Linux technology introduction_linux庐 technology reference-程序员宅基地

技术标签: 随笔  linux  

Linux is a free to use and the spread of free Unix-like operating systems, based on POSIX and Unix is a multiuser, multitasking, and support multithreading and multiple CPU operating system. With the development of the Internet, the Linux software enthusiasts from all over the world got, organization, the support of the company.  It besides in server operating system maintained a strong momentum of development, on personal computers, embedded system has a great progress.  Users not only can directly obtain the realization mechanism of the operating system, and can be modified according to the needs of their own to improve the operating system, to maximize its to adapt to the needs of the user.

A brief history of Linux

The birth of the Linux operating system, the development and growth process is always dependent on five important pillars: Unix operating system, MINIX operating system, the GNU project, POSIX standards, and the Internet.

In the 1980 s, the performance of computer hardware, the growing market of PC, at that time, which can be chosen by the computer's operating system Unix, DOS and MacOS which are the main types. Unix is expensive, not running on the PC;DOS is humble, and source code by software vendors strictly confidential;

MacOS is a dedicated to apple computer's operating system. At this point, the computer science is an urgent need to a more perfect, strong, cheap and completely open operating system. Due to the typical operating system for the use of teaching are very few, so at that time in the Netherlands when American professor Andrew S. Tanenbaum writing an operating system, called MINIX, in order to tell the students internal working principle of the operating system. MINIX while is very good, but is just a simple operating system used for teaching purposes, rather than a strong practical operating system, but the biggest advantage is that open source code. Student of computers around the world by studying MINIX source code to run MINIX operating system in the computer, a sophomore students at the university of Helsinki, Finland, Linus Torvalds is one of them, on the basis of absorbing the essence MINIX, Linus wrote in 1991 of his own Linux operating system version for Linux0.01, marks the beginning of the age of Linux. He took advantage of the core of Unix, remove the multifarious core program, make it applicable to general computer x86 system, and on the Internet for everyone to download, launched in 1994, the core of the complete Version1.0, at this point, the Linux gradually become fully functional, stable operating system, and widely used.

The Linux key features

The basic idea

Linux there are two basic ideas: first, everything is a file; Second, each software has certain purposes. The first article in detail is the system of all boil down to a file, including command, hardware and software, operating systems, process equipment and so forth for the operating system kernel, is treated as have their respective characteristic or type of file. As for Linux is based on Unix, is largely because the basic idea of the two is very close.

Completely free

Linux is a free operating system, users can through the Internet or other ways for free, and is free to modify the source code. This is the other operating system. It is because of this, countless programmers from around the world involved in the modification of Linux, written work, the programmer can according to their own interest and inspiration to change, it makes Linux absorb the essence of countless programmers, growing.

Fully compatible with POSIX1.0 standards.

This enables under Linux through corresponding simulator run common DOS, Windows program. This laid the groundwork for users from Windows to Linux. Many users when considering using Linux, just think of before common program under Windows can run normally, it is to eliminate their doubts.

Multi-user, multi-tasking

Linux supports multiple users, each user for your own file equipment have their own special rights, ensure the mutual influence between each user. Multitasking is now one of the main characteristics of computer Linux can run multiple programs at the same time and independently.

Good interface

Linux also has the character interface and graphical interface. In character interface the user can through the keyboard input the corresponding operating instructions. It also provides similar to Windows graphic interface of the X Window system, users can use the mouse to operate. In the X - and in Windows in Windows environment are similar, can be a Linux version of Windows.

Support for multiple platforms

Linux can run on multiple hardware platforms, such as x86, 680 x0, SPARC, Alpha processor platform. In addition Linux is a kind of embedded operating system, can run on the handheld computers, set-top boxes, or game. Released in January 2001, the Linux kernel version 2.4 has been able to fully support Intel64 chip architecture. Linux also supports multiprocessor technology at the same time. Multiple processors work at the same time, make the system performance is greatly improved.

Advantages

  1. Linux is composed of many micro kernel, its source code is completely open source;
  2. Linux inherits the Unix features, have very strong network function, its support for all Internet protocol, TCP/IPv4, TCP/IPv6 and link layer topology procedures, etc , and can use the Unix network characteristics of developed a new protocol stack;
  3. Linux system tool chain is complete, simple operation can configure a suitable development environment, can simplify the development process, reduce the obstacles in developing simulation tools, the system has strong portability;

System kernel routing forwarding

Linux operating system, embedded in the TCP/IP protocol stack protocol software with functions of routing forwarding. Installed in the routing forwarding dependence as the router's host nic, when a piece of card to receive packets, system kernel will according to the packet's destination IP address, query routing table, and then according to the query results to send the packet to another piece of card, the packets sent out at last, through the network card. The host of the process is to complete a the core functions of a router.

By modifying the Linux kernel parameter ip_forward routing function, the way of system use sysctl command configuration and display in the/proc/sys directory kernel parameters. First in the command line, enter: cat/proc/sys/net/ipv4 / ip_forwad, check if the Linux kernel, IP forwarding functions. If the result is 1, which indicates that the routing forwarding functions already open; If the result is 0 that they are not open. For security reasons, the Linux kernel by default packet routing forwarding is prohibited. In a Linux system, there are temporary and permanent forward two methods to enable function.

Temporary enable: this method only for the current session, no longer enabled after system restart. Temporary open command format: sysctl - wnet ipv4. Ip_forward = 1.

Permanent enable: this permanent enable IP forwarding function, by changing the configuration file/etc/sysctl . Conf statement of the "net. Ipv4. Ip_forward = 0", changed to "net. Ipv4. Ip_forward = 1", save the configuration file after executing commands sysctl -p/etc/sysctl. Conf, configuration immediately.

Safety hidden danger and reinforcement measures

User account login and security

Delete the redundant users and user groups. Linux is a multi-user operating system, there are many different accounts, the role of the system after installation is complete operating system, the system will default to not add xu user groups and users, if part of the user or user group does not need, should remove them immediately, otherwise the hackers are likely to take advantage of these accounts, the server to carry out attacks. What keep account, may be determined in terms of the use of the server.

Shut down unnecessary system services. Operating system installation is completed, it will be in the process of installation, can start independent of the various types of service program content, for the long time running server, the operation of the service program, the more the less then the safety of the system. So, the user or user group will need to apply some service procedures that cannot be closed, the performance, the safety of the hoisting system has a great help.

Password security policy. Under Linux, remote login system has two kinds of authentication in the form of: that is the key and password authentication. Among them, the key form of authentication, mainly is the public key is stored on a remote server, the private key is stored locally. When landing system, and then through the local private key, public key, as well as the remote server matching operation of authentication, if authentication matching degree is consistent, the user can login system unobstructed. Such authentication way, will not be threatened by brute force. At the same time, you just need to ensure the safety of the local private key, so that it won't be hackers steal, the attacker is not able to log in to the system by means of such certification. So, it is recommended to use the key system in the form of landed.

Effective application of su , sudo command. The role of the su command is to switch to the user. When the administrator login to the system, use the su command to switch to the super user role to perform some need super authority command. But due to the large super user permissions, at the same time, need to know the super user password management personnel, so the su command has very serious management risk.

Sudo command allows the system to give ordinary users some super powers, and does not need to ordinary users to switch to the super user. On the management, therefore, should be detailed rights allocation mechanism, using sudo commands for each administrator serve its specific administrative privileges.

The remote access and login authentication security

Remote login use SSH to log in. Telnet is a kind of login authentication services, that pose a safety hazard in the above network to transmit content using clear, hackers can easily through the Telnet packets, won the user's login password. And Telnet service program security verification way there is a big security hidden danger, make it become the target of hackers. The SSH service is to encrypt the data transmission, to prevent cheating and IP spoofing, DNS and transmission of data is compressed, to a certain extent to ensure the security of the remote connection by the server.

Embedded Linux

To make the appropriate changes to your Linux and cut, and able to use the system in the embedded system is embedded Linux operating system. Has the following features:

Linux system is completely open, free of charge. It is open, it can be compatible with each other, and other system to realize information interconnection. And it is free to modify the source code, this is what other system does not have.

Advantage of the Linux operating system is the more users and tasks. Ensures that multiple users to use each other ; Multitasking after independence of each other, greatly improve the efficiency, can give full play to performance.

Equipment is independent. As long as the install driver, the driver of the support and help, any user can like using file, to the operation and use of any device, which makes people without considering equipment specific form of existence.

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/qq_35987486/article/details/103164279

智能推荐

linux devkmem 源码,linux dev/mem dev/kmem实现访问物理/虚拟内存-程序员宅基地

文章浏览阅读451次。dev/mem: 物理内存的全镜像。可以用来访问物理内存。/dev/kmem: kernel看到的虚拟内存的全镜像。可以用来访问kernel的内容。调试嵌入式Linux内核时,可能需要查看某个内核变量的值。/dev/kmem正好提供了访问内核虚拟内存的途径。现在的内核大都默认禁用了/dev/kmem,打开的方法是在 make menuconfig中选中 device drivers --> ..._dev/mem 源码实现

vxe-table 小众但功能齐全的vue表格组件-程序员宅基地

文章浏览阅读7.1k次,点赞2次,收藏19次。vxe-table,一个小众但功能齐全并支持excel操作的vue表格组件_vxe-table

(开发)bable - es6转码-程序员宅基地

文章浏览阅读62次。参考:http://www.ruanyifeng.com/blog/2016/01/babel.htmlBabelBabel是一个广泛使用的转码器,可以将ES6代码转为ES5代码,从而在现有环境执行// 转码前input.map(item => item + 1);// 转码后input.map(function (item) { return item..._让开发环境支持bable

FPGA 视频处理 FIFO 的典型应用_fpga 频分复用 视频-程序员宅基地

文章浏览阅读2.8k次,点赞6次,收藏29次。摘要:FPGA视频处理FIFO的典型应用,视频输入FIFO的作用,视频输出FIFO的作用,视频数据跨时钟域FIFO,视频缩放FIFO的作用_fpga 频分复用 视频

R语言:设置工作路径为当前文件存储路径_r语言设置工作目录到目标文件夹-程序员宅基地

文章浏览阅读575次。【代码】R语言:设置工作路径为当前文件存储路径。_r语言设置工作目录到目标文件夹

background 线性渐变-程序员宅基地

文章浏览阅读452次。格式:background: linear-gradient(direction, color-stop1, color-stop2, ...);<linear-gradient> = linear-gradient([ [ <angle> | to <side-or-corner>] ,]? &l..._background线性渐变

随便推点

【蓝桥杯省赛真题39】python输出最大的数 中小学青少年组蓝桥杯比赛 算法思维python编程省赛真题解析-程序员宅基地

文章浏览阅读1k次,点赞26次,收藏8次。第十三届蓝桥杯青少年组python编程省赛真题一、题目要求(注:input()输入函数的括号中不允许添加任何信息)1、编程实现给定一个正整数N,输出正整数N中各数位最大的那个数字。例如:N=132,则输出3。2、输入输出输入描述:只有一行,输入一个正整数N输出描述:只有一行,输出正整数N中各数位最大的那个数字输入样例:

网络协议的三要素-程序员宅基地

文章浏览阅读2.2k次。一个网络协议主要由以下三个要素组成:1.语法数据与控制信息的结构或格式,包括数据的组织方式、编码方式、信号电平的表示方式等。2.语义即需要发出何种控制信息,完成何种动作,以及做出何种应答,以实现数据交换的协调和差错处理。3.时序即事件实现顺序的详细说明,以实现速率匹配和排序。不完整理解:语法表示长什么样,语义表示能干什么,时序表示排序。转载于:https://blog.51cto.com/98..._网络协议三要素csdn

The Log: What every software engineer should know about real-time data's unifying abstraction-程序员宅基地

文章浏览阅读153次。主要的思想,将所有的系统都可以看作两部分,真正的数据log系统和各种各样的query engine所有的一致性由log系统来保证,其他各种query engine不需要考虑一致性,安全性,只需要不停的从log系统来同步数据,如果数据丢失或crash可以从log系统replay来恢复可以看出kafka系统在linkedin中的重要地位,不光是d..._the log: what every software engineer should know about real-time data's uni

《伟大是熬出来的》冯仑与年轻人闲话人生之一-程序员宅基地

文章浏览阅读746次。伟大是熬出来的  目录  前言  引言 时间熬成伟大:领导者要像狼一样坚忍   第一章 内圣外王——领导者的心态修炼  1. 天纵英才的自信心  2. 上天揽月的企图心  3. 誓不回头的决心  4. 宠辱不惊的平常心  5. 换位思考的同理心  6. 激情四射的热心  第二章 日清日高——领导者的高效能修炼  7. 积极主动,想到做到  8. 合理掌控自己的时间和生命  9. 制定目标,马..._当狼拖着受伤的右腿逃生时,右腿会成为前进的阻碍,它会毫不犹豫撕咬断自己的腿, 以

有源光缆AOC知识百科汇总-程序员宅基地

文章浏览阅读285次。在当今的大数据时代,人们对高速度和高带宽的需求越来越大,迫切希望有一种新型产品来作为高性能计算和数据中心的主要传输媒质,所以有源光缆(AOC)在这种环境下诞生了。有源光缆究竟是什么呢?应用在哪些领域,有什么优势呢?易天将为您解答!有源光缆(Active Optical Cables,简称AOC)是两端装有光收发器件的光纤线缆,主要构成部件分为光路和电路两部分。作为一种高性能计..._aoc 光缆

浏览器代理服务器自动配置脚本设置方法-程序员宅基地

文章浏览阅读2.2k次。在“桌面”上按快捷键“Ctrl+R”,调出“运行”窗口。接着,在“打开”后的输入框中输入“Gpedit.msc”。并按“确定”按钮。如下图 找到“用户配置”下的“Windows设置”下的“Internet Explorer 维护”的“连接”,双击选择“自动浏览器配置”。如下图 选择“自动启动配置”,并在下面的“自动代理URL”中填写相应的PAC文件地址。如下..._設置proxy腳本