shell programming redirection and variables
Due to the particularity of "batch processing" of Shell script, most of its operation processes run silently without user intervention. Therefore, it is very important to learn how to extract and filter execution information. There are two I/O operations in Shell environment: redirection and pipeline.
Linux system uses files to descr ...
Posted by brynjar on Fri, 10 Dec 2021 11:57:27 +0100
Introduction to Linux Programming - Implementation of who instructions
The previous article briefly introduced some concepts and knowledge of Linux system programming. Starting from this article, we explained the functions of system commands, and gradually explained Linux system programming from simple to deep.
It is suggested that learners should have a certain foundation of C language and understand the concept ...
Posted by blanius on Fri, 10 Dec 2021 02:19:37 +0100
Advanced Automated Deployment of windows Service+OpenSSH+SVN on Jenkins
1. IntroductionI've written two articles about introducing automated deployment using Jenkins, regardless of whether the enterprise is using it now. Net Framework or. Net Core, whether the enterprise is using git or SVN. In fact, these two articles are usually enough to deliver 80% of the business in the development phase. The disadvantage is t ...
Posted by Jove on Thu, 09 Dec 2021 19:55:57 +0100
linux installation software program (Debian [aptitude], Red Hat system [yum], source code installation) - with detailed methods
Install software programs
0 summary
linux, package management system (PMS), and command line tools for software installation, management and deletion.
How to use the software package management system (PMS) to install, update or delete software at the command line. Although most Linux distributions use beautiful GUI tools for package man ...
Posted by big-dog on Thu, 09 Dec 2021 19:26:57 +0100
Day 8: free usage of common Linux commands
1. Command introduction
When our online maintenance server is running normally, a very important indicator is about the memory utilization rate. When the memory utilization rate of our server is too high, it is bound to reduce the operation performance of the server. In this regard, we will build some real-time monitoring platforms to facili ...
Posted by phpdood on Thu, 09 Dec 2021 19:09:43 +0100
VMware virtual machine network configuration under Linux environment (bridging and NAT)
Software configuration: vmware, openeuler 21.03 (other linux systems)
1. Bridging mode
This is equivalent to creating a separate host in a LAN. It can access all hosts in the LAN, but it needs to manually configure the IP address and subnet mask, and it is in the same network segment as the real host (nat is two network segments). In this mod ...
Posted by Ruud Hermans on Thu, 09 Dec 2021 14:49:39 +0100
RHCE (firewalld - view and use)
1.2. View current status and settings firewalld
1.2. 1. View the current status firewalld
Firewall service firewalld is installed in the system by default. Use the firewalld CLI interface to check that the service is running.
[root@kittod ~]# firewall-cmd --state
running
For more information about service status, use the systemctl status ...
Posted by sunshine66 on Thu, 09 Dec 2021 13:08:11 +0100
DHCP server setup
matters needing attention
When using two Linux hosts, you must ensure that the two devices can be connected to each other. You can configure static IP first to test whether the two hosts are connectedIn the virtual network editor, do not use the local DHCP service to assign IP addresses to virtual machinesBoth devices use host only mode ...
Posted by gitosh on Thu, 09 Dec 2021 06:14:24 +0100
Linux Capability exploration experiment
Linux Capability exploration experiment
Experimental description
In this experiment, we will feel the advantages of linux capability function in access control, master the purpose of using Capability to comply with the principle of minimum permission, and analyze the design of access control based on Capability in linux.
Environment construc ...
Posted by jake2891 on Thu, 09 Dec 2021 01:53:35 +0100
A joint encryption solution using RSA asymmetric encryption and AES symmetric encryption and process recovery
With the development of the Internet environment, a series of security problems caused by network security problems will lead to the disclosure of trade secrets, economic losses of enterprises / individuals, and even cyber crime, or endanger national security.
In the current development ...
Posted by immunity on Wed, 08 Dec 2021 09:59:28 +0100