2.Internal sharing and Internet access
3.Port and ip mapping
1.Rule matching is performed from top to bottom
2.As long as it matches up, it doesn't match down
3.If no explicit rules are matched, the default rules will be matched (all are allowed by default and can be ...
Posted by mikeblaszczec on Fri, 03 Dec 2021 19:23:35 -0800
Recently, I bought a month's standard example on Tencent cloud Internet of things platform and sent an ESP-12S development board to start the systematic learning of ESP8266. Therefore, I have reinstalled ubuntu several times. After thinking about it, I'd better record the ESP8266_ RTOS_ SDK_ The linux environment of V3.0 is built step ...
Posted by premiso on Fri, 03 Dec 2021 19:03:17 -0800
Reference materials: Bird brother's Linux private dishes: Basic Edition, Liu Chao's interesting talk about Linux operating system, UNIX/Linux system management technical manual, 4th Edition, in-depth understanding of Linux kernel, 3rd Edition, advanced programming in UNIX environment, 3rd Edition, Linux kernel source code scenario analys ...
Posted by bgoulette612 on Fri, 03 Dec 2021 18:44:53 -0800
1. Virtualized network
Network Namespace is a function provided by Linux kernel and an important function to realize network virtualization. It can create multiple isolated network spaces with independent network stack information. Whether it is a virtual machine or a container, it seems as if it is running in an independent network. Moreo ...
Posted by danger2oo6 on Fri, 03 Dec 2021 14:50:35 -0800
1. Makefile introduction
There are countless source files in a c + + project, which are placed in several directories according to type, function and module. Makefile file defines a series of rules to specify which files need to be compiled first, which files need to be compiled later, which fil ...
Posted by jrough on Fri, 03 Dec 2021 13:50:44 -0800
How to use official SDK files to assist development
1. First of all, what is SDK?
SDK or SDK package refers to a software development kit synchronously launched by semiconductor manufacturers for their own chips.
It can simply provide some files of application program interface API for a programming language, but it may also include complex har ...
I/O complex method: select poll epoll
You can listen to multiple file descriptors at the same time, Enables the server to process multiple file descriptors at the same time without introducing multiple processes.
Network programs need to use I/O multiplexing technology:
◼ The TCP server handles both listening sock ...
Posted by kevbev16 on Fri, 03 Dec 2021 08:14:54 -0800
⭐ Configure and protect SSH
Objective: to configure the secure command line service on the remote system using OpenSSH
Log in to the remote system using ssh and run the command
Configure key based authentication for user accounts so that they can safely log in to the remote system without a password
Restrict direct login as root ...
Posted by $kevan on Fri, 03 Dec 2021 02:54:46 -0800
The article is reproduced for easy sorting and induction. The source address is: https://cloud.tencent.com/developer/article/1722230
When a Linux server is attacked, sometimes there are several main IP addresses. If you can reject these IP attacks, it will greatly reduce the pressure on the server, and maybe the server will return to normal. ...
Posted by thallium6 on Thu, 02 Dec 2021 19:40:25 -0800