RPM Package Installation
8.1 rpm Installation
rpm [Options] Package Name
-a-all Query all installed packages
-f-file query for packages with <-file
-p Query for a package that is not installed
-nodeps Ignor ...
Posted on Mon, 10 Feb 2020 09:54:09 -0800 by aaronhall
2.fifo: named pipe
4. shared memory
5. message queue
A pipeline allows one process to communicate with another process that has a common ancestor with it, that is, it can only be used to communicate between processes that hav ...
Posted on Mon, 10 Feb 2020 03:09:34 -0800 by sasori
Reference link: https://ctf-wiki.github.io/ctf-wiki/pwn/linux/mitigation/canary-zh/
A method to prevent stack overflow from being used is to put a random number under the ebp of the stack. Before the function returns, it will check whether the number has been modified, and then it can detect whether stack overflow has o ...
Posted on Mon, 10 Feb 2020 02:27:19 -0800 by Ruud Hermans
Big data - basic environment construction (1)
This paper uses three Linux servers as a unified environment.
IP settings for three machines
Modify the ip address of three services
Posted on Sun, 09 Feb 2020 23:35:47 -0800 by drisate
Layer of docker image
Each instruction in the Dockerfile creates a new mirror layer;
The mirror layer will be cached and reused;
When the instructions of the Dockerfile are modified, the copied file changes, or the variables specified when the image is built are different, the corresponding mirror layer cache will fail.
When the mirror cache ...
Posted on Sun, 09 Feb 2020 14:14:03 -0800 by py343
Introduction to Kubernetes
Kubernetes is an open source container cluster management system for Google in 2014. Kubernetes is referred to as K8S.Kubernetes v1.0 was officially released in July 2015, and the latest stable version so far is v1.9
K8S is used to deploy, extend, and manage containerized applications.
K8S provides a range of functi ...
Posted on Sun, 09 Feb 2020 12:36:28 -0800 by realestninja
Problem Description: in linux environment, sometimes the process exits abnormally. At this time, strace can be used to track the running of the process. If it is an internal error of the process, the strace log can see the abnormal error points of the process. But if it is killed by another person or process, only the killed in ...
Posted on Sun, 09 Feb 2020 10:18:43 -0800 by fr0mat
Go Memory Management
Go Memory management is based on TCMalloc, using continuous virtual addresses, managed in page (8k) units and multilevel caches; when allocating memory, size needs to be aligned, suitable mspan found according to best-fit, and unused memory will be split into other size mspans to ...
Posted on Sat, 08 Feb 2020 16:44:49 -0800 by tempa
Redis full check checks whether redis data is consistent:
Verify the data of two different redis instances:
6986 is redis instance 16987 is redis instance 2
Log in to 6986 redis instance 1, simulate setting 4 key values
[root@localhost redis-full-check-1.4.7]# redis-cli -h 127.0.0.1 -p 6986 -a 'Y2hJKSGtuEq'
Warning: Using a password with '-a' ...
Posted on Sat, 08 Feb 2020 00:50:26 -0800 by jassh
In the production environment, many enterprises often use nginx + tomcat architecture, nginx as load balancer, reverse proxy, tomcat as node server. This architecture can also be used in the docker container.For those interested in this architecture, please refer to the blog: https://blog.51cto.com/13760351/2161850
Posted on Fri, 07 Feb 2020 06:35:58 -0800 by warptwist