Project background:Software patch management, malware scanning, file integrity checking, security review, configuration error checking, and more. To have a security vulnerability automatic scanning Tool!!Better not money!Test environment:VMware
1. Cut [Options] file name-F column number #提取第几列 (delimited defaults think \ t)-D delimiter #指定分隔符Example: Cut-f 2 a.txt #截取文件a The second column of content (column number starting from 1)Cut-f 2,4 A.txt #截取文件a The second and fourth columns of the.
Files and directories
Command
Options
Annotations
Example
Basic operation of the file
Ls
Options File
Show All files and directories
Ls-al
-A (a)
Displays all
1 Restrict permission to use the SU command except for the root userUnder/etc/pam.d/su, add:Auth Required pam_wheel.so2 Timeout settings/etc/profile insidetmout=18003 Timing Password Change· /etc/shadowUser name: $1$8zdakdfc$xda8esus2i7nql7ujrsiy/:13
Original address: http://www.cnblogs.com/123-/p/4189072.htmlUser group, file permissions detailed user group under Linux each user in Linux must belong to a group and cannot be independent of the group. each file in Linux has the concept of owner,
This is the day we start the actual combat! Here by the way, ah, come out to do the basis of development is very important Ah, the foundation is not good, sooner or later is to be bad. Personal deep feeling like this embedded development of C
Experimental requirements:
Booting from Start_kernel to init process using GDB trace debug kernel
Detailed analysis of the process initiated from Start_kernel to Init process and the combination of experiments to write a signed blog,
Linux boot process of the operating system: Post, MBR Guide, Grub menu, loading Linux Kernel, Init process initialization. 1. Post, check the hardware and give control to the local hard drive according to the boot order2.mbr Boot, transfer control
Computer OSI and TCP/IP Network Models
1. The computer network model is divided into two types: OSI model and TCP/IP model. Their relationship is as follows:
2. Each layer has its own functions for the OSI model.
Application LayerThe
Permission denied (publickey)
For the first time, I used ssh to remotely log on to a Mac. I used a cloud platform in Hong Kong to get the. pem file from there and put the file ~ /. Ssh, use the command
Ssh-I ~ /. Ssh/xd. pem IP Address
Result Error
Install OpenLDAP on Centos7
I. Environment preparationEchonameserver114.114.114.114>/etc/resolv. conf # Change dnsecho192.168.0.20.hello.com>/etc/hostssystemctldisablefirewalld. service & systemctlstopfirewalld. service # disable the firewall
Install powerDNS and poweradmin on Centos
1. Installation prerequisites
The lamp environment has been installed successfully;
2. Install powerdns
# Yum-y install pdns-backend-mysql
Connect to mysql:
# Mysql-u root-p
Create a powerdns database:
>
Install Nginx service and nginx Service
Nginx features:
Static small files (1 MB), supporting high concurrency, and consuming little system resources. 3 W concurrency, 10 processes, memory 150 M.
Nginx features:
1. simple configuration, flexible and
Linux shell BASICS (7) and Linux shell BasicsVII. Process Control Condition judgment control in the bash script-[] ([] expression is true) & (execute the following command when the result of the front side is true) | (if-case loop
Linux VMware cannot start eth0 Nic After cloning, vmwareeth0
Reference:
In VMware LINUX, the following error occurs: Device eth0 does not seem to be present, delaying initialization. Solution: VMWare clones and copies eth0 be present and cannot
Linux shell BASICS (5) and Linux shell BasicsV. bash operations and startup script 01. history of bash commands # history ...... # Set (show all variables) | grep HISHISTFILE =/root /. bash_historyHISTFILESIZE = 1000 (number of historical files)
SSH connection persistence and reuse in Linux
1. Maintain
Using a terminal to log on to the remote development machine coding should be the work of most programmers year after year, but the tragedy is that ghost will cut off your instant chat with
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service