Common command operation of firewall of CentOS7 series

firewalld Introduction to firewalld firewalld is a daemon that can configure and monitor system firewall rules. It covers the settings of iptables, IP6 tables and ebtables. firewalld features The dynamic firewall function is realizedYou can communicate with firewalld through DBus message system to request to open the network port, so as to ...

Posted by planethax on Thu, 10 Mar 2022 15:56:19 +0100

Understanding of routing related instructions and concepts

Detailed explanation of route command parameters, adding and deleting route commands in linux The route command of linux system is used to display and operate the IP routing table (show / manage the IP routing table). To realize the communication between two different subnets, a router connecting the two networks or a gateway located in both n ...

Posted by webworks on Thu, 10 Mar 2022 11:51:37 +0100

nmap Tutorial - 2 - Discovery Host

Discovery host refers to the host that detects activity in the network. Discovering hosts is the first and most important step in implementing penetration testing. Penetration testing can only be performed further if the target host is determined to be active. Hosts can be discovered in Nmap s in different ways, such as IP discovery, ICMP d ...

Posted by AliasBDI on Wed, 09 Mar 2022 18:47:06 +0100

Linux Operating System

Introduction to the linux operating system: We often use the Windows operating system in our daily life, so what is this linux operating system? Linux, fully known as GNU/Linux, is a free-to-use and free-to-disseminate UNIX-like operating system. Its kernel was first released on October 5, 1991 by Linus Benedict Towaz. Inspired by the ideas of ...

Posted by veenasv on Wed, 09 Mar 2022 18:27:31 +0100

Tomcat service deployment and virtual host configuration and parameter optimization

1. Introduction to Tomcat Tomcat server is a free open source Web application server. It is a lightweight application server. It is widely used in small and medium-sized systems and when there are not many concurrent access users. It is the first choice for developing and debugging JSP programsGenerally speaking, Tomcat has the same functi ...

Posted by stevehaysom on Wed, 09 Mar 2022 16:47:14 +0100

Killall command and examples in Linux

The Linux command line provides various commands to terminate the process. For example, the "kill" command can be used to kill a process by passing its PID as a parameter, and the "pkill" command takes a pattern as input and kills all matching running processes. However, there is a command 'kill', which exactly matches the ...

Posted by toledojimenez on Wed, 09 Mar 2022 14:56:35 +0100

Remote management SSH service

I Set up SSH service 1. Turn off the firewall and SELinux 2. Configure yum source 3. Installation of openssh software The underlying software name of SSH service is openssh. open source, SSH is SSH service. Openssh belongs to C/S architecture software, which has client and server. Client: ssh Server: openssh server Installation steps ...

Posted by basheer12m on Wed, 09 Mar 2022 12:45:19 +0100

Python simple Trojan

Python Trojan horse writing Problems encountered and Solutions Start with netcat Py file, which is prepared to imitate some kali tools net cat There was a problem. The code couldn't run out after writing, and the script couldn't be debugged with parameters. By adding print to correct the errors one by one, it was found that it was the blocki ...

Posted by DamienRoche on Wed, 09 Mar 2022 10:43:53 +0100

The concept of process and the usage of exec

I Process concept 1. The difference between process and procedure? Uncompiled program ------------ executable program Program: a pile of programs to be executed GCC hello C - O hello (program is a static data) script Process: only when the program is loaded into the CPU and occupies resources, it can form a truly dynamic process by reacting t ...

Posted by faza on Wed, 09 Mar 2022 09:45:54 +0100

Linux server build project running environment

1. Server configuration 1. Reset the server password After purchasing a server (take Alibaba cloud as an example), a service will be generated in the server list. Click the server to enter server management (the interface may be different for different Linux versions). The default server initialization password is empty, so you need to set a ...

Posted by bogeyman on Wed, 09 Mar 2022 08:54:08 +0100