In the last article, we talked about how to expand the system disk of the elastic server. In this article, we talked about how to install the data disk. First, we need to click buy disk in the console of Huawei cloud account, and then follow the prompts to buy a cloud disk. Note: the cloud disk purchased must be in the same area as the server t ...
Posted by StefanRSA on Thu, 21 Apr 2022 07:15:45 +0300
In Greek, it means captain or navigator
Before the container technology, if multiple applications are running on the physical server, one application may occupy most of the resources, which may lead to the performance degradation of other applications. One solution is to run each application on different physical servers, but it ca ...
Posted by kevinn on Thu, 21 Apr 2022 05:24:35 +0300
1, Describe the naming rules and purpose of the system directory name of the Linux distribution
Naming rules of linux system directory:
1. Use LSB (Linux Standard Base) hierarchy
2. Follow FHS (File System Hierarchy Standard) standard
3. The file system starts from the root directory "/"
4. The maximum length of the file name is 255 b ...
Posted by DevXen on Thu, 21 Apr 2022 04:26:58 +0300
Partition is a means of dividing the disk into regions. By saving the starting address, size and other information to the partition table, the disk can be divided into several regions for storing different contents.
The use of partitions can not only make the system file entries clear, compatible with multiple file systems and moun ...
Posted by mlla2 on Wed, 20 Apr 2022 23:55:15 +0300
Prepare the environment
Linux CentOS 7.x two or more, 7.6 used in this paper
The default configuration in this paper is in the Intranet environment, that is, the server is in the same LAN environment, and the differential configuration of the external network is additionally marked with [difference - serial number]. You can see ...
Posted by palpie on Wed, 20 Apr 2022 23:21:36 +0300
What is daemon and service
Service is the embodiment of function. Daemon is the process of implementing services. There is usually no need to make a detailed distinction between the two. Daemon is a program after the program is executed. The name of daemon itself is usually added with d after the name of the service. This D means "dae ...
Posted by stevehaysom on Wed, 20 Apr 2022 21:35:17 +0300
Administrator: UID is 0. Administrator of the system. Unique ID, 0 is the administrator System user: UID is 1-999. You cannot log in to the server. You can only call the service program Ordinary user: UID starts from 1000. Users created by administrators to complete daily work Tip: redhat5/6 system user: 1-499, ordinary user: 500 ...
Posted by harinath on Wed, 20 Apr 2022 14:21:14 +0300
Exploitation and demonstration of vulnerability ms10-018
Today we will not learn C (just released two articles) to see the vulnerabilities and utilization of ie browser.
The tools we use are:
1. A small white one ready to go
2. A Linux host (for example, kali, I used manjaro in my demonstration, and added the source of black arch. I will ha ...
Posted by Sianide on Tue, 19 Apr 2022 13:35:07 +0300
Anonymous pipeline is used for the communication between related processes. The word of pipeline is like its name. It is like laying a pipeline between two processes, and the processes interact with each other through the pipeline. The nameless pipeline has no name. It is created by the pipe or pipe2 function. The corresponding one ...
Posted by FluxNYC on Tue, 19 Apr 2022 09:05:37 +0300
awk is a pattern scanning and processing language. It is a very powerful document editing tool. It can process files not only in behavior units, but also in columns. Let's learn it from the following three aspects:
1, Format explanation
1. Command format
awk [parameter] '[action]' [file na ...
Posted by garydt on Tue, 19 Apr 2022 07:58:08 +0300