[Linux] process control -- process waiting and replacement

Process waiting 1. Necessity of process waiting ·We have previously introduced the zombie process, that is, when the child process exits, the parent process does not receive the exit status information of the child process. At this time, the child process becomes a zombie process, resulting in memory leakage. Once the process bec ...

Posted by pp4sale on Tue, 22 Feb 2022 15:12:09 +0100

PowerShell – get memory usage

Many times, PowerShell administrators must manually scan the server to see the performance problems of the server in the network. This can happen when one of the servers is not responding or unresponsive and causes performance problems on the related servers. In this case, knowing the memory usage of the server will help determine which particu ...

Posted by antonello on Mon, 21 Feb 2022 23:56:42 +0100

13, Configure and protect SSH services

13, Configure and protect SSH services This section describes how to configure and protect SSH services. As a service that must be understood in the foundation, it needs to be well mastered both in principle and operation. SSH is basically used for remote management in work. This column will cover the entire RHCSA certification: Addre ...

Posted by sgs on Mon, 21 Feb 2022 17:05:21 +0100

Linux tutorial (manual): concepts that Linux beginners must understand (common commands and operation analysis)

Recently, I plan to publish some articles on the use of basic commands of terminals under Linux. If you can use Linux, these articles can be used as a manual. If you've never been in touch with Linux readers, it's just right to see that there's nothing wrong (from getting started to giving up the series). I intend to write a TLDR at the begin ...

Posted by ayampanggang on Mon, 21 Feb 2022 16:41:34 +0100

DNS tunnel attack experiment record

It's time for bloggers to finish setting up. Because the data sets required by bloggers in the direction of setting up are rarely publicly provided (after all, DNS records have some privacy problems), they have to simulate DNS attacks to operate by themselves. First of all, if you want to know what is DNS tunnel attack, you can take a look at o ...

Posted by bobbfwed on Mon, 21 Feb 2022 13:51:25 +0100

Emergency response intrusion investigation Part II Linux

0x00 introduction In case of hacker intrusion, system crash or other security events affecting the normal operation of business, it is urgent to deal with them at the first time, so that the enterprise's network information system can resume normal operation in the shortest time, further find the source of intrusion, restore the process of ...

Posted by healy787 on Mon, 21 Feb 2022 08:11:05 +0100

docker basic command

summary: Since bloggers use docker in their daily development work, they specially find some materials for in-depth study of docker technology, and introduce it to you in combination with their commonly used docker commands in their daily work. Docker commands can be roughly divided into three categories: startup commands, image commands and c ...

Posted by mikebr on Sun, 20 Feb 2022 17:21:11 +0100

list of STL containers

Traversal of container: void printlist(list<int>& L) { for (list<int>::const_iterator it = L.begin(); it != L.end(); it++) { cout << *it << " "; } cout << endl; } I Constructor List < int LST > / / list Cao Yong template class try next year, the default construction form of the object list(beg,en ...

Posted by PHPMagician on Sun, 20 Feb 2022 15:38:29 +0100

Comprehensive experiment of three-tier architecture

catalogue preface Test requirements: Network topology idea: Experimental analysis: 1. Erunk configuration between SW1 and SW2 2. Create VLANs, divide VLANs and trunk roads 3. Configure STP 4. Configure SVI  5. Configure VRRP 6. Configure DHCP 7. Configure the ip address of R1, R2 and SW1 uplink 8. Configure OSPF routing 9. Con ...

Posted by dgwade on Sun, 20 Feb 2022 13:10:53 +0100

KVM, esxi virtual machine

1. Install and configure kvm virtual machine and create virtual machine. 1.1 when minimizing installation, change to graphical interface You need to turn on these CPU options when using the virtual machine Turn off the firewall, turn off selinux systemctl disable firewalld sed -i 's/SELINUX=enforcing$/SELINUX=disabled/g' /etc/selinux/co ...

Posted by jenni on Sun, 20 Feb 2022 12:57:22 +0100