gre lessons

Discover gre lessons, include the articles, news, trends, analysis and practical advice about gre lessons on alibabacloud.com

Lessons learned from Linux to modify the user name of the root account

file,Both sides of the user do not correspond, resulting in the inability to login, and then find the appropriate solution on the Internet, most of the solution to the use of single-user mode to reset the password, but the server in the customer's company, but alsois to contact them to solve, no way, things have reached this point, can only solve, so later trouble customer company maintenance personnel to deal with, very sorry.Online query, found that they are not a person, but this problem, I

2018-4-22 17 weeks 4 Lessons Shell alarm System script Configuration

# #发送邮件Fiecho "' Date +%t ' 502 $c _502"disk.sh Content#! /bin/bash# #Writen by alex##Rm-f. /log/disk.tmplang=enFor R in ' Df-h |awk-f ' [%]+ ' {print $} ' |grep-v use ' # #以一个或多个空格或% as delimiterDoIf [$r-gt] [$send-eq "1"]Thenecho "$addr ' date +%t ' disk useage is $r" >> /log/disk.tmpFiIf [-F. /LOG/DISK.TMP]ThenDf-h >>. /log/disk.tmp/bin/bash. /mail/mail.sh $addr \_disk $r. /log/disk.tmpecho "' Date +%t ' disk useage is Nook"Elseecho "' Date +%t ' disk useage is OK"Fi [%]+ represents o

2018-4-17 16 weeks 5 Lessons shell script date, if

later[[email protected] ~]# date-d "+1day" April 18, 2018 Wednesday 21:46:48 Cst[[email protected] ~]# date-d "+1day" +%f2018-04-18date-d "-1 days" a day agodate-d "-1 month" Month ago # #年year[Email protected] ~]# date-d "-1 month" +%F2018-03-17date-d "-1 min" A minute ago # #小时hour, seconds second[[email protected] ~]# date-d "-1 min" +%t21:47:09[[email protected] ~]# cal April 2018 1,234,561 2 3 4 5 6 78 9 10 11 12 13 1415 16 17 18 19 20 2122 23 24 25 26 27 2829 30 20.4 variable

2018-1-4 4 weeks 3 lessons VIM 2

action (U)10, replace all the etc in the entire file with a CTE (1, $s/etc/cte/g)11, move the cursor to line 25th, delete the string "ly" (25G then press J to move the cursor to the right to find "lyl", press V to select, then press x)12, Restore previous action (U)13, delete line 50th (50G DD)14, Restore previous action (U)15. Delete all contents of 第37-42 (37G 6DD)16, restore previous action (U)17, copy the contents of line 48th and paste it below line 52nd (48G yy 52G p)18, restore previous

Linux Eight week three lessons (March 28)

Tags: LinuxEight weeks three sessions (March 28)10.32/10.33 rsync via service sync10.34 Linux system logs10.35 Screen ToolExtended Linux log File Explorer Logrotate http://linux.cn/article-4126-1.html Xargs Usage Detailed http://blog.csdn.net/zhangfn2011/article/details/6776925 10.32rsync synchronization via service (UP)Open two virtual machines, a machine 192.168.133.130,b machine 192.168.133.130, two machines can communicate with each other.A machine file is synced to machine

Eight weeks three lessons rsync syncs through services, Linux system logs, screen tools

/wtmpUsed to view the correct login history, he is a binary file that cannot be viewed by cat and can only be viewed with last.LASTB command to view the user who failed the login, the corresponding file is/var/log/btmp/var/log/secureHe is the log that logs the login failure. He is also a binary file and cannot be viewed by cat./var/log/secure Security LogHe logs log-in related, Pam-related, and so on. If someone has hacked our device, it will also be recorded in this file.Screen toolVirtual Term

Linux 14 week two lessons (May 10) Notes

315.1 FTP Introduction15.2 using VSFTPD to build FTP service (top)Install the VSFTPD software package, the command is as follows;Create a virtual user with the following command:Edit the file virtual user's password file.Write content, odd behavior user command, even behavior password.Need security, not everyone can read, set permissions, command as follows:Go to DirectoryTo the first user, create the first configuration file. The configuration file and user name are the same.Copy the following

2018.5.7 seven weeks Two lessons (monitor IO disk performance, free memory usage, ps,linux under grab packet)

PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMANDroot 1 0.0 0.6 128164 6824 ? Ss 5月06 0:02 /usr/lib/systemd/systemd --switched-root --system --deserialize 21root 2 0.0 0.0 0 0 ? S 5月06 0:00 [kthreadd]root 3 0.0 0.0 0 0 ? S 5月06 0:00 [ksoftirqd/0]....... How to see if a process is running, as in the following example:[[Email protected] ~]# PS aux | grep nginxRoot 44476 0.0 0.0 112676 984 pts

20170507Linux seven weeks two lessons IO monitor free PS network status grab

. The disadvantage is that the name of the process is not displayed.Linux under Grab BagGrab Bag Tool tcpdumpSee which packages are coming in. And the flow of data, length. The default is TCP packets, if you find a lot of UDP packets are likely to attack. Eg DDos UDP flood. Access to professional anti-attack devices or services only.TCPDUMP-NN NIC Name-nn the first n means that the IP is displayed as a number without displaying the hostname.Time source IP and port > Destination IP and port: Pack

A study on the route rolling phenomenon in the establishment of the GRE tunnel

R1: Interface Loopback0 IP Address 1.1.1.1 255.255.255.0 IP OSPF network point-to-point ! Interface Tunnel0 IP address 13.1.1.1 255.255.255.0 Tunnel Source 1.1.1.1 Tunnel Destination 3.3.3.3 ! Interface serial0/0 IP address 192.168.12.1 25

Seven taboos for GRE preparation

The process of memorizing the word in hongbao should be a continuous process, and never be interrupted for any reason. No. 1: The process of memorizing the word in hongbao should be a continuous process, and never be interrupted for any reason.

Experiment of GRE over IPSEC simultaneous nat-t (PAT)

1. Topology Map: 2. Basic Interface Configuration R1: R1 (config) #int e0/0 R1 (config-if) #ip add 10.1.1.1 255.255.2555.0 R1 (config-if) #no sh R1 (config-if) #int l0 R1 (config-if) #ip Add 1.1.1.1 255.255.255.0 FW1: Pixfirewall (config)

Simple vpn-small case of GRE Principle

650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131227/060552O24-0.png "title =" simple vpn .png "/> The IP address range 192.168.1.0 can be pinged to the IP address range 192.168.2.0. R1: Conf ter Int f1/0 Ip add 12.1.1.1255.255

The configuration experiment of two Linux sets of GRE tunnel

1. Topology Map: Note: Because of the application, it is necessary to add a public network address on the LINUX2, and Linux1 can access the public network address above the LINUX2 in the event that the intermediary routing device is not under

GRE between Router and Linux test experiment

1. Topology map Reference: http://www.time-dms.com.cn/viewthread.asp?tid=1904 2. Basic interface Configuration: R1: R1 (config) #int e0/0 R1 (config-if) #ip add 10.1.1.1 255.255.255.0 R1 (config-if) #no sh R2: R2 (config) #int e0/0 R2

What lessons should I do before migrating open source databases?

After learning about the advantages of the open-source RDBMS Relational Database Management System, you have installed the MySQL database to provide registration, subscription, and e-commerce services for Web applications. Database reliability alone

Painful lessons Beego Routing failure

This is a created article in which the information may have evolved or changed. This Morning + Noon toss fast 3-hour routing module Crazy failure, how to change are 404, in the near despair, group master help find out the problem: Import Guide

What are the 40 common mistakes of PHP programmers ?, Programmer's lessons _ PHP Tutorial

What are the 40 common mistakes of PHP programmers ?, Bad habits of programmers. What are the 40 common mistakes of PHP programmers ?, Bad habits for programmers 1. do not write comments 2. do not use IDE tools that can improve production efficiency

Lessons learned to give you eight tips on preventing viruses

Old article Looking at the development of the global virus, it is not difficult to find that the worm virus has made the anti-virus market a hit. Worms are easy to handle, such as kurniova, Sircam, red code, blue code, and bin Laden. They are more

ASP. NET naming lessons: Avoid keywords whenever possible

The Tutorial at (www.bkjia.com) hopes that you will develop good naming rules when designing programs, even if you are doing a Demo, otherwise the error may make you creazy! Which of the following is my reference material! An extremely simple

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.