Tip: after the article is written, the directory can be generated automatically. Please refer to the help document on the right for how to generate it
This is mainly to optimize the previous project, classify different files, learn how to sort out the project, create the folder classification of the project just like learning ...
Posted on Mon, 29 Nov 2021 00:24:23 -0500 by dreams4000
1. Install VMware Tools (there are too many tutorials on installing Ubuntu for VM virtual machine, so I won't write them)
First download from the virtual machine, then move the folder in the compressed package out (you can decompress or directly click the compressed package to move out of the VMware Tools District folder), enter the folder and ...
Used to find files in the specified directory. Any string that precedes the parameter is treated as the directory name you want to find. If you use this command without setting any parameters, the find command will find subdirectories and files in the current directory. And display all the subdirectories and files found.
When s appears on the x permission of the file owner, it is called setupid bits or setupid. Its characteristics are as follows:
1.SUID permission is only valid for binary executables2. If the performer has x permission on the binary executable, the performer will have the permission of the owner of the file3. This permission is onl ...
Posted on Sun, 28 Nov 2021 12:42:58 -0500 by Catfish
When it comes to deleting files in linux environment, sudo rm -rf / * is absolutely indispensable. Every time I see this command, I think of a spoof picture:
The explanation of "cleaning up garbage" is really "just right". It is said that Xiaobai asked questions in the forum and was jokingly replied to the ...
Posted on Sun, 28 Nov 2021 11:14:51 -0500 by foid025
1, Data table advanced operations
1. Clone the table and generate the data records of the data table into a new table
create table test1 like kfc; #Using the like method, copy the test1 table structure to generate the test2 table
insert into test1 select * from kfc；
create table test2 (select * from kfc);
Posted on Sun, 28 Nov 2021 09:57:05 -0500 by graham
Interprocess communication mechanism
Interprocess communication mechanism, also known as IPC mechanism, includes pipeline, semaphore, shared memory, message queue and socket. Today, let's briefly introduce the pipeline, one of the IPC mechanisms.
When operating in Linux, you must use pipes. Pipes can be used to transfer data betw ...
Posted on Sun, 28 Nov 2021 06:38:06 -0500 by brainardp
kali installs and configures snort to realize simple intrusion detection
Installing and configuring snort on kali and simple experiments (this is the most concise and error free article in my installation process);Install snort for Ubuntu 16.04, including problem solving (sample code) (this article contains common mistakes ...
Posted on Sun, 28 Nov 2021 05:33:24 -0500 by poknam
1, Environmental preparation
192.168.56.101: Server 192.168.56.102: client
2, Set up NFS server
Set up nfs on server 192.168.56.101. The steps are as follows:
#Server node installation nfs (192.168.56.101)
yum -y install nfs-utils
#Create nfs shared data directory
mkdir -p /home/nfs/data/
#Modify permissions (optional)
chmod -R 777 ...
Posted on Sun, 28 Nov 2021 04:44:00 -0500 by gardan06
explain: this article aims to summarize the backup and facilitate future query. As it is a personal summary, if there is any error, please correct it; In addition, most of the content comes from the Internet, books, and various manuals. If you infringe, please inform us and delete the post immediately to apologize. QQ ...
Posted on Sun, 28 Nov 2021 04:17:41 -0500 by brattt