
-
All
-
web3.0
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Backend Development
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Web Front-end
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Database
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Operation and Maintenance
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Development Tools
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
PHP Framework
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Common Problem
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Other
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Tech
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
CMS Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Java
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
System Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Computer Tutorials
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Hardware Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Mobile Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Software Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-
-
Mobile Game Tutorial
-
Mac OS
-
Linux Operation and Maintenance
-
Apache
-
Nginx
-
CentOS
-
Docker
-
LVS
-
vagrant
-
debian
-
zabbix
-
kubernetes
-
ssh
-
fabric
-

Configuration tutorial for implementing SSH one-way passwordless access on CentOS
Recently, I have been researching a file system that requires remote installation of software on the client computer and access without an SSH password. In addition, it is necessary to remotely transfer files to the client computer. It is inconvenient to enter the root password every time, so I thought of using sshkey to generate the public key and private key. key to verify without having to enter the root password every time. Server architecture: System: CentOS6.5x64 Control terminal A: 192.168.0.150 Remote host B: 192.168.0.151 Principle: Use sshkey to generate public key and private key. The key is equivalent to a key, and the public key is equivalent to a When locking a door, of course we hold the key to unlock it. In the same way, we put the key on the local server, which is server A, and put the public key on the remote server.
Jan 04, 2024 am 08:16 AM
Git Series (2): Getting Started Guide to Git
Introduction Because Git is so popular, if you can at least be familiar with some basic Git knowledge, it will bring a lot of convenience to your life. If you can master the basics of Git (you can, I swear!), then you'll be able to download anything you need and maybe even make some contributions in return. After all, that's the essence of open source: you have access to the code of the software you use, the freedom to share it with others, and the right to modify it if you wish. Once you're familiar with Git, it makes all of this easy. Reading and Writing Generally speaking, there are two ways to interact with a Git repository: you can read from the repository, or you can write to the repository. It's like a file: sometimes you open a
Jan 03, 2024 pm 07:05 PM
How to terminate unused or idle SSH sessions
Introduction How to close an inactive ssh session? First use the w command to identify the inactive or idle ssh session, then use the pstree command to obtain the PID of the idle session, and finally use the kill command to close the session. Let's assume that when you are working on a server via ssh, your session connection is disconnected due to network, power, or local PC restart. You may or may not log into the server again to continue working, but you will always be left with the ssh session that was not closed before. How to close an inactive ssh session? First use the w command to identify the inactive or idle ssh session, and then use the pstree command to obtain the PID of the idle session.
Jan 03, 2024 pm 02:24 PM
Explore the inner workings of Maven: a detailed explanation of build, dependency management and deployment
In-depth analysis of Maven: construction, dependency management and deployment Introduction In recent years, the software development industry has developed rapidly, and more and more projects require construction, dependency management and deployment. In this process, Maven is widely used as a popular build tool. This article will provide an in-depth analysis of the importance and usage of Maven's construction, dependency management, and deployment to help readers better understand and apply Maven. 1. Overview of Maven Maven is an open source project management and build tool that can help development teams
Jan 03, 2024 am 10:24 AM
What exactly is the reason for Kubernetes' widespread popularity?
Introduction The Kubernetes platform that runs containerized workloads plays a significant role when developing and deploying cloud-native applications. Naturally, developing and deploying cloud-native applications has become extremely popular. There are obvious advantages to a process that allows for rapid deployment and continuous delivery of bug fixes and new features, but no one talks about the chicken and egg problem: How to achieve this? Building the infrastructure and development processes to develop and maintain cloud-native applications from scratch is a non-trivial and time-consuming task. Kubernetes is a relatively new platform for running containerized workloads that solves these problems. It was originally a project within Google, and Kubernetes was developed in the 20s
Jan 03, 2024 am 08:30 AM
Using PuTTY for port forwarding and application startup
After penetrating through the intranet, generally speaking, when we access the machine in the intranet, we can access it with the next command in Ubuntu: sshname@Alibaba Cloud-p6000, where -p represents the port number; similarly, through putty under Windows You can also modify the corresponding port number to access the intranet, as shown in the figure below. For port, write the port number corresponding to the Alibaba Cloud transfer server; however, if you start jupyternotebook on the server, jupyter will allocate a port to you, because it is remotely Called, so if you are editing jupyternotebook locally, you need to perform port mapping, which means that the server side is assigned to jupyternoteb
Jan 02, 2024 pm 09:44 PM
Get started with Docker in five minutes
What is Docker? Docker is an open source container engine, and a container is actually a virtualized independent environment. Therefore, developers can package applications into such a docker container, and then publish it to any machine that can run the docker container, and implement it once Packaging for multiple deployments solves deployment problems caused by environmental problems. A concept corresponding to the container is the image. The image can be regarded as the image of our daily installation system, which is a running environment. Of course, I prefer to compare an image to a class in our object-oriented programming, and a container is an instance of a class, so many containers can be created based on one image. Each container is specific, we can use the container
Jan 02, 2024 pm 02:29 PM
Quickly master SSH login in 3 steps!
Introduction In some operation and maintenance scenarios, in order to avoid security risks such as brute force cracking of passwords, ssh keys are used to log in. For example, AWSEC2 and the open source spring machine Jumpserver all use ssh keys to log in. Taking Jumpserver as an example, when the administrator creates a new user, the user's ssh key file (pem format) and ssh key password will be sent to the new user by email at the same time. The next login steps are as follows: Step 1: Since the ssh key file imported by Putty, xShell and other tools is in ppk format (ie: PuttyPrivateKey), you need to download the PuttyGen tool first and convert the pem file to ppk format: Open
Jan 01, 2024 pm 10:05 PM
In-depth exploration of the knowledge system in the field of surveillance
Guide monitoring is the most important part of the entire operation and maintenance and even the entire product life cycle. It provides timely warnings to detect faults beforehand, and provides detailed data afterwards for tracing and locating problems. There are many good open source products in the industry to choose from. Choosing an open source monitoring system is a time-saving, labor-saving and most efficient solution. Of course, friends who don’t know much about monitoring may have a deeper understanding of the entire monitoring system after reading the following article. 1. Monitoring objectives Let’s first understand what monitoring is, the importance of monitoring and the goals of monitoring. Of course, everyone is in a different industry, company, business, position, and has a different understanding of monitoring, but we need to pay attention. Monitoring needs to be considered from the company's business perspective, rather than targeting a specific monitoring technology.
Jan 01, 2024 pm 07:17 PM
Explore how to protect your Linux server
No matter which Linux distribution you use, you need to protect it with an iptables-based firewall. Aha! You've set up your first Linux server and are ready to go! Is it? Well, wait. By default, your Linux system is not secure from attackers. Of course, it's much more secure than WindowsXP, but that doesn't mean much. To make your Linux system truly secure, you need to follow Linode's Server Security Guide. In general, first you have to turn off those services that you don't need. Of course, to do this, you first need to know which network services you are using. You can use shell commands to find out which services
Jan 01, 2024 pm 03:56 PM
How to set up the network connection of the Linux system in the virtual machine?
For many students who are new to Linux, most of them choose to use a virtual machine to start learning. You can easily do experiments, modifications, and tests, and you don’t have to be afraid of problems, you can just mess around! At worst, if you change to a virtual machine, the original system will not be affected in any way. However, since it is not a physical PC, its use is inevitably limited. If the configuration is not good, later development will suffer! For example, databases are used in many programs! MySQL, Redis. To establish a connection with them, especially remotely, you must specify the IP and port. How to configure a virtual machine so that Windows and Linux can be interconnected to facilitate access to the external network without frequent changes? In the preparation stage, this short article explains the Ubuntu operating system and graphics in the Vmware virtual machine.
Jan 01, 2024 pm 02:01 PM
Steps to install Screen on CentOS 6.5
We often encounter this problem. We use SSH to log in to a remote Linux server and run some long-term tasks. However, the task fails midway due to network instability. How to prevent the command from being interfered by closing the terminal window locally/disconnecting the network after the command is submitted? Screen is a free software developed by the GNU Project for command line terminal switching. Users can use this software to connect to multiple local or remote command line sessions at the same time and switch between them freely. Screen can be thought of as the command line interface version of a window manager. It provides a unified interface and corresponding functions for managing multiple sessions. Method: 1. Check if there is a screen installation package on the YUM source #yumlistscreen
Jan 01, 2024 am 11:17 AM
How to check the SSH version in Linux system
Introduction I thought that SSH exists in two versions 1 and 2 (SSH1 and SSH2). What's the difference between these two? And how can I check the SSH protocol version on Linux? Secure Shell (SSH) enables remote login or remote execution of commands through an encrypted secure communication channel. SSH is designed to replace insecure plaintext protocols such as telnet, rsh, and rlogin. SSH provides a number of required features such as authentication, encryption, data integrity, authorization and forwarding/tunneling. SSH1 vs. SSH2 There are some minor version differences in the SSH protocol specification, but there are two main large versions: SSH1 (version number 1.XX) and SSH2 (version number 2.00). In fact, SSH
Jan 01, 2024 am 09:09 AM
How to build a network storage device using Raspberry Pi
Introduction Do you have an idle mobile hard drive and Raspberry Pi? You can use these to build a cheap and low-power NAS. The end result is definitely not as good as a $500 NAS, such as those made by Synology DiskStation. But it's possible to build a low-power network storage platform - and especially for those who are tired of the National Security Agency's data surveillance, you can hide your data in this "little attic". You need a Raspberry Pi and one or two free external hard drives. The smaller 2.5mm hard drive can be powered directly by the USB interface, but we need a USB splitter with power supply function because the power provided by the Raspberry Pi's USB interface is not enough to power the mobile hard drive. Apart from this
Dec 31, 2023 am 11:53 AM
Hot tools Tags

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

vc9-vc14 (32+64 bit) runtime library collection (link below)
Download the collection of runtime libraries required for phpStudy installation

VC9 32-bit
VC9 32-bit phpstudy integrated installation environment runtime library

PHP programmer toolbox full version
Programmer Toolbox v1.0 PHP Integrated Environment

VC11 32-bit
VC11 32-bit phpstudy integrated installation environment runtime library

SublimeText3 Chinese version
Chinese version, very easy to use
