Baidu search Kali Linux into the official website:On the homepage select downloads Download:There are a lot of options here, you can choose to download the image file, or you can download the virtual machine files directly:After the download is complete, we check the SHA256
Kali2.0 used these days, summed up the personal software installation situation.Of course, some of the security audit software comes with some, but most of them do not understand, but the work needs to use a few.1. Wired InternetThe wired network device is enabled.Change/etc/networkmanager/networkmanager.conf[Main]Plugins=ifupdown,keyfile[Ifupdown]Managed=trueTo change the managed value from Fals to True, restart the Network service networking restart or Reboot/init 6.2. Dual NIC SettingsWired a
The Ali Linux Series tutorial is an introductory tutorial sold on 51cto, priced at $100. Every day there are many netizens looking for me to all tutorials, also someone secretly recorded the tutorial. Simply open out, if you think you can, I hope you can choose to send a small red envelope or forward to get video tutorial information to your friends, so that more people to join in order to motivate me to make more and better tutorials free dedication
-installerCreate alias files (if not present):$ sudo cp/usr/bin/sublime-text/usr/bin/sublime-text$ sudo cp/usr/bin/sublime-text/usr/bin/sub1Now you can use the sublime text.Appendix: Adding PPA under DebianReference text :Https://blog.anantshri.info/howto-add-ppa-in-debian1.Download file
$ wget Http://blog.anantshri.info/content/uploads/2010/09/add-apt-repository.sh.txt
2.Save This file in/usr
From Linux to the Windows copy files or from Windows to Linux copy files, sometimes the Chinese file name garbled, the cause of this problem is because the Windows file name Chinese encoding defaults to GBK, and the default file name in Linux is encoded as UTF8, Because the encoding is inconsistent, so the file name garbled problem, to solve this problem need to
The idea of penetrating attacks is generally to scan for vulnerabilities and then exploit different vulnerabilities to attack penetration.Vulnerability Scanning Tool has nessus, the tool can be at the same time on the local or remote control, the vulnerability analysis of the system scan. Nessus a system vulnerability can be scanned by creating a new scan policy and adding a corresponding plug-in.Another vulnerability scanning Tool is OpenVAS, which is not described here.The above describes the
/sublime-text$ sudo cp/usr/bin/sublime-text/usr/bin/sub1Now you can use the sublime text.Appendix: Adding PPA under DebianReference text:Https://blog.anantshri.info/howto-add-ppa-in-debian1.Download file$ wget Http://blog.anantshri.info/content/uploads/2010/09/add-apt-repository.sh.txt2.Save this file in/$ CP Add-apt-repository.sh.txt/usr/sbin/add-apt-repository3. Change permissions to execute$ o+x/usr/sbin/add-apt-repository4. Change ownership to Roo
Linux variables #, @, 0, 1, 2, *, $, $? Linux VariablesLinux variables #, @, 2, *, $, $
Let's first write a simple script and then explain the meaning of each variable after execution # touch variable # vi variable script content is as follows :#! /Bin/shecho "number :#"
E
Init is one of the most indispensable programs in Linux system operation. Init process, which is a user-level process initiated by the kernel. The kernel will find it in several places in the past that used Init, and its correct location (for Linux systems) is/sbin/init. If the kernel cannot find Init, it will try to run/bin/sh, and if it fails, the boot of the system will fail.Linux 7 RunLevel (
The meaning of shell variable $#,[email protected],$0,$1,$2 in Linux is explained:Variable Description:$$The PID of the shell itself (ProcessID)$!PID of the Shell's last running background process$?End code of the last Run command (return value)$-Flag at a glance using the SET command$*All parameter lists. such as "$*" in the Case of "" ", in the form of" $ $ ...
Linux Medium Variable $#,[email protected],$0,$1,$2,$*,$$,$? the meaningLet's start by writing a simple script that will explain the meaning of each variable after execution.The script reads as follows:[email protected] ~]# cat Test.txt#!/bin/bashecho "number:$#" echo "Scname:$0" echo "First:" echo "Second:$
Original URL: http://www.cnblogs.com/fhefh/archive/2011/04/15/2017613.htmlThe meaning of shell variable $#,[email protected],$0,$1,$2 in Linux is explained:Variable Description:$$The PID of the shell itself (ProcessID)$!PID of the Shell's last running background process$?End code of the last Run command (return value)$-Flag at a glance using the SET command$*All
#!/bin/bash#Created by Ley on 2014-11-14#Testing the Paramtersecho "The Compleate list is%s\n" "$$"echo "The Compleate list is%s\n" "$!"echo "The Compleate list is%s\n" "$?"echo "The Compleate list is%s\n" "$*"echo "The Compleate list is%s\n" "[Email protected]"echo "The Compleate list is%s\n" "$#"echo "The Compleate list is%s\n" "$ $"echo "The Compleate list is%s\n" "$"echo "The Compleate list is%s\n" "$ $"the meaning of shell variable $#,[email protected],$
close SELinux->setenforce 0Set power on auto-off SelinxuMethod One:->vim/etc/selinux/configChange "selinux=enforcing" to "selinux=disalbed"->[ESC]: WqMethod Two:->sed-i ' s/selinux=enforcing/selinux=disalbed '/etc/selinux/config"Set CD on auto Mount"->echo "/dev/sr0/mnt iso9660 defaults 0 0" >>/etc/fatab#将系统镜像加载到 the/etc/fstab file"Configure Yum Source"Empty Yum Source->rm-rf/etc/yum.repos.d/*Configuring t
1. Create a simple script variable:Vim variable2. Modify the contents as follows:#!/bin/SHEcho "number:$#"Echo "scname:$0"Echo "First : $"Echo "second:$2"Echo "Argume:[email protected]"Echo "Show Parm list:$*"Echo "Show Process id:$$"Echo "Show Precomm stat: $?"3. Execute the Script./variableThe meaning of some parameters in a Linux shell script: $# is the number
Original URL: http://dadekey.blog.51cto.com/107327/119938let's start by writing a simple script that will explain the meaning of each variable after execution .# Touch Variable# VI VariableThe script reads as follows:#!/bin/shecho "number:$#"echo "Scname:$0"echo "First: $ $"echo "Second:$2"echo "Argume:[email protected]"echo "Show Parm list:$*"echo "Show Process id:$$"echo "Show Precomm stat: $?"Save Exit a
1. Mount ISO image #创建挂载点 mkdir/mnt/chroom #手动挂载iso镜像 mount-o loop-tiso9660/tmp/xxx.iso/mnt/chroom# (-t specify mount type -o Mount mode) #查看是否挂载成功 df-hcd/mnt/chroom #取消挂载 umount/mnt/chroom# #设定开机自动挂载-Method 1vi/etc/rc.d/rc.local# (The RC.D directory below corresponds to each level start-up add-on) new mount-oloop-tiso9660/tmp/ xxx.iso/mnt/chroom # #设定开机自动挂载-Method 2vi/etc/fstab new /tmp/ xxx.iso/mnt/chroomiso9660loop00 #查看开机自动挂载是否设定成功 umountmount-a2. Setting the yum source to ISO image cd/
I feel that my understanding of Linux has not been enough, so I recently turned to a "bird brother's Linux private dishes." This is a basic book, lofty high-rise floor, will not much but can learn. This is a few of my knowledge points, although very basic. Hope to share with you. Chapter 0 Computer Overview1, the computer has three major parts:A. input section,
Tags: number let [email protected] syn ber guide div lsp harExcerpt from: Abs_guide: http://www.tldp.org/LDP/abs/abs-guide.pdf
The meaning of shell variable $#,[email protected],$0,$1,$2 in Linux is explained:Variable Description:$$The PID of the shell itself (ProcessID)$!PID of the Shell's last running background process$?End code of the last Run
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.