(1) intranet users of the company need to share the Internet through the gateway server(2) Internet users need to visit the website server(3) only 192.168.1.0/24ping gateway and server are allowed(4) the website server and gateway server are managed remotely through SSH. For secur ...
Posted on Sat, 19 Oct 2019 12:26:35 -0700 by Andrew B
Xiaosheng blog: http://xsboke.blog.51cto.com
-------Thank you for your reference. If you have any questions, welcome to exchange
Grok official introduction
Web terminal configuration
Partial effect display
Use filebeat to collect nginx access log, output to logstash,
logstash us ...
Posted on Fri, 18 Oct 2019 12:55:46 -0700 by symantec
Programmers often say: for github programming, the importance of github to programmers can be seen.
Although git can work on two protocols, ssh and https, it is more likely to choose ssh for security.
If https is used, authentication is required for every git push.
So the main content of this article is:
ssh keygen: generate public key and pri ...
Posted on Wed, 16 Oct 2019 19:45:54 -0700 by bobohob
This article mainly writes some shell scripts to avoid the use of interactive expect.
Expect is a tool based on tcl. Expect is a tool for automatic control and testing. It mainly solves the non interactive problem in shell script.
Install before using this tool
yum install -y expect
Send string to process ...
Posted on Wed, 16 Oct 2019 19:43:19 -0700 by Haggen
Prepare three virtual machines
First, three virtual machines are operated as follows:
① turn off the firewall, ② synchronize the time, ③ uninstall MariaDB LIBS and postfix;
web server settings
Posted on Tue, 15 Oct 2019 11:38:09 -0700 by akufen
Regular expressions for Shell scripts
One of the three regular expression swordsmen: grep
1. Before learning regular expressions, let's take a useless configuration file as a test exercise.
[root@localhost ~]# vim chen.txt
System authorization information
auth --enableshadow --passalgo=sha512# Use CDROM installation media
Posted on Fri, 11 Oct 2019 04:33:25 -0700 by DataRater
Teach your wife to learn Linux (two) Linux frequently used command Guide
Author: Yao Maomao's blog
tips: The article is too long, and it is sent out in two chapters. The first three chapters are: 1. File and directory operation; 2. File viewing and editing; 3. File searching and statistics.
1.1 Write in the front-Learning Gui ...
Posted on Wed, 09 Oct 2019 17:10:16 -0700 by the_damo2004
This article is mainly about the use of shell script loop statements.
Designated number of times
[root@localhost ~]# vim num.sh
[root@localhost ~]# chmod +x num.sh
[root@localhost ~]# ./num.sh
for USER in $T ...
Posted on Wed, 09 Oct 2019 16:10:41 -0700 by Okami
I. Turn off SElinux
Installation of vsftpd service
2.1 Install vsftpd with yum
yum -y install vsftpd
2.2 Backup vsftpd master configuration file
Configuring vsftpd services accessed by virtual users:
3.1 Create Virtual User Password File
3.2 Generating Virtual User Datab ...
Posted on Tue, 08 Oct 2019 18:07:01 -0700 by brax23
Apache Tomcat Default File Vulnerability
Vulnerability Description: Default error page, default index page, sample JSP and/or sample servlet installed on remote Apache Tomcat server. These files should be deleted because they may help an attacker discover information about remote Tomcat ...
Posted on Tue, 08 Oct 2019 00:12:09 -0700 by dannau