Linux driver development 49: Linux comes with key driver

1, A brief analysis of the source code of the built-in key driver The Linux kernel also comes with a KEY driver. If you want to use the KEY driver of the kernel, you need to configure the Linux kernel. However, the KEY driver is enabled by default in the Linux kernel, but we still need to check it. Follow the following path to find the corresp ...

Posted by bulldorc on Mon, 07 Feb 2022 20:59:58 +0100

Using Nginx to realize load balancing in Linux system

1. Types of load balancing 1. Solve through hardware. Common hardware includes commercial load balancers such as NetScaler, F5, Radware and Array, which are expensive and are generally used in hundreds of thousands or even millions of Internet applications. 2. Solve through software. Common software include LVS, Nginx, apache, etc. they are ...

Posted by dotMoe on Mon, 07 Feb 2022 09:34:09 +0100

Conditional test, if and case conditional test statements of shell script

catalogue 1, Condition test 1.1.test command 1.2. File test 1.3. Integer value comparison 1.4. string comparison 1.5. Logic test 2, if statement 2.1. Single branch structure 2.2. Double branch structure 2.3. Multi branch structure 2.4. Nested if statement 3, case statement 4, Summary 1, Condition test 1.1.test command Test whet ...

Posted by alsal on Mon, 07 Feb 2022 07:57:49 +0100

Linux driver development | 4G communication

4G communication There are many restrictions on using wired network or WIFI, because to route, even WIFI has to route first, and then connect to a router. Therefore, in the case of inconvenient wiring, you can connect to the network through 4G. The following describes how to use 4G in I.MX6U-ALPHA development board to realize networking functi ...

Posted by phpMover on Mon, 07 Feb 2022 04:27:26 +0100

Summary of Linux time related knowledge: struct timeval, timespec, gettimeofday, time, localtime

preface When we are developing on linux platform, we will basically encounter time-related operations. This paper analyzes and summarizes the commonly used time-related structures and interfaces. Common types and structure definitions timespec prototype struct timespec { __time_t tv_sec; /* Seconds. second */ __syscall_slong_t tv_nsec ...

Posted by schwa97 on Sun, 06 Feb 2022 19:22:32 +0100

ESP32 development (using gitee mirroring)

Chapter 1 Configuring the esp-idf Development Environment Link to the official esp32 Programming Guide The author uses esp32 development board Step 0 Brainless Copy Configuration Ubuntu System Selection When choosing a Ubuntu system, try to choose Ubuntu version 14 or higher. Because some of the tools in Lexin's official SDK are implemente ...

Posted by premcov on Sun, 06 Feb 2022 18:06:02 +0100

frp intranet penetration

1 - intranet penetration Intranet penetration, that is, intranet mapping, can turn the LAN into a public network, so that the external network can access the services in the local LAN. There are several intranet penetration principles and technologies: 1. Forward through public network server, which is the intranet penetration service mode of m ...

Posted by neogeek on Sun, 06 Feb 2022 09:45:12 +0100

Programmer self-cultivation reading notes - memory

1. Program memory layout   the virtual address space of a process generally contains several parts: The part used by the kernel is inaccessible to the process, and different systems occupy different sizes;Stack memory: it is used to maintain the temporary variables and function calls of the program, and the allocation and destruction are ...

Posted by didgydont on Sat, 05 Feb 2022 19:32:44 +0100

Emergency response learning

Intrusion detection windows I Account, process, self start ① Detection account 1. Direct analysis in Windows Open the cmd window and enter lusrmgr MSc command to check whether there is a suspicious account 2. Log analysis "eventvwr.msc #Event viewer and export Windows log -- Security #Analyze with Log Parser Typical command 1,Query th ...

Posted by TwistedLogix on Sat, 05 Feb 2022 02:54:21 +0100

linux format string vulnerability

format string vulnerability Introduction to formatting strings Common formatting string functions functionBasic introductionprintfOutput to stdoutfprintfOutput to the specified FILE streamvprintfFormat the output to stdout according to the parameter listvfprintfFormat the output to the FILE stream according to the parameter listsprintfOutpu ...

Posted by cherubrock74 on Fri, 04 Feb 2022 13:15:19 +0100