As smartphones grow, the number of devices installed on the smart platform (Android, iOS) is also increasing rapidly. It brings great business opportunities to developers. Developers pay more attention to the android platform, which means that the
Function description: dumping network transmission data. Syntax: tcpdump [-adeflnNOpqStvx] [-c] [-dd] [-ddd] [-F] [-I] [-r] [-s] [-tt] [-T] [-vv] [-w] [output data column] supplementary description: run the tcpdump command to list the packet headers
The Tcpdump command of the Linux network performance debugging tool is used to monitor TCP/IP connections and directly read data headers at the data link layer. You can specify which data packets are monitored and which control formats are to be
In traditional local network analysis and testing technology, sniffer is the most common and important technology. Sniffer is designed for network analysis by network administrators and network programmers. Network administrators can keep abreast of
1. ip commands the ip commands integrate the ifconfig and rout commands and are more powerful. Ip [-s] link/address/route1) iplinkset/show [device] [action and parameter] 2) ipaddress [add | del] [IP parameter] [dev device name] [related parameter]
Tcpdump is a commonly used packet capture tool in linux command lines. it records the commonly used methods and the testing machine system is ubuntu12.04. The tcpdump command format contains many tcpdump parameters. you can use mantcpdump to view
The purpose of Iptables configuration is to prevent Internet intrusion, and to allow internet peers to access the Internet. Before IPTABLES is configured, only the local machine can access the Internet. There is a "security level" in "system
Configure the syslogd configuration file/etc/syslog. for details about the conf record level, you can view the file syslog. conf generally has the following levels: debug, info, notice, warning, warn, err, error, crit, alert, emerg, panic. Among
Run the mount command mountrootfson/kernel (ro, relatime) tmpfson/devtypetmpfs (rw, relatime, mode755) devptson/dev/ptstypedevpts (rw, relatime, mode600) procon/kernel (rw, rel input the mount command
Mount
Rootfs on/type rootfs (ro, relatime)
Tmpfs
1. the dependency requires the kernel to compile the NFS module portmap package. the nfs service starts the dependency rpc service, the service is installed through portmap 2. the nfs-utils package # yuminstallnfs-utils3 is installed, the nfs
I encountered a problem yesterday. after the project was deployed on the server, I found that a JSP file could not be accessed and reported a 500 error ~~~ At first, I thought it was a code problem. After optimizing the code, I found that the error 5
In CentOS system usage, we will encounter many problems. For example, if the CentOS system is installed, only port 22 is enabled by default. if you want to open other ports, you need to open the required ports. For example, how do I enable http's
In CentOS, perform VNC configuration, check VNC clients and servers, add user names to configuration files, start VNC services, and modify the Windows controller of VNCSERVER. 1. check whether the VNC client and server have been installed and run
In the latest Linux kernel, the iptables module is uninstalled (unload) by default when iptables is restarted, and then loaded and restarted. In this configuration, if iptables is restarted, the connection that is valid for the tcp initiator
I. preface the firewall is actually used to implement access control in Linux. it can be divided into two types: hardware or software firewalls. In any network, the firewall must work on the edge of a network. Our task is to define how the firewall
Open Virtual Machine vnc port, dns, bootps and other ports. Create the chain and rules required for the nova-compute and nova-network. manually add and create virtual machines with the same effect. Iptables-IINPUT1-ptcp-mmultiport -- dport5900: 6200,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.