cifs - NFS (file system sharing)
Note: the server version should be consistent with the image
yum install nfs-utils -y
15 systemctl start nfs
16 firewall-cmd --get-services
17 firewall-cmd --permanent --add-service=nfs ##Add firewall policy
18 firewall-cmd --permanent --add-service=rpc ...
Posted by SevereSoldier on Sun, 31 May 2020 18:39:38 +0200
Function description: Lists a list of files (including subdirectories) in a specified directory, but does not display the contents of the files
Usage: ls [OPTION]... [FILE]...
Show all files, including hidden files
Show all files except.And..
Show detailed properties of the file
Converts the f ...
Posted by mcovalt on Thu, 28 May 2020 18:33:58 +0200
Due to the high security requirements of the company where the friend is located, zabbix's network environment cannot be connected to the Internet, so it is not possible to send the alarm directly to some instant messaging tools through zabbix, which requires sending the alarm message to some middleware and forwarding it t ...
Posted by lanas on Tue, 26 May 2020 19:11:42 +0200
In the previous essay, we learned about docker's network related instructions. Please refer to https://www.cnblogs.com/qiuhom-1874/p/12952616.html Today, let's talk about docker's data management instructions;
In the previous blog, we emphasized that the image of docker is built hierarchically. After the image is started as a container, docker ...
Posted by Kinsbane on Mon, 25 May 2020 13:00:27 +0200
ELK-7.3 Local Deployment
Logstash is a data analysis software designed to analyze log logs.The whole set of software can be thought of as an MVC model, with logstash as the controller layer, Elasticsearch as the model layer, and kibana as the view layer.First, the data is passed to logstash, which filters and formats ...
Posted by Willburt on Thu, 21 May 2020 18:51:35 +0200
The previous articles describe a number of ways to hide processes, hide TCP connections, and hide kernel modules. To sum up, the differences from most articles on the Internet that introduce Rootkit are:
Most articles on the web are hook procfs to hide objects.
My approach is to remove objects directly from data structures such as chains.
1. Query every s in fruits table_ All f corresponding to ID_ Name value
#Compact in groups
mysql> select s_id,group_concat(f_name) as name from fruits group by s_id having count(f_name) > 1;
2. Same statistics s_ What are the rows of ID values?
mysql> select s_id,count(*) as total from fruits group by s_id with rollup;
Note: the role ...
Posted by puritania on Mon, 18 May 2020 15:05:43 +0200
Our goal today is to set up a Nginx service on Centos to facilitate subsequent testing and learning.This is also the first step in learning about other Internet components.Next, I will describe the source code compilation process step by step, with some instructions.
1. Download the latest source code on the official website and unzip it
Posted by bassguru on Sun, 17 May 2020 21:15:28 +0200