system, assembly language is still a very effective programming tool in some specific occasions, such as the system core program and real-time control program which require high space-time efficiency

The computer can't recognize, understand and execute the source program except machine language directly, so it must be transformed into the program that can be executed directly by computer in some way. There are two ways to convert the source program written by advanced programming hardware programming language to the machine object program: Interpretation and compilation

3. Method 1:
to make the / etc / profile file take effect immediately after modification, you can use the following command:
;. / etc / profile
note: there are spaces between. And / etc / profile
4. Method 1:
to make the / etc / profile file take effect immediately after modification, you can use the following command:
#. / etc / profile
note: and / etc / profile have spaces
method 2:
to make the / etc / profile file take effect immediately after modification, you can use the following command:
#. Source / etc / profile
5. Change / etc / network / interfaces to modify the IP in it. After modification, you need to restart the network program to take effect. (reboot is actually equivalent to restarting the network program)
with ifconfig eth0 IP, you can think that / etc / network / interfaces has been modified, Then restart the network. This modification takes effect immediately
PS: restart the network command: service network restart
I don't know what system you are using. The IP configuration file of red hat should be in / etc / sysconfig / network script / ifcfg-eth0
6. I haven't heard that mobile phones can brush. In addition to major banks, WeChat and Alipay are now able to handle etc.
7. ① The name of an alias can contain uppercase letters. Numbers, underscores. If it is a letter, it must be capitalized (alias is a group of sets with the same attributes)
② there can be multiple members under an alias, separated by half width (,) commas. Members must be effectively present
an alias member is affected by the alias type_ Alias、User_ Alias、Runas_ Alias、Cmnd_ Alias constraints, define what type of alias, it is necessary to have what type of member matching< (3) the user group must be preceded by a% sign. A member under a command alias must be an absolute path to a file or directory
④ the specified switching user should be enclosed in () brackets. If omitted, the default is root. If all is in brackets, it means that all users can be switched
⑤ command path should use full path
6. Alias rules count as one rule for each line. When there is no room for one line, use & # 92; Continued. If there is more than one line, wrap it with a backslash< In general, it is not recommended to give all permission first and then exclude it. Whatever authority you use, you will be given Pay attention to permissions (Syntax)
if you run the command directly without password, you should add the nopasswd parameter< (8) to prohibit the execution of a certain program or command, add "!" before the command action And after the command is allowed to execute
if you don't understand anything, you can read the book "this is how to learn Linux", which is very suitable for novices to learn Linux.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750