drbd-driver_utils.zip
drbd-driver, drbd-utils
MariaDB入门很简单
MariaDB入门文档,没有仔细研究呢,有大把时间在研究吧。
securing-debian-howto.en,refcard.en,debian-faq.en,install
securing-debian-howto.en,refcard.en,debian-faq.en,install
debian-handbook.pdf
Debian is a very successful operating system, which is pervasive in our digital lives more than
people often imagine or are aware of. A few data points will suffice to make this clear. At the
time of writing Debian is the most popular GNU/Linux variant among web servers: according
toW3Techs 1 ,morethan10%ofthewebisDebian-powered. Thinkaboutit: howmanywebsites
would have you missed today without Debian? Onto more fascinating deployments, Debian is
the operating system of choice on the International Space Station. Have you been following
the work of ISS astronauts, maybe via the social network presence of NASA or other interna-
tional organizations? Both the work in itself and the posts about it have been made possible by
Debian. Countless companies, universities, and public administrations rely on Debian daily for
their operations, delivering services to millions of users around the world... and its orbit!
securing-debian-howto.en
This document describes security in the Debian project and in the Debian operating system. Starting with the process of
securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to
set up a secure network environment using Debian GNU/Linux, gives additional info
Kali Linux Revealed
The sixteen high-end laptops ordered for your pentesting team just arrived, and you have been
taskedtosetthemup—fortomorrow’soffsiteengagement. YouinstallKaliandbootuponeofthe
laptops only to find that it is barely usable. Despite Kali’s cutting-edge kernel, the network cards
andmousearen’tworking,andtheheftyNVIDIAgraphicscardandGPUarestaringatyoublankly,
because they lack properly installed drivers. You sigh.
kali-linux
kali-linux使用总结,网上朋友的作品,我只做搬运工,谢谢!
https://www.cnblogs.com/student-programmer/category/986420.html
Metasploit渗透测试指南(全) .pdf
Metasploit渗透测试指南(全) .pdf
Metasploit 学习 指南— 基础篇
Author:阿德马
Site:http://www.nxadmin.com
Metasploit 是一款强大的渗透测试平台,其中包括了很多渗透测试利器,本文简单介绍一下
Metasploit 的配置和基础的使用方法,主要包括以下几个方面:
网上朋友总结的,在此谢过!讲述kali linux
redhat 6.4 install docker.txt
1.update kernel to linux 3.19
download kernel from www.kernel.org
make menuconfig and install kernel
2.download docker rpm from https://yum.dockerproject.org/repo/main/centos/
rpm -ivh docker-engine-1.7.1-1.el6.x86_64.rpm
docker 容器相关命令.docx
启动容器:
方法一:从镜像启动(docker run):
启动容器并执行shell,然后退出:
docker run registry.intra.weibo.com/yushuang3/centos:v1 /bin/echo "hello world"
启动容器并进行交互:
docker run -t -i registry.intra.weibo.com/yushuang3/centos:v1 /bin/bash
(-t 选项让Docker分配一个伪终端(pseudo-tty)并绑定到容器的标准输入上, -i 则让容器的标准输入保持打开)
注意:如果镜像有tag,需要在image后加:tag名
docker命令
docker run -it --privileged=true --hostname=xcatmn --name=xcatmn \
--add-host="xcatmn.clusers.com xcatmn:10.5.107.101" --volume /docker/xcatdata/:/install \
--net=mgtnet --ip=10.5.107.101 xcat/xcat-ubuntu-x86_64
博科交换机配置
与交换机交互,可以使用三种方式:
串口
以太网口
光纤口
缺省的串口参数是:9600,N,8,1
缺省IP访问方式是:
IP地址: 10.77.77.77
用户名: admin
密码:password
时区: Pacific time
交换机名称:switch
交换机SPAN技术简介+Cisco配置示例.docx
交换机SPAN技术简介+Cisco配置示例.docx
cisco交换机SPAN配置
cisco交换机SPAN配置
zshell手册,英文版本
linux/unix下的z shell手册,使用说明,E文版本
增加系统的最大打开文件数
ulimit -n
这个数字说明了一个普通用户能够在一个单独会话中所能打开最大的文件数目。注意。如果是root,以下操作不能使ulimit -n的输出增加。因为用户root用户不受这个ulimit限制。只有普通用户才会受这个限制。
TCP协议三次握手.doc
在TCP/IP协议中,TCP协议提供可靠的连接服务,采用三次握手建立一个连接。
第一次握手:建立连接时,客户端发送syn包(syn=j)到服务器,并进入SYN_SEND状态,等待服务器确认;
LINUX下SYN攻防战
LINUX下SYN攻防战LINUX下SYN攻防战
10g_ASM_新特征.pdf
网上找的10g_ASM_新特征E文版,E文好的同仁看看吧
Jprofiler 5.1.2 配置.doc
运行jprofiler_windows_5_1_2.exe
chroute.bat
自己常用的修改默认路由的批处理脚本,希望有用处
网上找的资源:修改IP地址,路由的批处理
网上找的资源,自己整理,少作修改成dos批处理菜单,希望有用
HP_Oracle9i_双机安装手册
HP unix下安装oracle89i双机
安装AIX 5_2和oracle10g
安装AIX 5.2 和oracle 10 数据库
此文章简要说明了如何在IBM rs/6000 上安装aix5.2操作系统,以图形界面方式详细地
展示了安装oracle 10G的整个安装过程,对整个安装过程没有进行描述,对不明之处请参考
AIX 和oracle 10g的官方文档。