No interaction in shell programming
Here Document interaction free
Cross free mutual definition
Here Document overview:
Use I/O redirection to provide a list of commands to interactive programs or commands, such as ftp, cat, or read commands
Here Document is an alternative to standard input, which can help script developers not use temporary files to build input informa ...
Posted by corporateboy on Sun, 27 Feb 2022 05:54:00 +0100
SSH secret free automatic connection
1. GeneralFor the use of Linux operating system, the importance of SSH is self-evident. However, you have to enter a lengthy user name @ host IP every time you log in, and sometimes you forget the user name / host IP. It is also a waste of time to check the records again, so this time we need to configure the SSH login configured to the server ...
Posted by jamesp on Sun, 27 Feb 2022 03:43:13 +0100
atlas stand-alone installation
1, Virtual machine preparation
Update virtual machine, command: yum -y updateModify the hostname. The command is hostnamectl set hostname atlasClose the firewall. The command is systemctl stop firewalld Service and systemctl disable firewalld servicereboot
2, Install jdk
Uninstall openjdk, command:
rpm -e --nodeps java-1.7.0-openjdk
rpm -e ...
Posted by frao_0 on Wed, 23 Feb 2022 05:20:54 +0100
13, Configure and protect SSH services
13, Configure and protect SSH services
This section describes how to configure and protect SSH services. As a service that must be understood in the foundation, it needs to be well mastered both in principle and operation. SSH is basically used for remote management in work.
This column will cover the entire RHCSA certification: Addre ...
Posted by sgs on Mon, 21 Feb 2022 17:05:21 +0100
Basic operation of Ansible common modules
ping module ping is a common module to test whether the SSH connection of the remote node is ready. However, it is not as simple as the Linux command to ping the remote node. Instead, first check whether the remote node can log in through SSH, and then check whether its Python version meets the requirements. If it meets the requirements, it wil ...
Posted by Drabin on Fri, 18 Feb 2022 11:58:28 +0100
Basic use of Linux commands
basic operation
Linux shutdown, restart
# Shut down
shutdown -h now
# restart
shutdown -r now
View system and CPU Information
# View system kernel information
uname -a
# View system kernel version
cat /proc/version
# View current user environment variables
env
cat /proc/cpuinfo
# See how many logical CPUs are available, including cpu ...
Posted by mountaindave on Wed, 09 Feb 2022 20:00:11 +0100
LINUX common commands
Although most of my work is Java related development, I am exposed to Linux every day, especially after using Mac. I work in the command line environment with black background every day I don't have a good memory. I can't remember many useful linux commands very well. Now I'll summarize them gradually for later viewing.
basic operation
Linux ...
Posted by MoldRat on Wed, 09 Feb 2022 17:46:42 +0100
DC-2 target penetration notes
DC-2 target penetration notes
Target environment construction
Attack Infiltrator: kali IP address: 192.168.75.128 Target: DC-1 IP address unknown Download address: http://www.five86.com/downloads/DC-2.zip
Infiltration process
1. Information collection
1.1 IP address confirmation
Command: ARP scan - L scan all LAN devices (IP, MAC address ...
Posted by AmandaF on Tue, 01 Feb 2022 13:32:19 +0100
Linux Three Swordsmen Arrangement and Widget Expansion
Catalog
1. SED of Three Swordsmen
1.1. Fundamentals
1.1.1. Summary
1.1.2. grammar
1.2. List display
1.2.1. Add in/etc/passwd line 4
1.2.2. Append insert
1.2.3. delete
1.2.4. replace
1.2.5. Print Display
1.2.6. Multipoint Editing
1.2.7 Modify text content
2. AWK of Three Swordsmen
2.1. Summary
2.2. grammar
2.3. List
2.3.1. Se ...
Posted by riyaz123 on Sat, 29 Jan 2022 19:15:27 +0100
SSH port forwarding - case, command and server configuration
SSH port forwarding - case, command and server configuration
Three forwarding types
Local forwarding - LRemote forwarding - RDynamic forwarding-D
Simple understanding: the three machines of ABC and AC cannot communicate directly, but B can communicate with AC respectively, so AC forwards and communicates through B
Local SSH port forwarding ...
Posted by X74SY on Sat, 29 Jan 2022 04:37:36 +0100