Recently requested by the company, the need for remote transmission and backup of file data, wrote an article on the SSH, SCP and rsync application configuration of the whole process, may be too wordy, but mainly to want to do not miss each process
Recently requested by the company, the need for remote transmission and backup of file data, wrote an article on the SSH, SCP and rsync application configuration of the whole process, may be too wordy, but mainly to want to do not miss each process
Openssh-server1.openssh-serverFunction: Allow remote host to access sshd service over the network, start a secure shell2. Client Connection modeSSH remote host user @ remote host IP[[email protected] ~]# ssh [email protected]The authenticity of host
SSH key authentication:Use:1.SSH IP Address2.ssh [email protected] Remote host IP address # #USERNAME和IP都是远程主机的2.ssh-l USERNAME Host_ipThe secret key is saved in the user's home directory, ~/.ssh/known_hostsSSH follows the protocol for OpenSSL:SSH
IP Sub-network Divisionn IP address and subnet maskThe IP address is made up of 32-bit binary numbers, which are generally expressed in dotted decimal notation.1. Classification of IP addressesThe IP address consists of two parts: the network
I. Text-processing Exercises1. Find all IPv4 address of native in ifconfig command result[Email protected] zhang]# ifconfig |tr-s "" |head-2 |tail-1| Cut-d ""-f32. Find out the maximum percentage value of partition space utilization[Email protected]
first, write in frontThe company's Android department in the expansion, especially when we this new recruit, the load is very heavy Gerrit server more unbearable. Some time ago, I was fortunate to participate in building the Gerrit server cluster,
Summary: Recently, many Linux commands have been used to deploy and release projects in the production environment. These commands are summarized and recorded. Linux Command summary:
First, make several statements:
(1). These commands are run on
Wildcard characters for file names:[0-9]\[a-z]\[[:d Igit:]]\[[:alpha:]]\[[:alnum]]\[[:upper:]]\[[:lower:]]\[[:black:]]Rename renaming# Rename. txt. xsl/appTreeView Structure-d-lTr# ifconfig eth0 |tr A-Z A->ip.txt you can save by converting and
First, Openssh-serverFunction: Allow remote host to access sshd service over the network, start a secure shellSecond, the Client connection modeSSH remote host user @ remote host IP650) this.width=650; "src="
Server 1-----SSH#终于开始记录总结服务器了, because often used to sshd, is also a relatively simple server, learning is also easy, so organized into a blog, there are questions to point out OHOne: Related knowledge interpretationLet's talk about SSH and sshd:SSH
Previously found on the Internet, written here just to record, if there is infringement, please contact me immediately deleteAfter the Redboot boot completes, it enters the command line State (CLI), accepts the command and executes, if you use the
Normal user added to Sudoers
U Switch to root
Visudo into the editor, locate root all= (all), and add the followingMyUserName all= (All) all
Configure the Networksudo
1. Find all the IPv4 addresses of the ifconfig command results in this machine.[[email protected] ~]# ifconfig #centos6下eth0 Link encap:Ethernet HWaddr 00:0C:29:BA:F9:36 inet addr:192.168.99.99 bcast:192.168.99.255 mask:
Sshkey authentication in Linux
In the actual production environment, sshkey key authentication is often used for data distribution and other operations. You can also operate Intranet servers in batches and implement password-free authentication to
I have recently developed and debugged PHP programs in Linux. Here I will summarize the commonly used commands.
Program background running: nohup program command> xx. log 2> & 1 &. This command can still run after the end of the terminal. If you
Distribution system: Used for multiple server code or software simultaneous distribution of execution1.install–y Expect installation expect program for automatic login to remote server2. Write Automatic Login ScriptVim Hu.expect#! /usr/bin/expectSet
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.