Teach you how to add fonts to Fedora in 5 minutes

Teach you how to add fonts to Fedora in 5 minutes

System-wide installation If you install a font system-wide, it will be available to all users. The best way to do this is to use RPM packages from the official software repositories. Before starting, open the "Software" tool in Fedora Workstation, or other tools using the official repository. Select the "Add-ons" category in the selection bar. Then select "Fonts" within the category. You'll see the available fonts similar to the ones in the screenshot below: When you select a font, some details will appear. Depending on several scenarios, you may be able to preview some sample text for the font. Click the "Install" button to add it to your system. Depending on system speed and network bandwidth, this process may take some time to complete

Jul 23, 2024 am 09:45 AM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频
Linux device driver model

Linux device driver model

Table of Contents - Linux environment variables, device driver model 1. The origin of the Linux device driver model First review the usual process of device driver compilation [1] Implement the entry function module_init() and the module uninstall function module_exit(); [2] Apply for a device number, register_chrdev ();-----> (related to the kernel) [3] Use the udev/mdev mechanism to create device file nodes class_create(), device_create();------> (related to the kernel) [4] Hardware initialization: 1. io resource mapping ioremap(), the kernel provides gpio library function; 2. Note

Jul 22, 2024 pm 06:54 PM
Master explains how to modify the mariadb database storage path in Centos7.3

Master explains how to modify the mariadb database storage path in Centos7.3

If you don’t know the current database path, you only need to enter the following command to view it: Enter your mariadb password and press Enter #mysql-uroot-p Enter the following command to display the path calling status of various mariadb. The datadir item is the currently stored path. MariaDB[(none)]>showvariableslike‘%dir%’;Exit the database login state MariaDB[(none)]>exit;Stop the database#systemctlstopmysql.serverCreate a new mariadb storage path folder#mkdir-p/home/mysql

Jul 22, 2024 pm 03:01 PM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频
How to solve the problem of permission denied when executing .sh file under Linux

How to solve the problem of permission denied when executing .sh file under Linux

###Answer 1: This kind of situation is generally caused by insufficient file permissions. Under Linux, you can use the chmod command to modify file permissions. If you want to add executable permissions to the .sh file, you can use the following command: ```chmod+xfilename.sh``` where filename.sh is the name of the .sh file you want to execute. After executing this command, you should be able to execute your .sh file with linux execution permissions. If you still cannot execute the file with linux execution permissions, it may be because you do not have sufficient permissions to execute the file. You can use the sudo command to execute the file as an administrator. Such as:```sudo./filename

Jul 22, 2024 am 06:13 AM
13 Practical Git Tips

13 Practical Git Tips

In honor of Git's 13th birthday, here are 13 tips and tricks to make your Git experience more useful and powerful. Start with some basics you might have overlooked and expand to some real power user tips! 1. Your ~/.gitconfig file When you try to use the git command to submit a change to the repository for the first time, you may receive this welcome message: ***Pleasetellmewhoyouare.Rungitconfig--globaluser.email"you@example .com"gitconfig--globaluser.name"YourN

Jul 21, 2024 pm 08:21 PM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频
Use Memcached as session server to maintain session

Use Memcached as session server to maintain session

Three ways to maintain sessions: Sessionsticky session binding: By implementing a unified session in the configuration of the front-end scheduler and sending it to the same back-end server. Sessioncluster Session cluster: By configuring Tomcat to keep the information of all Tomcat sessions consistent. Sessionserver session service: Hand over all sessions to specialized session service management. Here we explain the third type, using Memcached as session server. 1. Architecture diagram. System environment. All servers use CentOS7.3. All required software packages. The following files must be placed on the tomcat server host.

Jul 21, 2024 pm 08:03 PM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频
Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?

Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?

Recently, a buffer overflow vulnerability was exposed in the gethostbyname function of the Linux GNU glibc standard library. The affected versions are Glibc 2.2 to 2.17, including versions 2.2 and 2.17. If you are using a Linux server, check to see if your Linux server has this vulnerability. The following is a simple Linux glibc version checking technique. How to check the glibc version in centos using linuxfind. The following editor will take centos6.3 of the Linux system as an example to teach you how to check the glibc version. First use the putty tool to log in to the Linux server, and then type the command: rpm-qa|grepglib

Jul 21, 2024 pm 01:56 PM
Linux file permission settings and functions: Learn more about file classification and permissions

Linux file permission settings and functions: Learn more about file classification and permissions

File permission settings and their effects under Linux File permissions and ownership (read, write, execute permissions) Everything in the Linux system is a file. To talk about permissions, it is necessary to first understand the classification of files. File classification in Linux Everything in the Linux system is It is a file, and the file types are different, as follows: Symbol representation represents file type ordinary file directory file link file block device file character device file pipeline file network device door (Solaris) It provides a new way to socket linux execution permissions, File used for communication between client and server application processes. You can hear the read, write, and execution permissions of some file types from the picture below. The picture below shows that the file type is an ordinary file. The user

Jul 21, 2024 am 10:24 AM
Centos7.3 Mariadb database export and import commands

Centos7.3 Mariadb database export and import commands

There are many solutions for exporting mariadb database, generally using phpmyadmin or Navicat for MySQL, etc. I will demonstrate the commonly used command line mode. They are; -u user, -p password, database name, > export path. Ending with .sql. /usr/local/mysql/bin/mysqldump-uroot-prenwole>/home/renwole.sql Enter the user password after pressing Enter. The export is successful and the file is under home. Note: If you only export the table structure, add -d after -p. There are 2 solutions for importing the database. Solution 1 MariaDB[(none)]>

Jul 21, 2024 am 10:20 AM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频
Embedded bootloader development: practice from Shangguan Video to Friendly Arm development board

Embedded bootloader development: practice from Shangguan Video to Friendly Arm development board

I was watching the embedded bootloader development video released by Shangguan. It sounds very good and I can basically do it. However, I only have the Linux installation on the Friendly Arm TIny6410 development board. Fortunately, the u-boot has already been transplanted on this development board. But the SOC is similar to what is said in the video, one is 2410 and the other is 6410. It’s just that the former is based on ARM11, while the latter is the older ARM9. First set up the development environment, centos6.4x64 version, the system is relatively new minicom installation: yum -yinstallminicomminicom settings: minicom -s removes the hardware control bits and sets the bit rate and data transfer mode, but note

Jul 20, 2024 pm 03:56 PM
First introduction to Google Kubernetes Engine (GKE)

First introduction to Google Kubernetes Engine (GKE)

However, so far there are very few cloud service providers that can provide k8s full hosting services. Even AWS, which currently dominates the cloud provider market, does not fully provide k8s hosting services and only provides limited customized services. In this regard, Not mature. However, Google's k8s hosting service, GKE, has taken the k8s hosting service to the extreme (at least for now). It not only provides a full set of k8s hosting services, but what is even more striking is that Google has integrated Autoscaler and k8s to achieve The automatic scaling mechanism of k8s nodes can automatically add or delete nodes according to the needs of pods. When existing nodes cannot carry new services, nodes will be automatically added to meet the demand. When existing nodes are idle enough

Jul 20, 2024 am 10:52 AM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频
Getting started with DockerHub

Getting started with DockerHub

You can also use the publicly released official Docker image. I use a lot of these images, including for my experimental WordPress environment, KDEplasma applications, and more. Although we learned how to create your own Docker image last time, you don't have to. Thousands of images are published on DockerHub for you to use. DockerHub is hard-coded into Docker as the default repository, so when you run the dockerpull command on any image, it will be downloaded from DockerHub. Download the image from DockerHub and run it locally to get started. Check out the previous articles in this series to get started. Then, once Docker is running on your system

Jul 20, 2024 am 09:09 AM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频
Relevant introduction and operation framework analysis of high-precision timers

Relevant introduction and operation framework analysis of high-precision timers

The sudden mention of high-precision timers is confusing, and at least beginners will be frustrated. And if you understand it literally, it is very simple. If the timer is less precise, then there will be no more. Although that's pretty much it, it just involves some other details. If you want to do your job well, you must first sharpen your tools. Before we start, let’s sharpen the tools first: 2. Several related source code files and their paths are as follows: Hrtimers.txt (linux-3.2.12documentationtimers) Hrtimer. c(linux-3.2.12kernel)Hrtimer.h(linux-3.2.12includelinux)

Jul 20, 2024 am 08:36 AM
Linux gunzip command example explanation

Linux gunzip command example explanation

For starters, the gzip tool is mainly used to compress or expand files. When decompressing, just add the -d option after the gzip command. The usage example is as follows: gzip-d[compressed-file-name] However, when decompressing or expanding the compressed file created by gzip, there is another completely different tool. for use. The tool in question is gunzip. In this article, we will explain the usage of gunzip command using some simple and easy-to-understand examples. All examples and guides in this article are tested in Ubuntu16.04 environment. Linux gunzip command We now know that compressed files can be decompressed using gzip-d or gunzip command. basicg

Jul 20, 2024 am 08:00 AM
Linux Linux系统 红帽 Linux命令 linux认证 红帽linux linux教程 linux视频

Hot tools Tags

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Roblox: Bubble Gum Simulator Infinity - How To Get And Use Royal Keys
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Nordhold: Fusion System, Explained
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Mandragora: Whispers Of The Witch Tree - How To Unlock The Grappling Hook
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

vc9-vc14 (32+64 bit) runtime library collection (link below)

vc9-vc14 (32+64 bit) runtime library collection (link below)

Download the collection of runtime libraries required for phpStudy installation

VC9 32-bit

VC9 32-bit

VC9 32-bit phpstudy integrated installation environment runtime library

PHP programmer toolbox full version

PHP programmer toolbox full version

Programmer Toolbox v1.0 PHP Integrated Environment

VC11 32-bit

VC11 32-bit

VC11 32-bit phpstudy integrated installation environment runtime library

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Hot Topics

Java Tutorial
1676
14
PHP Tutorial
1278
29
C# Tutorial
1257
24