No interaction in shell programming

Here Document interaction free Cross free mutual definition Here Document overview: Use I/O redirection to provide a list of commands to interactive programs or commands, such as ftp, cat, or read commands Here Document is an alternative to standard input, which can help script developers not use temporary files to build input informa ...

Posted by corporateboy on Sun, 27 Feb 2022 05:54:00 +0100

SSH secret free automatic connection

1. GeneralFor the use of Linux operating system, the importance of SSH is self-evident. However, you have to enter a lengthy user name @ host IP every time you log in, and sometimes you forget the user name / host IP. It is also a waste of time to check the records again, so this time we need to configure the SSH login configured to the server ...

Posted by jamesp on Sun, 27 Feb 2022 03:43:13 +0100

atlas stand-alone installation

1, Virtual machine preparation Update virtual machine, command: yum -y updateModify the hostname. The command is hostnamectl set hostname atlasClose the firewall. The command is systemctl stop firewalld Service and systemctl disable firewalld servicereboot 2, Install jdk Uninstall openjdk, command: rpm -e --nodeps java-1.7.0-openjdk rpm -e ...

Posted by frao_0 on Wed, 23 Feb 2022 05:20:54 +0100

13, Configure and protect SSH services

13, Configure and protect SSH services This section describes how to configure and protect SSH services. As a service that must be understood in the foundation, it needs to be well mastered both in principle and operation. SSH is basically used for remote management in work. This column will cover the entire RHCSA certification: Addre ...

Posted by sgs on Mon, 21 Feb 2022 17:05:21 +0100

Basic operation of Ansible common modules

ping module ping is a common module to test whether the SSH connection of the remote node is ready. However, it is not as simple as the Linux command to ping the remote node. Instead, first check whether the remote node can log in through SSH, and then check whether its Python version meets the requirements. If it meets the requirements, it wil ...

Posted by Drabin on Fri, 18 Feb 2022 11:58:28 +0100

Basic use of Linux commands

basic operation Linux shutdown, restart # Shut down shutdown -h now # restart shutdown -r now View system and CPU Information # View system kernel information uname -a # View system kernel version cat /proc/version # View current user environment variables env cat /proc/cpuinfo # See how many logical CPUs are available, including cpu ...

Posted by mountaindave on Wed, 09 Feb 2022 20:00:11 +0100

LINUX common commands

Although most of my work is Java related development, I am exposed to Linux every day, especially after using Mac. I work in the command line environment with black background every day I don't have a good memory. I can't remember many useful linux commands very well. Now I'll summarize them gradually for later viewing. basic operation Linux ...

Posted by MoldRat on Wed, 09 Feb 2022 17:46:42 +0100

DC-2 target penetration notes

DC-2 target penetration notes Target environment construction Attack Infiltrator: kali IP address: 192.168.75.128 Target: DC-1 IP address unknown Download address: http://www.five86.com/downloads/DC-2.zip Infiltration process 1. Information collection 1.1 IP address confirmation Command: ARP scan - L scan all LAN devices (IP, MAC address ...

Posted by AmandaF on Tue, 01 Feb 2022 13:32:19 +0100

Linux Three Swordsmen Arrangement and Widget Expansion

Catalog   1. SED of Three Swordsmen 1.1. Fundamentals 1.1.1. Summary 1.1.2. grammar 1.2. List display 1.2.1. Add in/etc/passwd line 4 1.2.2. Append insert 1.2.3. delete 1.2.4. replace 1.2.5. Print Display 1.2.6. Multipoint Editing 1.2.7 Modify text content 2. AWK of Three Swordsmen 2.1. Summary 2.2. grammar 2.3. List 2.3.1. Se ...

Posted by riyaz123 on Sat, 29 Jan 2022 19:15:27 +0100

SSH port forwarding - case, command and server configuration

SSH port forwarding - case, command and server configuration Three forwarding types Local forwarding - LRemote forwarding - RDynamic forwarding-D Simple understanding: the three machines of ABC and AC cannot communicate directly, but B can communicate with AC respectively, so AC forwards and communicates through B Local SSH port forwarding ...

Posted by X74SY on Sat, 29 Jan 2022 04:37:36 +0100