maintenance of the computer, data packet transmission path selection and so on, so the most important in this level, in addition to the IP, is the packet can reach the destination route concept!
Layer 4Transport LayerTransport Layer
This hierarchy defines the sending and receiving end of the online technology (such as TCP, UDP technology), including the packet format of the technology, data packet delivery, process control, transmi
Linux host and virtualbox Virtual Machine LAN communication
This section describes how to connect a Linux host to a virtual machine (VM) installed in virtualbox on Linux:
1. start the VM, select the "Change Network Connection" menu, select
Operating Environment: CentOS 6.5Action object: User A host and remote Host BBody part: Italic bold represents Linux instructions.Linux non-root user password-free login remote host SSH Please go to this link: xxxxxxxxxxxxxxxx (not yet written)One, remote Host B and user A a
% s on % s hardware/N", UTS. sysname, UTS. Machine );Printf ("nodename is % s/n", UTS. nodename );Printf ("version is % s, % s/n", UTS. Release, UTS. version );Exit (0 );}
The program will generate the following specific Linux output. If our machine is on the network, we will find an extended Host Name containing the network:
$./HostgetComputer Host Name Is beas
/. ssh/id_rsa.
Your public key has been saved in/home/verdana/. ssh/id_rsa.pub.
The key fingerprint is:
51: 51: da: 44: 28: b5: 83: de: d2: 1e: 60: 4f: 81: c9: f1: 1a verdana@hostname.com
Note: leave passphrase empty.
2. change the public key to authorized_keys.
Verdana @ hostname :~ /. Ssh $ mv id_rsa.pub authorized_keys
3. download the private key and convert it to a recognizable format of Putty.
Putty cannot identify the private key generated by the Linux
LinuxEverything is troublesome.Host NameIs no exception. The following describes the specific methods.
After Linux is installed, its default host name is localhost. Three steps are required to modify the Linux host name.
Use hostname to modify the current host name.
Hostn
If you ping the domain name, ping:unknown host xxx.xxx appears.But when you ping the IP address, you can pass it.The DNS server is not configured properly,Check the configuration file/etc/resolv.conf, if there is nameserver xxx.xxx.xxx.xxx, such as the use of DNS server nameserver 8.8.8.8, if any, modify an available DNS server, such as 8.8.8.8 or 4.4.4.4, Save e
Ensure SSH security on Amazon EC2 Linux host, ec2ssh
Friends who once worked in startups must be clear that building customer trust is a key step in business development. Today, users are increasingly familiar with technology and security, and they want suppliers to provide strict data protection while ensuring solid and reliable services. In addition, the customer's mentality is often volatile, and usually
One, two Linux servers and client A: Host Server B: Client serveron the host serverAon UseSSHcommand to generate a key pair, the command is as follows:ssh-keygen-t RSAand then you can returnFind id_rsa.pub under current user directory:/home/root/.ssh/SCP local file (id_rsa.pub) remote user name @ remote host (B)
. Xftp is a powerful sftp, FTP file transfer software based on MS Windows platform, which can upload files to the host.
The installation of these 2 software is not mentioned here. Let's look at how to use these two software.
First, open Xshell
Second, set the cloud server login information, click Authentication (the new version may be "User authentication"). Fill in the Aliyun
public key has been saved in /home/verdana/.ssh/id_rsa.pub.The key fingerprint is:51:51:da:44:28:b5:83:de:d2:1e:60:4f:81:c9:f1:1a verdana@hostname.com
Note: leave passphrase empty.
2. change the public key to authorized_keys.
verdana@hostname:~/.ssh$ mv id_rsa.pub authorized_keys
3. download the private key and convert it to a recognizable format of Putty.Putty cannot identify the private key generated by the Linux
In the morning, I found that a Linux AS 4 host was hacked by Hacker and had a lot of scanssh processes. Intruders usually use password dictionary files such as passwd.txt of common Linux/unixapplication services such as oracle, sybase, nagios, tuxedo, and try to log on via ssh on port 22. Search for BOTs using weak passwords in the LAN and try to intrude into the
reconnect.Modifications to the Linux network configuration file:$ suEnter Password (# #切换管理员 # #)# Cd/etc/sysconfig/network-script# Vim Ifcfg-eth0 (it is recommended to back up this file first, to prevent the ^_^ from being restored after the bug is corrected)Device= "Eth0"bootproto= "Static"ipv6init= "Yes"Nm_controlled= "Yes"onboot= "Yes"Type= "Ethernet"ipaddr=192.168.237.10netmask=255.255.255.0gateway=192.168.237.2dns1=211.98.2.4dns2=61.233.9.9The
Article I.On a Linux host (SSH client),SSH keys via Ssh-keygen# ssh-keygen-t RSA (three consecutive returns, i.e. locally generated public and private keys, no password set)The. SSH directory in the current user home directory of the Linux host, which generates Id_rsa.pub and Id_rsa, where Id_rsa is the key, Id_rsa.pub
All of the following settings are tested in CentOS, and other Linux systems play the same way, except that the directory of the configuration files may be different.
The hostname in the LAN is similar to the domain name in the WAN, there are two ways to modify the host name:(1) Modify host name in current session:#hostname // displays the
(AMH is a stand-alone set of Lnmp/nginx virtual host panels, please use the pure system for installation.) Do not install other environment packs. )(need to use AMH, please check your system support, AMH panel has supported CentOS, Debian, Ubuntu all the system version of the installation environment.) )
First install the AMH management panel
First step:log on to your
Linux VMware Workstation is only in host mode, vmwareworkstation
Only the host can implement intercommunication between the host and the virtual machine linux, and then use securecrt. Mutual File Transfer
1. Select host-only mod
.
verdana@hostname:~/.ssh$ mv id_rsa.pub authorized_keys
3. Download the private key and convert it to a recognizable format of Putty.Putty cannot identify the private key generated by the Linux host, so you need to use puttygen.exe to convert it.A) use FTP software or other methods to copy the generated id_rsa key to the client host. Here, my cl
Linux host name ModificationGuideIn a LAN, each machine has a host name, which facilitates the distinction between the host and the host. Therefore, you can set a host name for each machine to access each other easily. For example
Linux does not surf the web prompting Ping:unknown host check stepsThe Linux system is different from the Windows platform, in order to better do network service applications. Linux is used for Web servers, and the interface is a character interface. For the novice encounter
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.