Linux - Ubuntu automatically blacklists IP addresses that fail to log in multiple times through SSH through shell script
1: Introduction to login related documents
Introduction to the three file logs of ubuntu: 1: / var/run/utmp: records the information of the currently logged in user. By default, who and w record the information of the currently logged in user, and uptime records the system startup time;
2: / var/log/wtmp: records the user information current ...
Posted on Tue, 23 Nov 2021 07:29:06 -0500 by jtravis
Debian10 configuring SSH services
1, Introduction
SSH (Secure Shell) security shell protocol is a security protocol designed to provide security for remote login sessions and other network services, such as our common Telnet protocol and ftp protocol. They all use plaintext transmission. Data is easy to be monitored and vulnerable to man in the middle attacks. ssh is a securit ...
Posted on Sat, 20 Nov 2021 21:07:22 -0500 by SlimSlyk
Runtime.getRuntime().exec() method
1. Use the Runtime.getRuntime().exec() method
sshUtil.java
package com.demo;
import java.io.BufferedReader;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import ch.ethz.ssh2.Connection;
import ch.ethz.ssh2.Session;
import ch.ethz.ssh2.StreamGobbler;
public class SSHUtil {
private String host; ...
Posted on Wed, 03 Nov 2021 02:57:13 -0400 by gillms1
linux system directory structure
Ordinary computer Xiaobai is not used to directly switching from Window operating system to Linux operating system for a time. The familiar mouse clicks are gone, simultaneous interpreting the use of various commands, just like the legendary hackers.
Since many programming bosses have invested in Linux, you must be eager to invest in Linu ...
Posted on Sun, 31 Oct 2021 10:43:20 -0400 by teege84
SSH architecture: Spring + struts 2 + hibernate, xml implementation and annotation implementation
1, MVC layering overview
1. Request execution process
[view layer: jsp] - > [control layer: (struts: action) useraction class]
---> [business layer: userservice] - > [dao layer: (hibernate): userdao]
2. Overview of correspondence of eac ...
Posted on Fri, 29 Oct 2021 09:18:35 -0400 by chipev
Install fail2ban + firewall in CentOS 8 to prevent SSH brute force cracking
To prevent online hackers from brutally cracking system accounts Using SSH, first prohibit key accounts such as root remote login. But that alone is not enough. Hackers' non-stop login attempts to the system also have a certain impact on the system performance and bandwidth, especially when the bandwidth you subscribe to is poor. In this case, ...
Posted on Wed, 27 Oct 2021 22:08:33 -0400 by bashaash
Configure multiple git accounts locally (company, GitHub)
When the company explores new knowledge (fishing), we generally need to maintain our own small warehouse on GitHub. In this way, if the original configuration is used, Permission Denied will occur when pushing the code. So we have the following steps: The company's computer is a Mac, so the following contents are all MAC operations, but differe ...
Posted on Tue, 19 Oct 2021 16:10:39 -0400 by sasi
Achieve intranet penetration and remote development with vscode remote SSH plug-in and Sakura Frp
Recently, the group is equipped with a computer, which has better performance than my notebook, especially a 3080Ti graphics card. It would be a pity if we don't make the best use of everything. So I installed the sunflower remote software immediately after I got it. I felt it was ok, but it was always a little stuck. I couldn't write code or a ...
Posted on Fri, 15 Oct 2021 19:49:35 -0400 by Donnamabob
Ubantu installation Hadoop3.1.3 single machine, pseudo-distributed
Once ubantu is installed, download hadoop for installation
1. Default environment Ubuntu 18.04 64 bits as the system environment (or Ubuntu 14.04, Ubuntu 16.04, 32-bit, 64-bit) Download address for hadoop3.1.3.tar.gz file Portal Can use Thunder download, faster 2. Preparations Create a user named "hadoop" and use/bin/bash as a shell ...
Posted on Thu, 14 Oct 2021 13:08:49 -0400 by Collin
The server of the security evaluation is not configured with the login failure locking policy and the login connection timeout automatic exit policy
The server of the security evaluation is not configured with the login failure locking policy and the login connection timeout automatic exit policy
It's really another thing before it's finished. There are a lot of problems in the waiting insurance evaluation received yesterday. Here, some problems will be recorded
Look at the problem
...
Posted on Tue, 12 Oct 2021 22:26:19 -0400 by facets