1111 grep does not display its own process (Chen Xu)
# Ps-Aux | grep httpd | grep-V grep
Grep-V grep can cancel displaying the grep process you are executing. The-V parameter does not display the name of the listed process.
1112 delete a file (wongmokin) containing a keyword in the directory)Find/mnt/ebook/-type F-exec grep "Enter the keyword" {}/;-print-exec RM {}/;
1113 make the task in cron do not give back information. In this example, check the email (wongmokin) once every 5 minutes)0-59/5
queue,Display print tasks sent to UNIX-based serversLpr.exe> send a printJob to a network printer. Redirect print task to print in the NetworkMachine. It is usually used by UNIX client printers to send print tasks to connections.NNT printer server of the printing device.
Lsass.exe> LSA exec utable and Server DLLDLL for running LSA and ServerLserver.exe> specifies the new DNS domainThe default server specifies the default seRver's new DNS domainOs2.exe> an OS/2 WarpServer (os2/O) OS/2Os2srv.exe>
/2Os2srv.exe> anos/2 warpserveros/2Os2ss.exe> anos/2 warpserveros/2Osk.exe> Screen KeyboardOsk> open the Screen KeyboardPackager.exe> Object wrapperPackager> Object packagePathping.exe> programs that contain Ping and tracertPax.exe> Start the portable archive Interchange (PAX) UtilityPentnt.exe> check floating point errors of PentiumPerfmon.exe> Performance MonitorPerfmon. msc> Computer Performance Monitoring ProgramPing.exe> verify the connection to
A coverage data consists of two folders: one folder is used to store space geometric information, and the name of the folder is the name of the coverage data (such as HNC); the other folder is named info, it stores the property information of coverage.
Coverage File naming rules:
(I) cannot be longer than 13 characters(Ii) cannot contain spaces(Iii) cannot begin with a number(Iv) All letters must be in lowercase.
The coverage folder may store lab. ADF, arc. ADF, sec. ADF, pal. ADF, CNT. A
A coverage data consists of two folders: one folder is used to store space geometric information, and the name of the folder is the name of the coverage data (such as HNC); the other folder is named info, it stores the property information of coverage.
Coverage File naming rules:(I) cannot be longer than 13 characters (ii) cannot contain spaces (iii) cannot start with a number (iv) all letters must be in lower case
The coverage folder may store lab. ADF, arc. ADF, sec. ADF, pal. ADF, CNT.
Maya calendar
Time limit:1000 ms
Memory limit:10000 K
Total submissions:49534
Accepted:15194
DescriptionDuring his last sabbatical, using sor M. a. ya made a surprising discovery about the old Maya calendar. from an old knotted message, partition sor discovered that the Maya civilization used a 365 day long year, called HAAB, which had 19 months. each of the first
18 months was 20 days long, and the names of the months were POP, No, zip, zotz, tzec, XUL, yox
approach to integrity management isDM-Verity module. this is a device mapper target which manages file integrity at the block level. it's intended to be used as part of a verified boot process, where an appropriately authorized caller brings a device online, say, a trusted partition containingKernel modules to be loaded later. The integrity of those modules will be transparently verified block by block as they are read from disk.
Hardening and platform security
Hardening techniques have been ap
attackers usually attack in two directions:
A) terminal users steal personal information
B) The server, one-time access to huge benefits, such as the attack bank IBM AIX/HP-UX and other large machines, the current Ubuntu neither, so very secure
V. Differences in system design architecture
1. win2k has no stack protection, and it is easy to overflow/Win2k malloc attacks. WinXP is slightly enhanced, but it is relatively easy. Win2003 has enhanced a lot and is difficult to attack, currently, all c
1. First knowledge of osgi
Osgi features: Hot swapping and modular programming. It seems very attractive, but if you are a beginner, I think you will be suffering from a lot of problems at the beginning. Many concepts need to be understood, and many mistakes are just ClassNoFinded, you may be bored. There are also so many annoying configurations when constructing an osgi project (for details about how to build an eclipse-based osgi application, refer to Lin Hao's open doc, of course, you can als
not follow any rule mode. This requires the underlying system to be highly adaptable to unpredictable dynamic data during data processing when the storage space is limited, instead of focusing on some special negative load mode.
MapReduce Storage Policy
To design and implement an efficient data storage structure based on MapReduce data warehouse, the key challenge is to meet the above four requirements in the MapReduce computing environment. In traditional database systems, three data storage s
In this example, a 5 GB 8-mm tape drive is used, and its device file is/dev/rmt0.
I. Backup
Backup can be implemented through the command line or SMIT menu.
1. Command Line backup
The AIX commands backup and restore are used for backup and recovery. These two commands complement the standard UNIX utility tar, cpio, dd, and pax. The following describes how to back up the entire file system and a single file or directory.
1) Backup File System
In AIX, t
On the same day of Microsoft's menstruation Day (8.11) this month, foreign hackers taviso and julien disclosed a vulnerability that can attack all new and old Linux systems, including but not limited to RedHat, CentOS, and Suse, debian, Ubuntu, Slackware, Mandriva, Gentoo and its derivative systems. Hackers only need to execute one command to obtain the root permission through this vulnerability. Even if SELinux is enabled, this vulnerability does not help. How simple is the Attack Vulnerability
The environment is implemented under vmware7, and the operating system is fedora14 (Nima 12 and 13 have all tried it. Due to Yum source problems, some RPM packages are searched for by themselves, which cannot afford to hurt ..)
Talk less, work!
1. Ensure that your yum source is up-to-date and availableThis saves a lot of trouble. For example, Pax, patch, and Python-setuptools are all dependent on the cdh3 component.
2. Install JDK and JRE. But f
Docker security best practices Overview, docker Best Practices
/**************************************** ********** Author: Samson* Date: 08/07/2015* Test platform:* Gcc (Ubuntu 4.8.2-19ubuntu1) 4.8.2* GNU bash, 4.3.11 (1)-release (x86_64-pc-linux-gnu)* Nginx version:* Nginx 1.6.2* Nginx 1.8.0***************************************** *******/
1. GRSEC and PaX
Reinforce the host system.
2. Use Docker in combination with AppArmor/SELinux/TOMOYO
Use man
field.
"Symantec's research is very beneficial to consumers because it is a powerful correction to Microsoft's information," jaquith said. Although vista is more secure than windows xp, "it is also necessary for people to identify weaknesses from outside of Microsoft ."
Honesty is almost cruel
Although Symantec's research praised vista for its security, the reports were so clear and predictable that its criticism of vista was almost cruel:
"Many of the technologies Microsoft uses to improve the
1. In Ubuntu, there is has Terminal and Root Terminal.Terminal:ctrl+alt+tRoot Terminal:???Command line interface:ctrl+alt+f1 or ctrl+alt+f2 >> exit:ctrl+alt+f7 >> How do I use without password??2. A Picture Show the structure:3. Nine Categories and details in each categoryFile system >> Processes >> User Environment >> texting process >> Shell builtins >> Network ing >> searching >> Documentation >> MiscellaneousFile system: cat >> cd >> chmod >> chown >> chgrp >> cksum >> CMP >> CP >> dd >> du
difficult to do serious damage or upgrade to the host.This will not affect conventional web applications; But malicious users will find that Arsenal are significantly down in their disposal! By default, Docker drops all features except those that need to be whitelisted, not blacklisted. You canSee a complete list of online Help features available in Linux.Of course, you can always enable additional features if you really need them (for example, if you want to use the fuse-based file system), bu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.