当前位置:网站首页>RHCE command practice (I)
RHCE command practice (I)
2022-07-29 01:23:00 【Secular nostalgia】
RHCE Command practice ( One )
One 、at command
at Configure in 5 Hours later, , take “This is a at task” write in root Home directory at_test In file
[[email protected] etc]# at now + 5 hours
warning: commands will be executed using /bin/sh
at> echo "This is a at task" >> /root/at_test<EOT>
job 1 at Sun Jul 24 02:58:00 2022
Two 、crontab command
crontab To configure , Every Saturday , Sunday 9 Half past six ,14 spot Remind me to go RHCE course write in root Home directory cron_test In file
[[email protected] etc]# crontab -e
30 9 * * 6-7 echo "Have a RHCE Lesson" >> /root/cron_test
0 14 * * 6-7 echo "Have a RHCE Lesson" >> /root/cron_test
3、 ... and 、chrony service
On two Linux Upper Department chrony service : requirement : The first one synchronizes the time from Alibaba cloud server , The second synchronizes the time from the first
The first Linux:
[[email protected] etc]# systemctl enable chronyd
[[email protected] etc]# systemctl start chronyd
[[email protected] etc]# vim /etc/chrony.conf
# Use public servers from the pool.ntp.org project.
# Please consider joining the pool (http://www.pool.ntp.org/join.html).
#pool 2.rhel.pool.ntp.org iburst
server utp.aliyun.com iburst
[[email protected] etc]# systemctl restart chronyd
The second one Linux:
[[email protected] etc]# systemctl enable chronyd
[[email protected] etc]# systemctl start chronyd
[[email protected] etc]# vim /etc/chrony.conf
# Use public servers from the pool.ntp.org project.
# Please consider joining the pool (http://www.pool.ntp.org/join.html).
#pool 2.rhel.pool.ntp.org iburst
server 192.168.106.129 iburst # The first Linux Of ip
[[email protected] etc]# systemctl restart chronyd
Four 、 What is symmetric encryption , What is asymmetric encryption , What are the encryption algorithms of symmetric encryption , What encryption algorithms are needed for asymmetric encryption
Symmetric encryption : The key used for encryption and decryption is the same key ( Once the key is compromised , Then the overall information of all files using this key will be cracked )
Commonly used algorithm :DES、3DES、TDEA、Blowfish、RC2、RC4、RC5、IDEA、SKIPJACK
Asymmetric encryption : Everyone will independently generate public key and private key . Give the public key to the party that needs encryption , The encrypted file can only be decrypted by the party holding the private key corresponding to the public key .
This is equivalent to the beginning A There is a safe with a lock ( It's not locked )( Public key ) And a corresponding key ( Private key ), here B to A Ask for a safe ( Public key ), other party B Put the document into the safe and lock it , Then hand it back , This lock only has A Corresponding key , It's just A To open . Even if it is intercepted in this process , That is, I just got the safe but couldn't open it to get the contents of the files .
Commonly used algorithm :RSA、DSA、ECDSA
边栏推荐
- dart数组,Map,类型判断,条件判断运算符,类型转换
- App access kakaotalk three party login
- The digitalization of the consumer industry is upgraded to "rigid demand", and weiit's new retail SaaS empowers enterprises!
- RHCE命令练习(一)
- js判断 数组/对象数组 1 是否包含数组/对象数组 2
- Log4j dynamic loading configuration file
- RHCE命令练习(二)
- Canal实时解析mysql binlog数据实战
- FLV文件简介
- Flink Postgres CDC
猜你喜欢

nep 2022 cat

面试官:程序员,请你告诉我是谁把公司面试题泄露给你的?

Time series prediction | MATLAB realizes time series prediction of TCN time convolution neural network

一元函数积分学之1__不定积分
![“index [hotel/jXLK5MTYTU-jO9WzJNob4w] already exists“](/img/f2/37a1e65eb1104d72128f96fc5d9c85.png)
“index [hotel/jXLK5MTYTU-jO9WzJNob4w] already exists“

The digitalization of the consumer industry is upgraded to "rigid demand", and weiit's new retail SaaS empowers enterprises!

线程锁及锁的升降级

【idea】查询字段使用位置

Google Play APK 上传其他国际应用商店

ACM SIGIR 2022 | 美团技术团队精选论文解读
随机推荐
进程和线程知识点总结 2
Cookies and sessions
Oozie工作调度
Linux redis source code installation
A new generation of ultra safe cellular battery, Sihao aipao, is on the market, starting from 139900
Cookies and sessions
正则表达式
MySQL time is formatted by hour_ MySQL time format, MySQL statement queried by time period [easy to understand]
Machine learning | matlab implementation of RBF radial basis function neural network Newrbe parameter setting
Oozie job scheduling
ActiveMQ basic details
[ManageEngine] help Harbin Engineering University realize integrated monitoring and management of network traffic
正则校验与时间格式化
[idea] where to use the query field
App access kakaotalk three party login
Mathematical modeling and detailed explanation of basic knowledge (common knowledge points of Chemistry)
指令重排、happens-before、as-if-serial
Deep learning | matlab implementation of TCN time convolution neural network spatialdropoutlayer parameter description
RHCE命令练习(一)
Error reporting: SQL syntax error in flask. Fields in SQL statements need quotation marks when formatting