In the IT industry, being a generalist or expert has always been controversial. 99% of traditional system administrators fall into the generalist category. The role...
We are using the official long-supported 8.10.0LTS version. Click this link to download the 32-bit installer. The 32-bit installer is available for both 32-bit and...
Nodeos: The core processes of the EOS system, known as "nodes". Cleos: A local command-line tool that interacts with human users on the command line...
ElasticSearch is a Lucene-based search server. It provides a distributed multi - user - capable full - text search engine based on RESTful Web interface....
I have a Linux server on a cloud with Centos7 installed. Play around with Docker and Docker-compose containers and container choreography on this server. Use...
FastDFS is an open source lightweight distributed file system. It manages files, including file storage, file synchronization, file upload, and file download. It solves the...
In the previous article, we have described two Agent implementation methods: Agent Implementation Based on JVMTI and Agent Implementation Based on Java Instrument. Each method...
In the previous notes, we have successfully completed the server installation and virtual network configuration. In this article, we will configure SSH remote login for...
From the perspective of penetration, this paper summarizes several common Intranet penetration and Intranet proxy tools, and introduces their simple principles and application methods. 0x01...
The Linux command line is something that developers deal with on a daily basis. However, there are many tricks. Here's a summary (long-term update). If...
Wechat official account: Taste of little sister, qr code attached at the end of the article, welcome to follow. Running applications with the root account...
Basic Concepts In Linux, a process is a data structure. Understanding the underlying workings of file descriptors, redirects, and pipe commands can be understood from...
Most partners often need to hang multi-layer agents to hide their whereabouts during penetration tests. They often adopt multi-layer agents to maximize the utilization of...