Linux driver development 49: Linux comes with key driver
1, A brief analysis of the source code of the built-in key driver
The Linux kernel also comes with a KEY driver. If you want to use the KEY driver of the kernel, you need to configure the Linux kernel. However, the KEY driver is enabled by default in the Linux kernel, but we still need to check it. Follow the following path to find the corresp ...
Posted by bulldorc on Mon, 07 Feb 2022 20:59:58 +0100
Using Nginx to realize load balancing in Linux system
1. Types of load balancing
1. Solve through hardware.
Common hardware includes commercial load balancers such as NetScaler, F5, Radware and Array, which are expensive and are generally used in hundreds of thousands or even millions of Internet applications.
2. Solve through software.
Common software include LVS, Nginx, apache, etc. they are ...
Posted by dotMoe on Mon, 07 Feb 2022 09:34:09 +0100
Conditional test, if and case conditional test statements of shell script
catalogue
1, Condition test
1.1.test command
1.2. File test
1.3. Integer value comparison
1.4. string comparison
1.5. Logic test
2, if statement
2.1. Single branch structure
2.2. Double branch structure
2.3. Multi branch structure
2.4. Nested if statement
3, case statement
4, Summary
1, Condition test
1.1.test command
Test whet ...
Posted by alsal on Mon, 07 Feb 2022 07:57:49 +0100
Linux driver development | 4G communication
4G communication
There are many restrictions on using wired network or WIFI, because to route, even WIFI has to route first, and then connect to a router. Therefore, in the case of inconvenient wiring, you can connect to the network through 4G. The following describes how to use 4G in I.MX6U-ALPHA development board to realize networking functi ...
Posted by phpMover on Mon, 07 Feb 2022 04:27:26 +0100
Summary of Linux time related knowledge: struct timeval, timespec, gettimeofday, time, localtime
preface
When we are developing on linux platform, we will basically encounter time-related operations. This paper analyzes and summarizes the commonly used time-related structures and interfaces.
Common types and structure definitions
timespec
prototype
struct timespec
{
__time_t tv_sec; /* Seconds. second */
__syscall_slong_t tv_nsec ...
Posted by schwa97 on Sun, 06 Feb 2022 19:22:32 +0100
ESP32 development (using gitee mirroring)
Chapter 1 Configuring the esp-idf Development Environment
Link to the official esp32 Programming Guide The author uses esp32 development board
Step 0 Brainless Copy Configuration
Ubuntu System Selection
When choosing a Ubuntu system, try to choose Ubuntu version 14 or higher. Because some of the tools in Lexin's official SDK are implemente ...
Posted by premcov on Sun, 06 Feb 2022 18:06:02 +0100
frp intranet penetration
1 - intranet penetration Intranet penetration, that is, intranet mapping, can turn the LAN into a public network, so that the external network can access the services in the local LAN. There are several intranet penetration principles and technologies: 1. Forward through public network server, which is the intranet penetration service mode of m ...
Posted by neogeek on Sun, 06 Feb 2022 09:45:12 +0100
Programmer self-cultivation reading notes - memory
1. Program memory layout
the virtual address space of a process generally contains several parts:
The part used by the kernel is inaccessible to the process, and different systems occupy different sizes;Stack memory: it is used to maintain the temporary variables and function calls of the program, and the allocation and destruction are ...
Posted by didgydont on Sat, 05 Feb 2022 19:32:44 +0100
Emergency response learning
Intrusion detection
windows
I Account, process, self start
① Detection account
1. Direct analysis in Windows
Open the cmd window and enter lusrmgr MSc command to check whether there is a suspicious account 2. Log analysis
"eventvwr.msc #Event viewer and export Windows log -- Security
#Analyze with Log Parser
Typical command
1,Query th ...
Posted by TwistedLogix on Sat, 05 Feb 2022 02:54:21 +0100
linux format string vulnerability
format string vulnerability
Introduction to formatting strings
Common formatting string functions
functionBasic introductionprintfOutput to stdoutfprintfOutput to the specified FILE streamvprintfFormat the output to stdout according to the parameter listvfprintfFormat the output to the FILE stream according to the parameter listsprintfOutpu ...
Posted by cherubrock74 on Fri, 04 Feb 2022 13:15:19 +0100