linux Firewall advanced settings

Firewall experiment Experimental topology requirement analysis (1) intranet users of the company need to share the Internet through the gateway server(2) Internet users need to visit the website server(3) only 192.168.1.0/24ping gateway and server are allowed(4) the website server and gateway server are managed remotely through SSH. For secur ...

Posted on Sat, 19 Oct 2019 12:26:35 -0700 by Andrew B

ELK7.4-Lostash Grok format Nginx log

Xiaosheng blog: http://xsboke.blog.51cto.com -------Thank you for your reference. If you have any questions, welcome to exchange Catalog demand Environmental Science Grok official introduction Web terminal configuration Partial effect display demand Use filebeat to collect nginx access log, output to logstash, logstash us ...

Posted on Fri, 18 Oct 2019 12:55:46 -0700 by symantec

Server ssh key and git configuration

Programmers often say: for github programming, the importance of github to programmers can be seen. Although git can work on two protocols, ssh and https, it is more likely to choose ssh for security. If https is used, authentication is required for every git push. So the main content of this article is: ssh keygen: generate public key and pri ...

Posted on Wed, 16 Oct 2019 19:45:54 -0700 by bobohob

Shell programming interaction free expect

This article mainly writes some shell scripts to avoid the use of interactive expect. Summary Expect is a tool based on tcl. Expect is a tool for automatic control and testing. It mainly solves the non interactive problem in shell script. install Install before using this tool yum install -y expect Basic command send Send string to process ...

Posted on Wed, 16 Oct 2019 19:43:19 -0700 by Haggen

Experiment: building LAMP

Environmental Planning: Prepare three virtual machines 192.168.50.136: web 192.168.50.140: mysql 192.168.50.142: memcached First, three virtual machines are operated as follows: ① turn off the firewall, ② synchronize the time, ③ uninstall MariaDB LIBS and postfix; web server settings In 192.168.50.136 ...

Posted on Tue, 15 Oct 2019 11:38:09 -0700 by akufen

shell script regular expression one of the three swordsmen (grep,egrep)

Regular expressions for Shell scripts One of the three regular expression swordsmen: grep 1. Before learning regular expressions, let's take a useless configuration file as a test exercise. [root@localhost ~]# vim chen.txt #version=DEVEL System authorization information auth --enableshadow --passalgo=sha512# Use CDROM installation media c ...

Posted on Fri, 11 Oct 2019 04:33:25 -0700 by DataRater

Teaching Wife to Learn Common Command Guidelines for Linux Operations and Maintenance

Teach your wife to learn Linux (two) Linux frequently used command Guide Author: Yao Maomao's blog tips: The article is too long, and it is sent out in two chapters. The first three chapters are: 1. File and directory operation; 2. File viewing and editing; 3. File searching and statistics. [TOC] I. overview 1.1 Write in the front-Learning Gui ...

Posted on Wed, 09 Oct 2019 17:10:16 -0700 by the_damo2004

Shell Programming Loop Statement

This article is mainly about the use of shell script loop statements. for loop Designated number of times #!/bin/bash for ((i=1;i<=10;i++)) do echo $i done [root@localhost ~]# vim num.sh [root@localhost ~]# chmod +x num.sh [root@localhost ~]# ./num.sh 1 2 3 4 5 6 7 8 9 10 Ergodic cycle #!/bin/bash TMP=$(cat username.txt) for USER in $T ...

Posted on Wed, 09 Oct 2019 16:10:41 -0700 by Okami

vsftpd virtual user

I. Turn off SElinux setenforce 0 Installation of vsftpd service 2.1 Install vsftpd with yum yum -y install vsftpd 2.2 Backup vsftpd master configuration file cp /etc/vsftpd/vsftpd.conf{,.bak} Configuring vsftpd services accessed by virtual users: 3.1 Create Virtual User Password File vim /etc/vsftpd/vir_user 3.2 Generating Virtual User Datab ...

Posted on Tue, 08 Oct 2019 18:07:01 -0700 by brax23

Apache Tomcat Default File Vulnerability

Apache Tomcat Default File Vulnerability I. outline Vulnerability Description: Default error page, default index page, sample JSP and/or sample servlet installed on remote Apache Tomcat server. These files should be deleted because they may help an attacker discover information about remote Tomcat ...

Posted on Tue, 08 Oct 2019 00:12:09 -0700 by dannau