How to find files and soft links when using vim (gvim) in Windows

I believe many of my friends, like me, use vim for office in both linux and windows. but after all, vim is native in linux, and some support in windows is still not very good. This series of articles will be discussed together. 1. search for chicken

Iptables command parameters

I. entry to iptables there are many ways for hackers to intrude into computers today, among which port-based intrusions are common. In particular, it is the simplest and most commonly used method to defend against hacker intrusions to shut down

How to use tcpdump to capture packets on android phones

Two days ago, I made an android client and found that the reported data is not the same as the expected data. I can only view the client request data and server response data, and found the error. On the Internet, Baidu found that tcpdump can solve

Basic use of iptables/nat

Overview NetFilter is a set of flexible package filtering firewall/Advanced Router Support introduced by Linux2.4kernel in combination with kernelspace/userspace. Iptables is a user-state tool that can be used to modify Netfilter rules. in

CentOS6 system optimization guide

The company's development environment uses centos + virtualbox, but has made some basic optimizations to facilitate development. since it is an internal development environment, the first thing we can ensure is that development is convenient to

/Etc/fstab configuration file details

Etc/fstab is a text file in which each file system (including partitions or devices) is described in one row. in each row, fields are separated by spaces or tabs. lines starting with "*" in the file are comments. Sorting records in fstab files is

Use ULOGD to implement iptables logs

ULOGD-theUserspaceLoggingDaemon reference a paragraph of the author's original words: HaraldWeltelaforge@gnumonks.orghttp: // www.gnumonks.org/gnumonks/pr..._details? P_id1Thispackagesisintendedforpassingpack ULOGD-the Userspace Logging

Configure the fstab file to mount automatically when Linux is started)

1. the fstab file is stored in the file system information in the/etc/fstab file. When the file is correctly set, you can use the mount/directoryname command to load a file system. each file system corresponds to an independent line, fields in each

Use iptables in Ubuntu to configure proxy servers

In Ubuntu, this article uses Ubuntu: to enable the net. ipv4.ip _ forward1 option in/etc/sysctl. conf to write the following script file. Proxy. sh #! /Bin/shsysctl-p/sbin/modprobeip_tables/sbin/modprobeip_nat_ftp # if this machine is This article

Detailed usage of tcpdump scanner

The first type keyword mainly includes host, net, port, such as host210.27.48.2, specifying 210.27.48.2 as a host, net202.0.0.0 specifying 202.0.0.0 as a network address, and port23 specifying port number as 23. If no type is specified, the default

Saves tcpdump packet capture results and uses wireshark for analysis

In linux, it is very convenient to use tcpdump to capture packets, but wireshark is more convenient to filter and analyze the captured packets. The following describes the use of TCPDUMP example: tcpdumphost172.16.29.40andport4600-the X-s500tcpdump

Set the YUM source of the RHEL6 system

Uninstall the YUM package that comes with RHEL6. Run the following command to check the YUM dependency. Rpm-qRyum gets dependency: [root @ bogondoc] # rpm-qRyum-3.2.27-14.el6.noarch/usr/bin/pythonconfig (yum) 3.2.27-14. el6pygpgmepython2.4python

How to enable port 80 in Linuxiptables firewall

When apache is installed in Linux, access IP addresses cannot be accessed! If the installation fails, the port 80 # netstat-lnt | grep80tcp00 ::80 ::: * LISTEN of the apache listener is successfully installed! Unable to use the telnetIP80 on the

RHEL system local and network yum source construction

The Red Hat yum package management system appears to solve the dependency between RHEL5 and RHEL6 local and network yum source creation, and to facilitate and quickly install rpm, after yum is configured, you can use the add/delete program in the

How to replay tcpdump captured packets

This is often the case in the development work. when I work with my colleagues, the other party sends a test package and uses tcpdump here? Xlnsp0 caught the package, but the program results are incorrect. debug, modify, and test again. then, let

Use ext4 file system in CentOS5.x

Generally, CentOS5.x has ext4 kernel modules but is not loaded. Run the following command cd/lib/modules/*/kernel/fs/ext4/. Note that the command above contains wildcards, because the kernel versions of different systems may be different. Then

CentOS6.5 system upgrade from Python2.6.6 to python2.7.3

Upgrade Python2.6.6topython2.7.3 under Centos6.5. for me who don't use Pyhthon, the Python version has little to do with me, but I used to use SSH and suddenly wanted to switch to GoAgent, I suddenly realized that my Python version was too low and I

CentOS6.5 system security reinforcement and performance optimization

Users who often play with Linux systems know more or less about system parameter optimization and how to enhance system security. some of the default system parameters are conservative, therefore, we can adjust system parameters to increase the

CentOS system installation graphic tutorial

There are many installation tutorials for CentOS systems, but they are incomplete or have some errors. Or the explanation is not detailed, which is too general. Here we provide a detailed installation solution for CentOS system installation. We hope

Tutorial on using tcpdump command to capture packets in Linux

Prerequisites: 1. a machine with Linux installed .... This is necessary; 2. Tcpdump program; 3. all of the following are root user logon operations, and commands cannot be copied directly to the Linux console. please enter them manually! 4. for

Total Pages: 2732 1 .... 1098 1099 1100 1101 1102 .... 2732 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.