Linux technology introduction_linux庐 technology reference-程序员宅基地

技术标签: 随笔  linux  

Linux is a free to use and the spread of free Unix-like operating systems, based on POSIX and Unix is a multiuser, multitasking, and support multithreading and multiple CPU operating system. With the development of the Internet, the Linux software enthusiasts from all over the world got, organization, the support of the company.  It besides in server operating system maintained a strong momentum of development, on personal computers, embedded system has a great progress.  Users not only can directly obtain the realization mechanism of the operating system, and can be modified according to the needs of their own to improve the operating system, to maximize its to adapt to the needs of the user.

A brief history of Linux

The birth of the Linux operating system, the development and growth process is always dependent on five important pillars: Unix operating system, MINIX operating system, the GNU project, POSIX standards, and the Internet.

In the 1980 s, the performance of computer hardware, the growing market of PC, at that time, which can be chosen by the computer's operating system Unix, DOS and MacOS which are the main types. Unix is expensive, not running on the PC;DOS is humble, and source code by software vendors strictly confidential;

MacOS is a dedicated to apple computer's operating system. At this point, the computer science is an urgent need to a more perfect, strong, cheap and completely open operating system. Due to the typical operating system for the use of teaching are very few, so at that time in the Netherlands when American professor Andrew S. Tanenbaum writing an operating system, called MINIX, in order to tell the students internal working principle of the operating system. MINIX while is very good, but is just a simple operating system used for teaching purposes, rather than a strong practical operating system, but the biggest advantage is that open source code. Student of computers around the world by studying MINIX source code to run MINIX operating system in the computer, a sophomore students at the university of Helsinki, Finland, Linus Torvalds is one of them, on the basis of absorbing the essence MINIX, Linus wrote in 1991 of his own Linux operating system version for Linux0.01, marks the beginning of the age of Linux. He took advantage of the core of Unix, remove the multifarious core program, make it applicable to general computer x86 system, and on the Internet for everyone to download, launched in 1994, the core of the complete Version1.0, at this point, the Linux gradually become fully functional, stable operating system, and widely used.

The Linux key features

The basic idea

Linux there are two basic ideas: first, everything is a file; Second, each software has certain purposes. The first article in detail is the system of all boil down to a file, including command, hardware and software, operating systems, process equipment and so forth for the operating system kernel, is treated as have their respective characteristic or type of file. As for Linux is based on Unix, is largely because the basic idea of the two is very close.

Completely free

Linux is a free operating system, users can through the Internet or other ways for free, and is free to modify the source code. This is the other operating system. It is because of this, countless programmers from around the world involved in the modification of Linux, written work, the programmer can according to their own interest and inspiration to change, it makes Linux absorb the essence of countless programmers, growing.

Fully compatible with POSIX1.0 standards.

This enables under Linux through corresponding simulator run common DOS, Windows program. This laid the groundwork for users from Windows to Linux. Many users when considering using Linux, just think of before common program under Windows can run normally, it is to eliminate their doubts.

Multi-user, multi-tasking

Linux supports multiple users, each user for your own file equipment have their own special rights, ensure the mutual influence between each user. Multitasking is now one of the main characteristics of computer Linux can run multiple programs at the same time and independently.

Good interface

Linux also has the character interface and graphical interface. In character interface the user can through the keyboard input the corresponding operating instructions. It also provides similar to Windows graphic interface of the X Window system, users can use the mouse to operate. In the X - and in Windows in Windows environment are similar, can be a Linux version of Windows.

Support for multiple platforms

Linux can run on multiple hardware platforms, such as x86, 680 x0, SPARC, Alpha processor platform. In addition Linux is a kind of embedded operating system, can run on the handheld computers, set-top boxes, or game. Released in January 2001, the Linux kernel version 2.4 has been able to fully support Intel64 chip architecture. Linux also supports multiprocessor technology at the same time. Multiple processors work at the same time, make the system performance is greatly improved.

Advantages

  1. Linux is composed of many micro kernel, its source code is completely open source;
  2. Linux inherits the Unix features, have very strong network function, its support for all Internet protocol, TCP/IPv4, TCP/IPv6 and link layer topology procedures, etc , and can use the Unix network characteristics of developed a new protocol stack;
  3. Linux system tool chain is complete, simple operation can configure a suitable development environment, can simplify the development process, reduce the obstacles in developing simulation tools, the system has strong portability;

System kernel routing forwarding

Linux operating system, embedded in the TCP/IP protocol stack protocol software with functions of routing forwarding. Installed in the routing forwarding dependence as the router's host nic, when a piece of card to receive packets, system kernel will according to the packet's destination IP address, query routing table, and then according to the query results to send the packet to another piece of card, the packets sent out at last, through the network card. The host of the process is to complete a the core functions of a router.

By modifying the Linux kernel parameter ip_forward routing function, the way of system use sysctl command configuration and display in the/proc/sys directory kernel parameters. First in the command line, enter: cat/proc/sys/net/ipv4 / ip_forwad, check if the Linux kernel, IP forwarding functions. If the result is 1, which indicates that the routing forwarding functions already open; If the result is 0 that they are not open. For security reasons, the Linux kernel by default packet routing forwarding is prohibited. In a Linux system, there are temporary and permanent forward two methods to enable function.

Temporary enable: this method only for the current session, no longer enabled after system restart. Temporary open command format: sysctl - wnet ipv4. Ip_forward = 1.

Permanent enable: this permanent enable IP forwarding function, by changing the configuration file/etc/sysctl . Conf statement of the "net. Ipv4. Ip_forward = 0", changed to "net. Ipv4. Ip_forward = 1", save the configuration file after executing commands sysctl -p/etc/sysctl. Conf, configuration immediately.

Safety hidden danger and reinforcement measures

User account login and security

Delete the redundant users and user groups. Linux is a multi-user operating system, there are many different accounts, the role of the system after installation is complete operating system, the system will default to not add xu user groups and users, if part of the user or user group does not need, should remove them immediately, otherwise the hackers are likely to take advantage of these accounts, the server to carry out attacks. What keep account, may be determined in terms of the use of the server.

Shut down unnecessary system services. Operating system installation is completed, it will be in the process of installation, can start independent of the various types of service program content, for the long time running server, the operation of the service program, the more the less then the safety of the system. So, the user or user group will need to apply some service procedures that cannot be closed, the performance, the safety of the hoisting system has a great help.

Password security policy. Under Linux, remote login system has two kinds of authentication in the form of: that is the key and password authentication. Among them, the key form of authentication, mainly is the public key is stored on a remote server, the private key is stored locally. When landing system, and then through the local private key, public key, as well as the remote server matching operation of authentication, if authentication matching degree is consistent, the user can login system unobstructed. Such authentication way, will not be threatened by brute force. At the same time, you just need to ensure the safety of the local private key, so that it won't be hackers steal, the attacker is not able to log in to the system by means of such certification. So, it is recommended to use the key system in the form of landed.

Effective application of su , sudo command. The role of the su command is to switch to the user. When the administrator login to the system, use the su command to switch to the super user role to perform some need super authority command. But due to the large super user permissions, at the same time, need to know the super user password management personnel, so the su command has very serious management risk.

Sudo command allows the system to give ordinary users some super powers, and does not need to ordinary users to switch to the super user. On the management, therefore, should be detailed rights allocation mechanism, using sudo commands for each administrator serve its specific administrative privileges.

The remote access and login authentication security

Remote login use SSH to log in. Telnet is a kind of login authentication services, that pose a safety hazard in the above network to transmit content using clear, hackers can easily through the Telnet packets, won the user's login password. And Telnet service program security verification way there is a big security hidden danger, make it become the target of hackers. The SSH service is to encrypt the data transmission, to prevent cheating and IP spoofing, DNS and transmission of data is compressed, to a certain extent to ensure the security of the remote connection by the server.

Embedded Linux

To make the appropriate changes to your Linux and cut, and able to use the system in the embedded system is embedded Linux operating system. Has the following features:

Linux system is completely open, free of charge. It is open, it can be compatible with each other, and other system to realize information interconnection. And it is free to modify the source code, this is what other system does not have.

Advantage of the Linux operating system is the more users and tasks. Ensures that multiple users to use each other ; Multitasking after independence of each other, greatly improve the efficiency, can give full play to performance.

Equipment is independent. As long as the install driver, the driver of the support and help, any user can like using file, to the operation and use of any device, which makes people without considering equipment specific form of existence.

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/qq_35987486/article/details/103164279

智能推荐

P问题、NP问题、NPC问题、NP hard问题-程序员宅基地

文章浏览阅读4.1w次,点赞50次,收藏268次。图论算法摘要1. 图的概念图一个图(graph) G=(V,E)G=(V,E)G=(V,E) 由顶点(vertex)集 VVV 和边(edge)集 EEE 组成。每一条边就是一个点对 (a,b),a,b∈V(a,b),a,b∈V(a,b),a,b∈V。有时候也把边叫做弧(arc)。有向图如果点对(a,b),a,b∈V(a,b),a,b∈V(a,b),a,b∈V是有序的,那么图就是有向的..._npc问题

【UE4 C++】大规模人群绕行避让的最优解DetourCrowdAIController如何开启_detour crowd-程序员宅基地

文章浏览阅读7.6k次,点赞8次,收藏24次。目录问题阐述与解决效果RVO Avoidance与Detour Crowd AI Controller的区别如何使用Detour Crowd AI Controller蓝图C++弃用的写法新版写法(也很简便)问题阐述与解决效果在项目存在大规模寻路人群时,很容易出现两个角色的寻路路径相冲突,就会造成这种互斥现象。使用AI ControllerUE4为此..._detour crowd

《信息系统安全》课后习题答案(陈萍)_信息系统安全第二版课后答案-程序员宅基地

文章浏览阅读1.1w次,点赞22次,收藏146次。《信息系统安全》教材(作者:陈萍,张涛,赵敏)的课后习题答案_信息系统安全第二版课后答案

Ajax跨域问题_ajax请求跨域-程序员宅基地

文章浏览阅读3.2k次,点赞3次,收藏13次。ajax 是不能跨域。那么怎么解决前端发送请求的跨域问题呢。超详细,1、设置响应头、2、通过jsonp 3、通过调用jQuery封装的jsonp 4、httpclient 5、nginx_ajax请求跨域

HTML5+CSS期末大作业:个人网站设计——响应式个人简历介绍网页(5页) HTML+CSS+JavaScript_响应 期末 作业-程序员宅基地

文章浏览阅读2.9w次,点赞68次,收藏453次。HTML5+CSS期末大作业:个人网站设计——响应式个人简历介绍网页(5页) HTML+CSS+JavaScript 期末作业HTML代码 学生网页课程设计期末作业下载 web网页设计制作成品常见网页设计作业题材有 个人、 美食、 公司、 学校、 旅游、 电商、 宠物、 电器、 茶叶、 家居、 酒店、 舞蹈、 动漫、 明星、 服装、 体育、 化妆品、 物流、 环保、 书籍、 婚纱、 军事、 游戏、 节日、 戒烟、 电影、 摄影、 文化、 家乡、 鲜花、 礼品、 汽车、 其他 等网页设计题目, A+水_响应 期末 作业

python matplotlib显示图片_python 用PIL Matplotlib处理图像的基本操作-程序员宅基地

文章浏览阅读1.4k次。python 用PIL Matplotlib处理图像的基本操作_jupyter 显示matplotlib图片完全

随便推点

和我一起写lua - 确认操作系统-程序员宅基地

文章浏览阅读294次。最近写的lua脚本需要运行在多个平台,因而一些平台相关的属性必须区别设置。如路径分隔符。在lua中,没有找到相关判断操作系统的函数。因此相关设置一直手工设置,增加了环境配置的时间。 在luarocks模块中,有一个luarocks.site_config模块(一个lua文件),其安装时便设定了操作系统类型。因此我们可以从这个模块获取操作系统:示例:require "..._lua判断操作系统

广度优先搜索算法及其MATLAB实现_广度优先算法可行路径matlab-程序员宅基地

文章浏览阅读6.2k次,点赞6次,收藏39次。摘要广度优先搜索算法(又称宽度优先搜索)是最简便的图的搜索算法之一,这一算法也是很多重要的图的算法的原型。Dijkstra单源最短路径算法和Prim最小生成树算法都采用了和宽度优先搜索类似的思想。其别名又叫BFS,属于一种盲目搜寻法,目的是系统地展开并检查图中的所有节点,以找寻结果。换句话说,它并不考虑结果的可能位置,彻底地搜索整张图,直到找到结果为止。(来自百度百科)算法思想1.对图中的任..._广度优先算法可行路径matlab

微信和支付宝相关支付业务场景介绍_支付宝的应用场景-程序员宅基地

文章浏览阅读1.1w次,点赞5次,收藏38次。支付宝 当面付 条码支付 应用场景:商家使用扫码设备,扫描用户支付宝钱包上的条码/二维码,完成收款。支付流程:API列表: 接口名称 描述 API地址 alipay.trade.pay 统一收单交易支付接口 https://docs.op..._支付宝的应用场景

iphone隐藏底条_iPhone12隐藏底部横条方法 iPhone12怎么隐藏底部小白条-程序员宅基地

文章浏览阅读7.7k次。iPhone12怎么隐藏底部小白条?很多iPhone 12用户反馈在看手机或者玩游戏的时候,屏幕底部的小白横条非常碍眼,但是又不知道怎么隐藏掉,所以小编今天整理了下iPhone12隐藏底部横条方法,帮大家一键隐藏底部横条,一起来看看吧!iPhone12隐藏底部横条方法:利用“引导式访问“功能。打开 iPhone “设置”-“辅助功能”,下拉找到“引导式访问”并开启: 在使用该功能之前,建议仔细阅..._iphone玩王者荣耀怎么把下面那个横条去掉

深度Linux 安装英伟达闭源驱动,deepin20 安装英伟达闭源驱动-程序员宅基地

文章浏览阅读550次。第一步、安装深度的“显卡驱动器”在deepin v20 中默认没有显卡驱动管理器,需要命令行安装,命令如下(刚开始一直出错,当我第一次打开应用商店,就可以安装了,好神奇):sudo apt install deepin-graphics-driver-manager安装深度的“显卡驱动器”,切换到因特尔默认驱动,然后重启两次,确认切换成功后,进行下一步。第二步、卸载英伟达开源驱动如果刚刚安装好系统..._linux终端命令安装显卡驱动是闭源的吗

C++编程常见错误及处理_c++常见错误及解决方法-程序员宅基地

文章浏览阅读1.3w次,点赞5次,收藏36次。C++编程常见错误及处理。在 C++ 程序错误一般分类:语法错误;运行错误;语义错误(也称逻辑错误)。本文介绍相关错误产生的原因及处理_c++常见错误及解决方法

推荐文章

热门文章

相关标签