Introduction to firewalld
firewalld is a daemon that can configure and monitor system firewall rules. It covers the settings of iptables, IP6 tables and ebtables.
The dynamic firewall function is realizedYou can communicate with firewalld through DBus message system to request to open the network port, so as to ...
Posted by planethax on Thu, 10 Mar 2022 15:56:19 +0100
Detailed explanation of route command parameters, adding and deleting route commands in linux
The route command of linux system is used to display and operate the IP routing table (show / manage the IP routing table). To realize the communication between two different subnets, a router connecting the two networks or a gateway located in both n ...
Posted by webworks on Thu, 10 Mar 2022 11:51:37 +0100
Discovery host refers to the host that detects activity in the network. Discovering hosts is the first and most important step in implementing penetration testing. Penetration testing can only be performed further if the target host is determined to be active. Hosts can be discovered in Nmap s in different ways, such as
IP discovery, ICMP d ...
Posted by AliasBDI on Wed, 09 Mar 2022 18:47:06 +0100
Introduction to the linux operating system: We often use the Windows operating system in our daily life, so what is this linux operating system? Linux, fully known as GNU/Linux, is a free-to-use and free-to-disseminate UNIX-like operating system. Its kernel was first released on October 5, 1991 by Linus Benedict Towaz. Inspired by the ideas of ...
Posted by veenasv on Wed, 09 Mar 2022 18:27:31 +0100
1. Introduction to Tomcat
Tomcat server is a free open source Web application server. It is a lightweight application server. It is widely used in small and medium-sized systems and when there are not many concurrent access users. It is the first choice for developing and debugging JSP programsGenerally speaking, Tomcat has the same functi ...
Posted by stevehaysom on Wed, 09 Mar 2022 16:47:14 +0100
The Linux command line provides various commands to terminate the process. For example, the "kill" command can be used to kill a process by passing its PID as a parameter, and the "pkill" command takes a pattern as input and kills all matching running processes. However, there is a command 'kill', which exactly matches the ...
Posted by toledojimenez on Wed, 09 Mar 2022 14:56:35 +0100
I Set up SSH service
1. Turn off the firewall and SELinux
2. Configure yum source
3. Installation of openssh software
The underlying software name of SSH service is openssh. open source, SSH is SSH service. Openssh belongs to C/S architecture software, which has client and server.
Server: openssh server
Installation steps ...
Posted by basheer12m on Wed, 09 Mar 2022 12:45:19 +0100
Python Trojan horse writing
Problems encountered and Solutions
Start with netcat Py file, which is prepared to imitate some kali tools net cat
There was a problem. The code couldn't run out after writing, and the script couldn't be debugged with parameters. By adding print to correct the errors one by one, it was found that it was the blocki ...
Posted by DamienRoche on Wed, 09 Mar 2022 10:43:53 +0100
I Process concept
1. The difference between process and procedure? Uncompiled program ------------ executable program Program: a pile of programs to be executed GCC hello C - O hello (program is a static data) script
Process: only when the program is loaded into the CPU and occupies resources, it can form a truly dynamic process by reacting t ...
1. Server configuration
1. Reset the server password
After purchasing a server (take Alibaba cloud as an example), a service will be generated in the server list. Click the server to enter server management (the interface may be different for different Linux versions). The default server initialization password is empty, so you need to set a ...
Posted by bogeyman on Wed, 09 Mar 2022 08:54:08 +0100