Linux technology introduction_linux庐 technology reference-程序员宅基地

技术标签: 随笔  linux  

Linux is a free to use and the spread of free Unix-like operating systems, based on POSIX and Unix is a multiuser, multitasking, and support multithreading and multiple CPU operating system. With the development of the Internet, the Linux software enthusiasts from all over the world got, organization, the support of the company.  It besides in server operating system maintained a strong momentum of development, on personal computers, embedded system has a great progress.  Users not only can directly obtain the realization mechanism of the operating system, and can be modified according to the needs of their own to improve the operating system, to maximize its to adapt to the needs of the user.

A brief history of Linux

The birth of the Linux operating system, the development and growth process is always dependent on five important pillars: Unix operating system, MINIX operating system, the GNU project, POSIX standards, and the Internet.

In the 1980 s, the performance of computer hardware, the growing market of PC, at that time, which can be chosen by the computer's operating system Unix, DOS and MacOS which are the main types. Unix is expensive, not running on the PC;DOS is humble, and source code by software vendors strictly confidential;

MacOS is a dedicated to apple computer's operating system. At this point, the computer science is an urgent need to a more perfect, strong, cheap and completely open operating system. Due to the typical operating system for the use of teaching are very few, so at that time in the Netherlands when American professor Andrew S. Tanenbaum writing an operating system, called MINIX, in order to tell the students internal working principle of the operating system. MINIX while is very good, but is just a simple operating system used for teaching purposes, rather than a strong practical operating system, but the biggest advantage is that open source code. Student of computers around the world by studying MINIX source code to run MINIX operating system in the computer, a sophomore students at the university of Helsinki, Finland, Linus Torvalds is one of them, on the basis of absorbing the essence MINIX, Linus wrote in 1991 of his own Linux operating system version for Linux0.01, marks the beginning of the age of Linux. He took advantage of the core of Unix, remove the multifarious core program, make it applicable to general computer x86 system, and on the Internet for everyone to download, launched in 1994, the core of the complete Version1.0, at this point, the Linux gradually become fully functional, stable operating system, and widely used.

The Linux key features

The basic idea

Linux there are two basic ideas: first, everything is a file; Second, each software has certain purposes. The first article in detail is the system of all boil down to a file, including command, hardware and software, operating systems, process equipment and so forth for the operating system kernel, is treated as have their respective characteristic or type of file. As for Linux is based on Unix, is largely because the basic idea of the two is very close.

Completely free

Linux is a free operating system, users can through the Internet or other ways for free, and is free to modify the source code. This is the other operating system. It is because of this, countless programmers from around the world involved in the modification of Linux, written work, the programmer can according to their own interest and inspiration to change, it makes Linux absorb the essence of countless programmers, growing.

Fully compatible with POSIX1.0 standards.

This enables under Linux through corresponding simulator run common DOS, Windows program. This laid the groundwork for users from Windows to Linux. Many users when considering using Linux, just think of before common program under Windows can run normally, it is to eliminate their doubts.

Multi-user, multi-tasking

Linux supports multiple users, each user for your own file equipment have their own special rights, ensure the mutual influence between each user. Multitasking is now one of the main characteristics of computer Linux can run multiple programs at the same time and independently.

Good interface

Linux also has the character interface and graphical interface. In character interface the user can through the keyboard input the corresponding operating instructions. It also provides similar to Windows graphic interface of the X Window system, users can use the mouse to operate. In the X - and in Windows in Windows environment are similar, can be a Linux version of Windows.

Support for multiple platforms

Linux can run on multiple hardware platforms, such as x86, 680 x0, SPARC, Alpha processor platform. In addition Linux is a kind of embedded operating system, can run on the handheld computers, set-top boxes, or game. Released in January 2001, the Linux kernel version 2.4 has been able to fully support Intel64 chip architecture. Linux also supports multiprocessor technology at the same time. Multiple processors work at the same time, make the system performance is greatly improved.

Advantages

  1. Linux is composed of many micro kernel, its source code is completely open source;
  2. Linux inherits the Unix features, have very strong network function, its support for all Internet protocol, TCP/IPv4, TCP/IPv6 and link layer topology procedures, etc , and can use the Unix network characteristics of developed a new protocol stack;
  3. Linux system tool chain is complete, simple operation can configure a suitable development environment, can simplify the development process, reduce the obstacles in developing simulation tools, the system has strong portability;

System kernel routing forwarding

Linux operating system, embedded in the TCP/IP protocol stack protocol software with functions of routing forwarding. Installed in the routing forwarding dependence as the router's host nic, when a piece of card to receive packets, system kernel will according to the packet's destination IP address, query routing table, and then according to the query results to send the packet to another piece of card, the packets sent out at last, through the network card. The host of the process is to complete a the core functions of a router.

By modifying the Linux kernel parameter ip_forward routing function, the way of system use sysctl command configuration and display in the/proc/sys directory kernel parameters. First in the command line, enter: cat/proc/sys/net/ipv4 / ip_forwad, check if the Linux kernel, IP forwarding functions. If the result is 1, which indicates that the routing forwarding functions already open; If the result is 0 that they are not open. For security reasons, the Linux kernel by default packet routing forwarding is prohibited. In a Linux system, there are temporary and permanent forward two methods to enable function.

Temporary enable: this method only for the current session, no longer enabled after system restart. Temporary open command format: sysctl - wnet ipv4. Ip_forward = 1.

Permanent enable: this permanent enable IP forwarding function, by changing the configuration file/etc/sysctl . Conf statement of the "net. Ipv4. Ip_forward = 0", changed to "net. Ipv4. Ip_forward = 1", save the configuration file after executing commands sysctl -p/etc/sysctl. Conf, configuration immediately.

Safety hidden danger and reinforcement measures

User account login and security

Delete the redundant users and user groups. Linux is a multi-user operating system, there are many different accounts, the role of the system after installation is complete operating system, the system will default to not add xu user groups and users, if part of the user or user group does not need, should remove them immediately, otherwise the hackers are likely to take advantage of these accounts, the server to carry out attacks. What keep account, may be determined in terms of the use of the server.

Shut down unnecessary system services. Operating system installation is completed, it will be in the process of installation, can start independent of the various types of service program content, for the long time running server, the operation of the service program, the more the less then the safety of the system. So, the user or user group will need to apply some service procedures that cannot be closed, the performance, the safety of the hoisting system has a great help.

Password security policy. Under Linux, remote login system has two kinds of authentication in the form of: that is the key and password authentication. Among them, the key form of authentication, mainly is the public key is stored on a remote server, the private key is stored locally. When landing system, and then through the local private key, public key, as well as the remote server matching operation of authentication, if authentication matching degree is consistent, the user can login system unobstructed. Such authentication way, will not be threatened by brute force. At the same time, you just need to ensure the safety of the local private key, so that it won't be hackers steal, the attacker is not able to log in to the system by means of such certification. So, it is recommended to use the key system in the form of landed.

Effective application of su , sudo command. The role of the su command is to switch to the user. When the administrator login to the system, use the su command to switch to the super user role to perform some need super authority command. But due to the large super user permissions, at the same time, need to know the super user password management personnel, so the su command has very serious management risk.

Sudo command allows the system to give ordinary users some super powers, and does not need to ordinary users to switch to the super user. On the management, therefore, should be detailed rights allocation mechanism, using sudo commands for each administrator serve its specific administrative privileges.

The remote access and login authentication security

Remote login use SSH to log in. Telnet is a kind of login authentication services, that pose a safety hazard in the above network to transmit content using clear, hackers can easily through the Telnet packets, won the user's login password. And Telnet service program security verification way there is a big security hidden danger, make it become the target of hackers. The SSH service is to encrypt the data transmission, to prevent cheating and IP spoofing, DNS and transmission of data is compressed, to a certain extent to ensure the security of the remote connection by the server.

Embedded Linux

To make the appropriate changes to your Linux and cut, and able to use the system in the embedded system is embedded Linux operating system. Has the following features:

Linux system is completely open, free of charge. It is open, it can be compatible with each other, and other system to realize information interconnection. And it is free to modify the source code, this is what other system does not have.

Advantage of the Linux operating system is the more users and tasks. Ensures that multiple users to use each other ; Multitasking after independence of each other, greatly improve the efficiency, can give full play to performance.

Equipment is independent. As long as the install driver, the driver of the support and help, any user can like using file, to the operation and use of any device, which makes people without considering equipment specific form of existence.

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/qq_35987486/article/details/103164279

智能推荐

Docker 快速上手学习入门教程_docker菜鸟教程-程序员宅基地

文章浏览阅读2.5w次,点赞6次,收藏50次。官方解释是,docker 容器是机器上的沙盒进程,它与主机上的所有其他进程隔离。所以容器只是操作系统中被隔离开来的一个进程,所谓的容器化,其实也只是对操作系统进行欺骗的一种语法糖。_docker菜鸟教程

电脑技巧:Windows系统原版纯净软件必备的两个网站_msdn我告诉你-程序员宅基地

文章浏览阅读5.7k次,点赞3次,收藏14次。该如何避免的,今天小编给大家推荐两个下载Windows系统官方软件的资源网站,可以杜绝软件捆绑等行为。该站提供了丰富的Windows官方技术资源,比较重要的有MSDN技术资源文档库、官方工具和资源、应用程序、开发人员工具(Visual Studio 、SQLServer等等)、系统镜像、设计人员工具等。总的来说,这两个都是非常优秀的Windows系统镜像资源站,提供了丰富的Windows系统镜像资源,并且保证了资源的纯净和安全性,有需要的朋友可以去了解一下。这个非常实用的资源网站的创建者是国内的一个网友。_msdn我告诉你

vue2封装对话框el-dialog组件_<el-dialog 封装成组件 vue2-程序员宅基地

文章浏览阅读1.2k次。vue2封装对话框el-dialog组件_

MFC 文本框换行_c++ mfc同一框内输入二行怎么换行-程序员宅基地

文章浏览阅读4.7k次,点赞5次,收藏6次。MFC 文本框换行 标签: it mfc 文本框1.将Multiline属性设置为True2.换行是使用"\r\n" (宽字符串为L"\r\n")3.如果需要编辑并且按Enter键换行,还要将 Want Return 设置为 True4.如果需要垂直滚动条的话将Vertical Scroll属性设置为True,需要水平滚动条的话将Horizontal Scroll属性设_c++ mfc同一框内输入二行怎么换行

redis-desktop-manager无法连接redis-server的解决方法_redis-server doesn't support auth command or ismis-程序员宅基地

文章浏览阅读832次。检查Linux是否是否开启所需端口,默认为6379,若未打开,将其开启:以root用户执行iptables -I INPUT -p tcp --dport 6379 -j ACCEPT如果还是未能解决,修改redis.conf,修改主机地址:bind 192.168.85.**;然后使用该配置文件,重新启动Redis服务./redis-server redis.conf..._redis-server doesn't support auth command or ismisconfigured. try

实验四 数据选择器及其应用-程序员宅基地

文章浏览阅读4.9k次。济大数电实验报告_数据选择器及其应用

随便推点

灰色预测模型matlab_MATLAB实战|基于灰色预测河南省社会消费品零售总额预测-程序员宅基地

文章浏览阅读236次。1研究内容消费在生产中占据十分重要的地位,是生产的最终目的和动力,是保持省内经济稳定快速发展的核心要素。预测河南省社会消费品零售总额,是进行宏观经济调控和消费体制改变创新的基础,是河南省内人民对美好的全面和谐社会的追求的要求,保持河南省经济稳定和可持续发展具有重要意义。本文建立灰色预测模型,利用MATLAB软件,预测出2019年~2023年河南省社会消费品零售总额预测值分别为21881...._灰色预测模型用什么软件

log4qt-程序员宅基地

文章浏览阅读1.2k次。12.4-在Qt中使用Log4Qt输出Log文件,看这一篇就足够了一、为啥要使用第三方Log库,而不用平台自带的Log库二、Log4j系列库的功能介绍与基本概念三、Log4Qt库的基本介绍四、将Log4qt组装成为一个单独模块五、使用配置文件的方式配置Log4Qt六、使用代码的方式配置Log4Qt七、在Qt工程中引入Log4Qt库模块的方法八、获取示例中的源代码一、为啥要使用第三方Log库,而不用平台自带的Log库首先要说明的是,在平时开发和调试中开发平台自带的“打印输出”已经足够了。但_log4qt

100种思维模型之全局观思维模型-67_计算机中对于全局观的-程序员宅基地

文章浏览阅读786次。全局观思维模型,一个教我们由点到线,由线到面,再由面到体,不断的放大格局去思考问题的思维模型。_计算机中对于全局观的

线程间控制之CountDownLatch和CyclicBarrier使用介绍_countdownluach于cyclicbarrier的用法-程序员宅基地

文章浏览阅读330次。一、CountDownLatch介绍CountDownLatch采用减法计算;是一个同步辅助工具类和CyclicBarrier类功能类似,允许一个或多个线程等待,直到在其他线程中执行的一组操作完成。二、CountDownLatch俩种应用场景: 场景一:所有线程在等待开始信号(startSignal.await()),主流程发出开始信号通知,既执行startSignal.countDown()方法后;所有线程才开始执行;每个线程执行完发出做完信号,既执行do..._countdownluach于cyclicbarrier的用法

自动化监控系统Prometheus&Grafana_-自动化监控系统prometheus&grafana实战-程序员宅基地

文章浏览阅读508次。Prometheus 算是一个全能型选手,原生支持容器监控,当然监控传统应用也不是吃干饭的,所以就是容器和非容器他都支持,所有的监控系统都具备这个流程,_-自动化监控系统prometheus&grafana实战

React 组件封装之 Search 搜索_react search-程序员宅基地

文章浏览阅读4.7k次。输入关键字,可以通过键盘的搜索按钮完成搜索功能。_react search