02 architecture 12 firewall
iptables firewall
Application scenario
1.Host firewall
2.Internal sharing and Internet access
3.Port and ip mapping
iptables workflow
1.Rule matching is performed from top to bottom
2.As long as it matches up, it doesn't match down
3.If no explicit rules are matched, the default rules will be matched (all are allowed by default and can be ...
Posted by mikeblaszczec on Fri, 03 Dec 2021 19:23:35 -0800
ESP8266_ RTOS_ linux environment construction of SDK (3.0)
preface
Recently, I bought a month's standard example on Tencent cloud Internet of things platform and sent an ESP-12S development board to start the systematic learning of ESP8266. Therefore, I have reinstalled ubuntu several times. After thinking about it, I'd better record the ESP8266_ RTOS_ SDK_ The linux environment of V3.0 is built step ...
Posted by premiso on Fri, 03 Dec 2021 19:03:17 -0800
Xuanxuan Linux learning notes - process scheduling
Reference materials: Bird brother's Linux private dishes: Basic Edition, Liu Chao's interesting talk about Linux operating system, UNIX/Linux system management technical manual, 4th Edition, in-depth understanding of Linux kernel, 3rd Edition, advanced programming in UNIX environment, 3rd Edition, Linux kernel source code scenario analys ...
Posted by bgoulette612 on Fri, 03 Dec 2021 18:44:53 -0800
Introduction to Docker container network and virtualization network
1. Virtualized network
Network Namespace is a function provided by Linux kernel and an important function to realize network virtualization. It can create multiple isolated network spaces with independent network stack information. Whether it is a virtual machine or a container, it seems as if it is running in an independent network. Moreo ...
Posted by danger2oo6 on Fri, 03 Dec 2021 14:50:35 -0800
vscode - Ubuntu - Makefile details (extremely easy to understand)
1. Makefile introduction
There are countless source files in a c + + project, which are placed in several directories according to type, function and module. Makefile file defines a series of rules to specify which files need to be compiled first, which files need to be compiled later, which fil ...
Posted by jrough on Fri, 03 Dec 2021 13:50:44 -0800
How to use official SDK files to assist development
How to use official SDK files to assist development
1. First of all, what is SDK?
SDK or SDK package refers to a software development kit synchronously launched by semiconductor manufacturers for their own chips.
It can simply provide some files of application program interface API for a programming language, but it may also include complex har ...
Posted by st89 on Fri, 03 Dec 2021 12:00:31 -0800
I/O reuse method - select
I/O multiplexing
I/O complex method: select poll epoll
effect:
You can listen to multiple file descriptors at the same time, Enables the server to process multiple file descriptors at the same time without introducing multiple processes.
Network programs need to use I/O multiplexing technology:
◼ The TCP server handles both listening sock ...
Posted by kevbev16 on Fri, 03 Dec 2021 08:14:54 -0800
Research on the principle of OpenSSH password and public key authentication
⭐ Configure and protect SSH
Objective: to configure the secure command line service on the remote system using OpenSSH
Objectives:
Log in to the remote system using ssh and run the command
Configure key based authentication for user accounts so that they can safely log in to the remote system without a password
Restrict direct login as root ...
Posted by $kevan on Fri, 03 Dec 2021 02:54:46 -0800
Self study linux driver from getting started to giving up the device tree
catalogue
1. What is a device tree?
2. Structure of equipment tree
3. Node structure
4. Node standard attributes
4.1 compatible
4.2 status
4.3 #address-cells #size-cells
4.4 reg
4.5 name
4.6 device_type
4.7 phandle
4.8 virtul-reg
4.9 range
4.10 dma-range
5. Special nodes
5.1 /aliases node
5.2 /chosen node
6."of_" cor ...
Posted by PaulRyan on Thu, 02 Dec 2021 22:39:33 -0800
Explain in detail the common commands of disabling IP and unsealing IP in Linux Firewall iptables
The article is reproduced for easy sorting and induction. The source address is: https://cloud.tencent.com/developer/article/1722230
When a Linux server is attacked, sometimes there are several main IP addresses. If you can reject these IP attacks, it will greatly reduce the pressure on the server, and maybe the server will return to normal. ...
Posted by thallium6 on Thu, 02 Dec 2021 19:40:25 -0800