This is the method provided online:
. tar.gz
Decompression: Tar zxvf FileName.tar.gz
Compression: Tar zcvf FileName.tar.gz DirName1 DirName2
Roughly summed up the Linux under the various formats of compression package compression, decompression
John differs from tools such as Hdra. Hydra a blind brute force attack by attempting a username/password combination on a service daemon on an FTP server or Telnet server. However, John first needs to hash it out. So the bigger challenge for hackers
Psdash is a web panel that looks at Linux system information, and as we have previously mentioned, another system monitoring tool glances, Psdash System Information collection is also done by Psutil. Unlike glances, Psdash does not provide an API,
Defense principleThe principle of DDoS deflate is to use the netstat command to find a single IP that emits an excessive amount of connectivity and to reject the IP using the iptables firewall. Because the iptables firewall is far more efficient
Preparatory work:
Need to advance in the VPS to install good lftp,lftp function more powerful, CentOS Direct execution: Yum install Lftp,debian execution: Apt-get install.
You need to create the/home/backup/directory on the VPS and create the
(1): Create SVN warehouse path
Mkdir-p/opt/svn/project1
Svnadmin Create/data/svn/project1
Note: For specification: Generally in the project directory to create again:First create a good directory Dev and pub can be placed in a directory, import
1. Download Sogou Input Method installation package
Download Address: http://pinyin.sogou.com/linux/, the following figure, to select the same number of systems with their own installation package, my system is 64 bits, so I downloaded 64-bit
In the analysis of the system, one of the first and most basic tools is often a simple measurement of the CPU utilization of the system. Linux and most unix-based operating systems provide a command to display the system's average load (loadaverage).
Let's introduce the next three encryption methods:
Symmetric encryption
Public Key Cryptography
One-way encryption
Symmetric encryptionImplementation Tool OpenSSL ENC introduction[[email protected] sh]# man encenc -
1. Check the number of bits in your Linux system, 32-bit or 64-bit. Use the uname-a command to view.Shows aX86_64 indicates that you are a 64-bit kernel, running a 64-bit system.i386, i686 you're a 32-bit kernel, running a 32-bit system.2, first
1. PrefaceIn the previous article, we described how to compile and install Subversion1.9.5 and Apache2.4.25 on CentOS7, and integrate with Apache2.4.25 to achieve the effect of centralized authorization control in multiple SVN repositories. Using
to grow is an experience; experience is a life experience. The meaning of life lies not in what we have, but in what we learn from it. In theThis short three years, butin themy life is precious., in the memory of my mind,in thisUniversityfor three
QT under the static compile Qt, according to my experience, if according to the kind of windows under the Official SDK installed directly after the file to compile is not feasible, need to download QT source package directly, At present, the source
The simplest example of--hello world!
About input, output, and error outputs
Rules for variables in BASH (similarities and differences with C language)
Basic Process Control syntax in BASH
Use of functions
2.1 Simplest example
I. BACKGROUNDSystem administrators often require SSH or telent telnet to a Linux server and often run tasks that take a long time to complete, such as system backups, FTP transfers, and so on. Usually we open a remote terminal window for each of
To take full advantage of the elastic scale and high availability of public clouds, it is easy to say that scaling out is supported at the application level, or as standard for newly developed applications. However, for existing, old applications,
Nginx practical tutorial (II): getting started with the configuration file, nginx practical tutorialNginx configuration file structure
Nginx configuration fileDirective)Commands are divided into two forms: simple commands and block
Fedora Xfce 23 thunar does not display file thumbnails, but I don't know what it is like ?,
Fedora is a test version of Redhat Based on Redhat. The default desktop environment of Fedora workstation is Gnome. The Fedora with Xfce as the desktop
Ubuntu16.04 update the kernel-using more than 4.6 of the kernel will make the Dell computer with a card faster-and uninstall excess kernel, ubuntu16.044.6
Tips: I am a Dell a-card computer. I feel less fluent than fedora when using 16.04 desktop.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.