当前位置:网站首页>RHCE command practice (I)
RHCE command practice (I)
2022-07-29 01:23:00 【Secular nostalgia】
RHCE Command practice ( One )
One 、at command
at Configure in 5 Hours later, , take “This is a at task” write in root Home directory at_test In file
[[email protected] etc]# at now + 5 hours
warning: commands will be executed using /bin/sh
at> echo "This is a at task" >> /root/at_test<EOT>
job 1 at Sun Jul 24 02:58:00 2022
Two 、crontab command
crontab To configure , Every Saturday , Sunday 9 Half past six ,14 spot Remind me to go RHCE course write in root Home directory cron_test In file
[[email protected] etc]# crontab -e
30 9 * * 6-7 echo "Have a RHCE Lesson" >> /root/cron_test
0 14 * * 6-7 echo "Have a RHCE Lesson" >> /root/cron_test
3、 ... and 、chrony service
On two Linux Upper Department chrony service : requirement : The first one synchronizes the time from Alibaba cloud server , The second synchronizes the time from the first
The first Linux:
[[email protected] etc]# systemctl enable chronyd
[[email protected] etc]# systemctl start chronyd
[[email protected] etc]# vim /etc/chrony.conf
# Use public servers from the pool.ntp.org project.
# Please consider joining the pool (http://www.pool.ntp.org/join.html).
#pool 2.rhel.pool.ntp.org iburst
server utp.aliyun.com iburst
[[email protected] etc]# systemctl restart chronyd
The second one Linux:
[[email protected] etc]# systemctl enable chronyd
[[email protected] etc]# systemctl start chronyd
[[email protected] etc]# vim /etc/chrony.conf
# Use public servers from the pool.ntp.org project.
# Please consider joining the pool (http://www.pool.ntp.org/join.html).
#pool 2.rhel.pool.ntp.org iburst
server 192.168.106.129 iburst # The first Linux Of ip
[[email protected] etc]# systemctl restart chronyd
Four 、 What is symmetric encryption , What is asymmetric encryption , What are the encryption algorithms of symmetric encryption , What encryption algorithms are needed for asymmetric encryption
Symmetric encryption : The key used for encryption and decryption is the same key ( Once the key is compromised , Then the overall information of all files using this key will be cracked )
Commonly used algorithm :DES、3DES、TDEA、Blowfish、RC2、RC4、RC5、IDEA、SKIPJACK
Asymmetric encryption : Everyone will independently generate public key and private key . Give the public key to the party that needs encryption , The encrypted file can only be decrypted by the party holding the private key corresponding to the public key .
This is equivalent to the beginning A There is a safe with a lock ( It's not locked )( Public key ) And a corresponding key ( Private key ), here B to A Ask for a safe ( Public key ), other party B Put the document into the safe and lock it , Then hand it back , This lock only has A Corresponding key , It's just A To open . Even if it is intercepted in this process , That is, I just got the safe but couldn't open it to get the contents of the files .
Commonly used algorithm :RSA、DSA、ECDSA
边栏推荐
- Regular checksum time formatting
- 教你一文解决 js 数字精度丢失问题
- Intel带你初识视觉识别--OpenVINO
- regular expression
- Self-attention neural architecture search for semantic image segmentation
- Brushless DC motor controller (how much is the hall charge for changing the motor)
- [target detection] Introduction to yolor theory + practical test visdrone data set
- [idea] where to use the query field
- Letax record \documentclass{}, authoryear attribute is used
- Principle and usage setting of large page memory
猜你喜欢

Thread lock and its ascending and descending levels

一元函数积分学之1__不定积分

Day2: 130 questions in three languages

Summary of process and thread knowledge points 1

ACM SIGIR 2022 | interpretation of selected papers of meituan technical team

Summary of process and thread knowledge points 2

Expression evaluation

测试/开发程序员靠技术渡过中年危机?提升自己本身的价值......

Beginner's Guide to electronic bidding
![“index [hotel/jXLK5MTYTU-jO9WzJNob4w] already exists“](/img/f2/37a1e65eb1104d72128f96fc5d9c85.png)
“index [hotel/jXLK5MTYTU-jO9WzJNob4w] already exists“
随机推荐
Interviewer: programmer, please tell me who leaked the company interview questions to you?
Self-attention neural architecture search for semantic image segmentation
uniapp createSelectorQuery().select 获取返回null报错
Self made | a 16 bit RISC architecture CPU is self-made by hand
system verilog常用语法
Error reporting: SQL syntax error in flask. Fields in SQL statements need quotation marks when formatting
C语言300行代码实现扫雷(可展开+可标记+可更改困难级别)
【mysql】多指标历史累计去重问题
【idea】查询字段使用位置
Deep learning | matlab implementation of TCN time convolution neural network spatialdropoutlayer parameter description
How to check the redis Version (check the redis process)
20220728-不纯为数字的字符串排序
Django uses the existing data table method of MySQL database
[Commons lang3 topic] 002 randomutils topic
Summary of process and thread knowledge points 2
log4j动态加载配置文件
nep 2022 cat
北京护照西班牙语翻译推荐
Synchronized keyword details
18 diagrams, intuitive understanding of neural networks, manifolds and topologies