shell programming redirection and variables

Due to the particularity of "batch processing" of Shell script, most of its operation processes run silently without user intervention. Therefore, it is very important to learn how to extract and filter execution information. There are two I/O operations in Shell environment: redirection and pipeline. Linux system uses files to descr ...

Posted by brynjar on Fri, 10 Dec 2021 11:57:27 +0100

Introduction to Linux Programming - Implementation of who instructions

The previous article briefly introduced some concepts and knowledge of Linux system programming. Starting from this article, we explained the functions of system commands, and gradually explained Linux system programming from simple to deep. It is suggested that learners should have a certain foundation of C language and understand the concept ...

Posted by blanius on Fri, 10 Dec 2021 02:19:37 +0100

Advanced Automated Deployment of windows Service+OpenSSH+SVN on Jenkins

1. IntroductionI've written two articles about introducing automated deployment using Jenkins, regardless of whether the enterprise is using it now. Net Framework or. Net Core, whether the enterprise is using git or SVN. In fact, these two articles are usually enough to deliver 80% of the business in the development phase. The disadvantage is t ...

Posted by Jove on Thu, 09 Dec 2021 19:55:57 +0100

linux installation software program (Debian [aptitude], Red Hat system [yum], source code installation) - with detailed methods

Install software programs 0 summary linux, package management system (PMS), and command line tools for software installation, management and deletion. How to use the software package management system (PMS) to install, update or delete software at the command line. Although most Linux distributions use beautiful GUI tools for package man ...

Posted by big-dog on Thu, 09 Dec 2021 19:26:57 +0100

Day 8: free usage of common Linux commands

1. Command introduction When our online maintenance server is running normally, a very important indicator is about the memory utilization rate. When the memory utilization rate of our server is too high, it is bound to reduce the operation performance of the server. In this regard, we will build some real-time monitoring platforms to facili ...

Posted by phpdood on Thu, 09 Dec 2021 19:09:43 +0100

VMware virtual machine network configuration under Linux environment (bridging and NAT)

Software configuration: vmware, openeuler 21.03 (other linux systems) 1. Bridging mode This is equivalent to creating a separate host in a LAN. It can access all hosts in the LAN, but it needs to manually configure the IP address and subnet mask, and it is in the same network segment as the real host (nat is two network segments). In this mod ...

Posted by Ruud Hermans on Thu, 09 Dec 2021 14:49:39 +0100

RHCE (firewalld - view and use)

1.2. View current status and settings firewalld 1.2. 1. View the current status firewalld Firewall service firewalld is installed in the system by default. Use the firewalld CLI interface to check that the service is running. [root@kittod ~]# firewall-cmd --state running For more information about service status, use the systemctl status ...

Posted by sunshine66 on Thu, 09 Dec 2021 13:08:11 +0100

DHCP server setup

matters needing attention When using two Linux hosts, you must ensure that the two devices can be connected to each other. You can configure static IP first to test whether the two hosts are connectedIn the virtual network editor, do not use the local DHCP service to assign IP addresses to virtual machinesBoth devices use host only mode ...

Posted by gitosh on Thu, 09 Dec 2021 06:14:24 +0100

Linux Capability exploration experiment

Linux Capability exploration experiment Experimental description In this experiment, we will feel the advantages of linux capability function in access control, master the purpose of using Capability to comply with the principle of minimum permission, and analyze the design of access control based on Capability in linux. Environment construc ...

Posted by jake2891 on Thu, 09 Dec 2021 01:53:35 +0100

A joint encryption solution using RSA asymmetric encryption and AES symmetric encryption and process recovery

        With the development of the Internet environment, a series of security problems caused by network security problems will lead to the disclosure of trade secrets, economic losses of enterprises / individuals, and even cyber crime, or endanger national security.         In the current development ...

Posted by immunity on Wed, 08 Dec 2021 09:59:28 +0100