current location:Home > Technical Articles > System Tutorial > LINUX
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- Two ways to configure Linux to automatically start executing scripts at boot
- The script to be started at boot, qidong.sh[root@c69-01scripts]#vim/server/scripts/qidong.sh[root@c69-01scripts]#cat/server/scripts/qidong.sh#!/bin/bash/bin /echo$(/bin/date+%F_%T)>>/tmp/qidong.log Method 1: Modify /etc/rc.local/etc/rc.local. This file is a link file [root@c69-01~ ]#ll/etc/rc.locallrw
- LINUX 775 2024-06-25 16:49:27
-
- How to test network transfer rate in Linux using built-in tools or commands
- In Linux, we can use some external tools or commands to test the network transmission speed. The following are some common methods: (picture source network, intrusion and deletion) 1. Use the ping command. The ping command can be used to test the network. Latency and packet loss rate, but it cannot directly detect the network transmission speed. We can indirectly measure the network transmission speed by sending a large number of data packets and observing the transmission time. The pings1472 target IP address command will send a 1472-byte data packet to the target IP address for Linux network latency testing. By observing the return time, we can determine the network transmission speed. 2. Use the iperf tool. iperf is a network performance testing tool that can be used to check
- LINUX 1151 2024-06-25 07:34:32
-
- Common directories and their functions in Linux systems, everything is a file
- Please pay attention to this headline and insist on updating original dry technical articles every night. If you need to learn videos, please search the official account "Zhichuanwangyou" on Momo to start self-service video learning directly 1. Preface
- LINUX 788 2024-06-25 07:31:59
-
- SELinux easily enables and disables scripts with one click
- 脚本代码#!/bin/bash#-------------+--------------------#*Filename:selinux.sh#*Revision:2.0#*Date:2017-09-02#*Author:Aubin#*Description:#-------------+---------------------#www.shuaiguoxia.com#path=/app/selinuxselinux=`sed-rn"/^(SELINUX=).*\$/p"$
- LINUX 341 2024-06-24 20:04:04
-
- Linux operating system: a free, freely disseminated and stable multi-user network system
- Linux is a free-to-use and freely disseminated Unix-like operating system. It is a multi-user, multi-task, multi-thread and multi-CPU operating system based on POSIX and UNIX. It can run major UNIX software tools, applications and network contracts. It supports 32-bit and 64-bit hardware. Linux inherits the network-centric design philosophy of Unix and is a multi-user network operating system with stable performance. Teachers from Lingyang Education said before that strictly speaking, the word Linux itself only refers to the Linux kernel, but in fact people have long been accustomed to using Linux to describe the entire operating system based on the Linux kernel but using various tools and databases of the GNU Project. included in linux
- LINUX 601 2024-06-24 15:32:35
-
- Detailed tutorial on transferring files between windows and linux
- Directory overview:
- LINUX 650 2024-06-24 07:37:51
-
- How to solve the time synchronization between Linux and Windows dual systems
- What the editor wants to share with you here is about solving the time synchronization problem between Linux and Windows dual systems. Under dual computer systems, we found a problem when using Linux and Windows systems, which is the time synchronization problem (UTC&localtime). Linux UTC is used, but windows uses localtime by default, so how to solve it? Let’s take a look! 1. First enter windows and use regedit to write the DWORD value (set to hexadecimal "1"): HKEY_LOCAL_MACHINESYSTEMCurrentControlSe
- LINUX 428 2024-06-24 07:35:47
-
- Linux installation OpenJDK tutorial: from checking the system's own version to deleting to downloading and installing
- Table of Contents 1. Install OpenJDK1 on Linux and check whether the system has its own version. Since some Linux systems have their own version of OpenJDK, we can first check whether they have their own Chinese Linux operating system by executing the following command. If there is java-version, but the version meets the usage conditions, then there is no need to install it. However, the version is not the Linux system log we need, then we need to delete it. 2. Delete OpenJDK#1, and check the jdk installation package rpm-qa | grepjava#2. Delete the packages one by one rpm-e--nodeps+package name#3. Check whether the deletion is complete rpm-qa|grepjava3. Download Op locally
- LINUX 619 2024-06-24 06:32:26
-
- Analysis of Red Hat Linux9 version network management and three network connection methods of VMware virtual machines
- This article uses Red Hat Linux9 version as an example to explain. The network management of Red Hat Linux 9 version is very comprehensive and network configuration changes can be made in many places. However, it should be noted that in version 9, users can make network configuration changes in the configuration file, but the system will not. Execute the changed command, which is executable in versions prior to version 9. Three types of network connections on VMware virtual machines: bridge mode: connect the network card on the host to the virtual network card Vmnet0 through a virtual hub. In bridge mode, the network cards of the virtual machine are connected to the virtual switch Vmnet0. When the virtual machine wants to access the Internet Is the Linux system easy to use when managing the Linux system and network? It is necessary to configure the virtual machine IP address, subnet segment, network segment, etc. with the host network.
- LINUX 1141 2024-06-23 15:34:18
-
- Linux privilege escalation techniques: Detailed analysis of kernel privilege escalation and suid privilege escalation
- For Linux packing, the premise is to get a low-privilege account and Linux scheduled execution script instance, which can upload and download files. The main ideas are: 1. Kernel packing. There are many payloads from various predators on the Internet. The key is to be able to find which exploit to use and how to use it. A less labor-intensive way is to use searchsploit or linux-exploit-suggester.sh to search. It is not difficult after you are familiar with it. 2. suid packing. This also includes sudo forms. The ideas of both methods are the same. The difference is that suid is for a single program and sudo is for a user. The main idea of this type of packing method is: the administrator authorizes ordinary users to execute r
- LINUX 1111 2024-06-23 07:59:43
-
- Detailed explanation of tar compression and decompression commands under Linux system and its application in penetration courses
- The penetration course has reached the access injection class, and I feel that this is my dilemma. There is higher-level knowledge behind this class waiting for me to get in touch. In this blog, I will first write about some sentence patterns under the Linux system that are often encountered when doing miscellaneous questions. The last time I blogged, I wrote about web penetration seriously. The five tar compression and decompression commands under Linux tar are independent commands. Red Hat Linux System Download requires one of them for compression and decompression. It can be used in conjunction with other commands but only one of them can be used. The following parameters are optional when compressing or decompressing files as needed. The following parameter -f is required -f: use the file name. Do not use the file name. This parameter is the last parameter and can only be preceded by the file name. #tar-cfall.tar
- LINUX 908 2024-06-23 06:16:38
-
- Introduction to Linux Basics View, Add, Modify, and Delete User Commands
- 1. View user information in the /etc/passwd file and match the user login name to the corresponding UID value. It contains some user information: Linux basics for viewing, adding, modifying, and deleting user commands Introduction to Linux basics for viewing, adding, modifying, and deleting The user command introduction is divided into 7 columns with commas as delimiters, which are: We can directly change this file to add, delete, and modify accounts, but it is highly not recommended. This is very dangerous. If it is damaged, it will make it difficult for users to log in. . 2. Common usage of useradd to add accounts: Code language: javascript copy useraddusername-m-s/bin/bash-d/home/username
- LINUX 460 2024-06-22 15:37:26
-
- How to solve '/bin/bash^M: bad interpreter' in Linux
- Reason: Such an error is prompted when executing a shell script mainly because the shell script file is in dos format, that is, the end of each line is identified by \r\n, while the end of the line of the file in unix format is identified by \n. Solution: ( 1) Use the linux command dos2unixfilename to directly convert the file to unix format; (2) Use the sed command sed-i"s/\r//"filename or sed-i"s/^M//"filename to directly replace the ending character It is in unix format; (3) vifilename opens the file and execute: setff=unix to set the file to
- LINUX 877 2024-06-22 12:00:20
-
- linux files are authorized to users. Linux security model: wide limit is tight, and time is enough to stagnate.
- Overview of the Linux security model. Linux uses User (user) and Group (group) to control users' access rights to files. Users created in the Linux system can use accounts and passwords. Log in to Linux. The Linux system treats everything as a file. Each file has an owner, but the owner belongs to a certain Group. User Each user in the Linux system has a unique UserID. User information is stored in /etc/passwd. The format example of this file is as follows: root:x:0:0:root:/root:/bin/bash The corresponding meaning of one bit is: username:password:user
- LINUX 676 2024-06-22 10:32:52
-
- Two forms of ARP attacks and defense methods, detailed analysis
- There are two ways to prevent ARP attacks under Linux. The first is to mislead your server to tell you that the MAC of the network segment is another. The second is to mislead the network segment linux video, telling the network segment that the MAC of your server is another one. For the first type, you can use the arp-s network segment IP network segment MAC command to set up static arp record defense. For the second type, you can use the following method to handle Linux security hardening. Since it is source code compilation, I will not go into it later. Go check the specific software packages required for ubuntu source code installation tarzxvf-cd-/sudo./configuresudomake. If you are prompted that the command is insufficient, you can use apt-
- LINUX 642 2024-06-22 08:59:32