(The executed commands are marked in green and the standby commands are marked in blue). Mongodb is a popular non-relational database recently.
The following describes how to install linux on a virtual machine.
Installation environment:
Virtual
Http https and some common service request default ports(1) common port number of the HTTP Proxy Server: 80/8080/3128/8081/9080(2) SOCKS proxy protocol server port: 1080(3). FTP (file transfer) protocol common port number of proxy server: 21(4)
Introduction to SSH1, SSH2, and ssh1ssh2 in Linux
SSH: Secure Shell. Is a security protocol.A common application scenario is remote console login.SSH1 is free of charge and SSH2 is charged.In fact, SSH is not only used in Linux and Unix, but also
Using an SSH client to remotely log on to a Linux host (which can replace samba and ftp services) is initially generated by multiple users. Multiple users can log on to the Linux host to perform operations at the same time, 1:Figure 1 SSH (Secure
1. Nslookup (name server lookup): a tool used to query Internet domain name information or diagnose DNS server problems. Nslookup can specify the query type. You can check the DNS record survival time and specify the DNS server to be used for
Basic configuration of newly installed ubuntu and basic configuration of ubuntu
1. Enable the root account
1. Set a password for the root user.
Sudo passwd root
2. Switch to root Login
Su root
3. Enable login and edit Configuration
Sudo vi/usr/share/
Fix tomcat garbled characters on linux servers.
1 Ensure that the linux server uses UTF-8
Local-a: view supported Fonts
Change vi/etc/sysconfig/i18n to zh_CN.UTF-8
2. Change the Client code such as Xshell, putty, and SSH Secure Shell Client to
Today, I used ssh secure file transfer to upload files to the linux system. I encountered the encountered 1 errors during the transfer error. After checking the error for several minutes, I did not find the error. I put the file under the root
Basic network knowledge (I)
VPS: (Virtual Private Server) Virtual Private Server that virtualizes one Server into multiple servers. Container technology and virtualization technology. Each VPS can be assigned an independent public IP address and
The Remote Operation server has multiple connection methods, such as ftp and telnet, but it is plain text transmission, which poses a great risk to the server. My favorite is SSH connection.
SSH Secure Shell, encrypted transmission, and compressed
SSH: a secure channel protocol used for remote logon and remote replication on the Character interface (TCP port 22 is used ). The SSH protocol encrypts the data transmission between the communication parties, including the user password entered
Basic SSH tutorial
In Linux, OpenSSH is the most popular remote system logon and file transmission application, and is also a new product for traditional network applications such as Telenet, FTP, and R series. Among them, ssh (Secure Shell) can
Objective: 1. To achieve remote CentOS 72. data transmission between Win7 and CentOS
1. implement remote CentOS in Win7 format
Step 1: Check whether vnc-server is installed on CentOS
[Root @ Linux ~] # Rpm-qa | grep vncTigervnc-server-1.1.0-5.el6_4.1
What is SSH? Secure Shell (SSH) is developed by the Network Working Group of IETF. SSH is a security protocol created on the application layer and transport layer, provides a secure transmission and use environment for the Shell layer on the
Download from linux and linux[Connect to the server through the terminal software secureCRT]
Connection Service: ssh (secure shell) Security Kernel
Connect to the service protocol and use port 22
Set secureCRT:
[Optical drive mounting]
SSH password-less Logon
SSH (Secure Shell) is a security protocol designed for remote login sessions and other network services.With SSH, You can remotely log on to other Linux Hosts, but you need to enter a password. If you log on to 10.3.93.213,
Remote logon to Linux
Linux is mostly used on servers, and servers cannot be stored in the office like PCs. They are stored in IDCs, so a Ming usually logs on to the Linux system remotely. In Linux, the remote logon function is implemented through
OpenSSH is a free open-source implementation of the SSH Secure SHell protocol. It uses secure and encrypted network connection tools instead of telnet, ftp, rlogin, rsh, and rcp tools. OpenSSH supports SSH protocol versions 1.3, 1.5, and 2. Since
CentOS restore the deleted boot Partition
In CentOS 6, the boot partition is deleted due to carelessness or operation errors,
In this case, can I restore the deleted boot partition?
1. Use the centos6 image to enter the linux rescue mode.
2.
Reprinted fromHttp://hi.baidu.com/urlgaojian/blog/item/a04a5f507971a96884352454.html
The following methods are simple sorting, from simple to complex:
Method 1: In SSH Secure File Transfer, open the "operation" menu, open the "File Transfer Mode"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.