25 Linux Server Security Tips You Can Always Use!

25 Linux Server Security Tips You Can Always Use!

链接:https://blog.csdn.net/2401_84578953/article/details/144244011? ☞The course by Liang Xu has completely exploded!☜ Everyone thinks that Linux is secure by default, and I generally agree (this is a controversial topic). Linux does indeed have a built-in security model. You need to enable it and customize it to achieve a more secure system. Linux is harder to manage, but correspondingly … Read more

Linux Emergency Response – Common Service Logs

Linux Emergency Response - Common Service Logs

System Logs btmp /var/log/btmp records all login attempts that failed, displaying the last ten entries. root@mon0dy-ubuntu:~# lastb –time-format iso -10 root ssh:notty 58.56.52.226 2023-03-11T14:30:23+0800 – 2023-03-11T14:30:23+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:20+0800 – 2023-03-11T14:30:20+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:16+0800 – 2023-03-11T14:30:16+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:05+0800 – 2023-03-11T14:30:05+0800 (00:00) root ssh:notty 58.56.52.226 2023-03-11T14:30:02+0800 – 2023-03-11T14:30:02+0800 (00:00) … Read more

Linux System Administration: Installing Kali Linux on a Virtual Machine

Linux System Administration: Installing Kali Linux on a Virtual Machine

Table of Contents I. Theory 1. Kali Linux II. Experiment 1. Preparation for Installing Kali Linux on a Virtual Machine 2. Installing Kali Linux 3. Changing to Domestic Sources for Kali Linux 4. Setting a Static IP for Kali Linux 5. Enabling SSH Remote Access for Kali Linux 6. Remote Access to Kali Linux via … Read more

Automated Operations with Python: Chapter 6 Notes

Automated Operations with Python: Chapter 6 Notes

Chapter 6: Detailed Explanation of the System Batch Operation Manager Paramiko Paramiko is an SSH2 remote secure connection implemented in Python, supporting both authentication and key-based methods. It can perform remote command execution, file transfer, and intermediate SSH proxy functions. Compared to Pexpect, it has a higher level of encapsulation and is closer to the … Read more

Deploying Ansible Learning Environment on Hi168 Cloud Platform

Deploying Ansible Learning Environment on Hi168 Cloud Platform

Introduction The previous article introduced how to deploy an openEuler learning environment on the Hi168 cloud platform. Since we can deploy openEuler, various other learning environments can naturally be deployed as well. Introduction to Ansible Ansible is an automation tool for IT operations that can manage remote hosts via SSH protocol, performing batch operations on … Read more

Remote Control Methods for Wi-Fi Sensing Tools

Remote Control Methods for Wi-Fi Sensing Tools

—2025— Wireless Sensing in IoT Practical Tools Wireless Sensing/Utilities In the configuration methods and resources for Wi-Fi sensing hardware, we have systematically mastered the physical configuration methods of hardware devices. However, operating a mini computer still relies on a mouse, keyboard, and monitor. This method of operation is inefficient and becomes more inconvenient when facing … Read more

How to Install Third-Party Plugins on OpenWRT

How to Install Third-Party Plugins on OpenWRT

Installing plugins on the new version of OpenWRT has become very convenient, allowing for online installation of plugins. However, for older firmware, installation must be done via command line.Online Installation1. In the OpenWRT menu, click on “System” -> “Software Packages”, enter the desired plugin in the filter, and click to search for the package.2. After … Read more