Suddenly think of their own more than six months ago in a Web site to do some of the Java basic questions, was holding a full of confidence to go, the results found that a lot of basic knowledge is not understood or not fully understood. Some people learn programming from the application development began, which is very good, but there are always some small knowledge, we have not noticed, does not accumulate bujikuibu not even thousands of miles, I have encountered some of the listed out, I hope
Presumably, network administrators have a headache for configuring a large number of complicated configuration commands for Huawei routers. The following is a simple configuration command for Huawei routers. Let's take a look!1. Common User Mode (1) help description of the help System; (2) telnet Remote logon; (3) language mode switch; (4) ping the network host to check whether the network host is connected and whether the host is reachable. (5) show Displays the system running information. (6)
Whether you are an individual webmaster or a full-time webmaster, you are either hosting a host, renting an exclusive host, or hosting a server. Your Website or application is limited by the network quality of the IDC provider, therefore, for the webmaster preparing to build a site, the IDC provider's choice is not only price, brand, word of mouth, but also an important factor to consider in terms of network speed. How can we test the network speed? Many may use the Ping and
the MS-DOS environment;
Run the "Route PRINT" command in the doscommand line. Then you will see the Route table information in the local workstation on the page 3. If you find that there is no routing information to the "Default Gateway", you can use the Route ADD command to ADD a record to the default gateway, and then the workstation will be able to automatically connect to the default gateway.
Figure 3
In addition, you can also use the built-in Tracert
The first two days of deployment. The Netcore project, firstly, the production environment domain name is not accessible, and then to. Netcore Project IIS Deployment 502.5, in the inexplicable 500, in the troubleshooting of the project deployment problem when the DOS command used to organize, I believe that will be used later.1.nslookup[commonly used in DNS queries]You can specify the type of query, and you can check the lifetime of the DNS record and specify which DNS server to use for interpre
$ Packager Mana Ger Object Wrapper Pathping.exe > combination of ping and tracert programs that contain pings and tracert Pax.exe > is a POSIX program and Pat H names used as arguments must be specif IEDs in POSIX format. Use "//c/users/default" instead of "c:usersdefault." Start Portable Archive Interchange (PAX) utility Pentnt.exe > used to check the Pentium for th E Floating point division error check f
information of the local machine.
When the IP address or machine name of the other party is obtained, you can use the nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans, and know the services opened by the machine.
Here we ca
name of the other party is obtained, you can use the nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans, and know the services opened by the machine.
Here we can see that the local machine is open to FTP service, Telnet service, m
subsystem do not use this command to accept this command just for compatibility with MS-DOS files.Notepad.exe open notepadNslookup.exe this diagnostic tool displays information from the Domain Name System (DNS) name server.Ntbackup.exe backup and troubleshooting toolsNtfrs.exe nt File Replication Service (XP unavailable)Ntvdm.exe simulates a 16-bit Windows EnvironmentNw16.exe Netware Steering GearNwscript.exe run the NetWare scriptOdbcad32.exe 32-bit ODBC Data Source Management (Driver Manageme
name of the other party is obtained, you can use the nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans, and know the services opened by the machine.
Here we can see that the local machine is open to FTP service, Telnet service, m
occurs inside the network, which causes data packets to fail to reach the sink. You can use tracert to track and determine the fault source (it is best to finish the fault on the host when using this command ).Note: Some routers do not subtract 1 from the package TTL time, but this is generally the case.Method: If a host is successfully pinged, you can analyze the route hops of data packets from the response information.I. e. Replay XXX. XXX: byte =
.
When the IP address or machine name of the other party is obtained, you can use the nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans, and know the services opened by the machine.
Here we can see that the local machine
cannot be called attacks. Some write by themselvesSome programs similar to the ping command keep sending large data packets to block the target host..2 NetWe recommend using net /? Obtain the help information. There are many parameters.Number. Commonly used: Net view \ host to View Sharing, Net start/stop service to start and stopThe messenger service is not a favorite of individuals.3 netstatNetstat HOST: view the current TCP/IP connection status of the host, such as the port status.4 NBTSTATN
local machine.
When the IP address or machine name of the other party is obtained, you can use the nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans, and know the services opened by the machine.
Here we can see that the local mac
]display IP routing-table =====static stands for static route, 60 represents static route priority Three, configure a floating route for backup To configure a backup static route, which can go R2 when a link between R1 and R3 fails. [R2]ip route-static 3.3.3.3 255.255.255.255 202.100.3.3 [r1]ip route-static 202.100.3.0 24 202.100.1.2 Preference [R1]ip route-static 3.3.3.3 202.100.1.2 preference [R3]ip route-static 202.100.1.0 255.255.255 .0 202.100.3.2 [r1]
name of the other party is obtained, you can use the nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans, and know the services opened by the machine.
Here we can see that the local machine is open to FTP service, Telnet service, m
information of the local machine.
When the IP address or machine name of the other party is obtained, you can use the nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans, and know the services opened by the machine.
Here we can see
VM dual Nic, so we have a problem.
How can remote hosts communicate with the VM?
In fact, it is very simple. We only need to configure a static route to the remote host on the VM.
In this example, the IP address of the remote host is 192.168.33.250.
Now we can add a static route to the VM, as shown below:
Route add-net 192.168.33.0/24 gw 192.168.0.1 dev eth1
This command means to forward all data packets sent to the CIDR Block 192.168.33.0/24 through the 192.168.0.1 gateway and forward th
Common Linux Network Tools: traceroute for Route Scanning
The previous two articles "common Linux Network Tools: fping host scanning" and "common Linux Network Tools: hping advanced host scanning" are about host scanning, this article describes traceroute and mtr, a common route scanning tool in Linux.
Route scanning mainly queries the number of Route hops from the local host to another host and the data delay.
Traceroute basic usage
--------------------------------------------------------------
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.