Table of contents Summary I Abstract II 1 Introduction 1 1.1 Topic background 1 1.2 Research significance 1 1.3 System design principles 1 1.3.1 Introduction to Java 1 1.3.2 Development Tools 2 2 Requirements Analysis 3 2.1 Product description 3 2.2 Function list 3 2.3 Technical introduction 4 3 System Analysis 5 3.1 Overall design […]
Tag: ssh
The Linux host realizes password-free login between two hosts based on the ssh protocol.
Table of Contents 1. ssh protocol 1.SSH protocol 2. Working process of SSH protocol (1) The first stage: TCP three-way handshake version negotiation stage: (2) The second stage: Negotiation algorithm and determination of symmetric secret key stage (3) The third stage: certification stage: (4) The fourth stage: session request stage: (5) The fifth stage: interactive […]
Centos7 SSH login security policy
Article directory 1. Public key login 1. Create public key and secret key through SecureCRT Generate public key Apply to SecureCRT and server 2. Create public key and secret key through Windows 10 Generate public key Applied to SecureCRT and other terminals and servers 2. Change the SSH port, cancel SSH password login, and only […]
Scheduled tasks-log-ssh
Table of contents 1. Planning tasks 1.1. One-time scheduling execution 1.2. Circular scheduling and execution of cron user level 2. Log rotation 2.1. Importance of logs 2.2. Log system rsyslog 2.3. logrotate log rotation 3. SSH remote management service 3.1. tcpwrapper—access control tool 3.2. Common commands 1. Scheduled tasks Analysis of the concept of planned […]
Ubuntu20.04 configuration process (Samba, SSH, tagBar)
Click to jump Click to jump Click to jump Click to jump Click to jump Click to jump Jump here Jump here Jump here Jump here Jump here Jump here 1. Change the domestic image source Before changing the software source, it is best to back up the original software source list file to prevent […]
What should I do if I want to upgrade OpenSSH on 100 CentOS7 machines?
background ? There are now 100 Centos7 machines that need to upgrade OpenSSH to 8.3. What should I do? The operation of each machine obviously does not meet my style of fishing. Since the operation of each machine is the same, Ansible Roles has its place. Normal upgrade process First, rpmbuild generates the OpenSSH 8.3 […]
Hospital online appointment registration system based on JavaSSH+MySQL
Table of contents Hospital online appointment registration system 1 Detailed Design Specification 1 Revision history 1 Introduction 2 1.1 Purpose of writing 2 1.2 Background 3 1.3 References 3 1.4 Definition and explanation of terms 3 Design Overview 3 2.1 Mission and Objectives 3 2.1.1 Requirements Overview 3 2.1.2 Operational requirements 5 2.1.3 Overview of […]
Linux restricts user permissions, JSch, ChannelSftp, ChannelExec, java.util.InterruptedException, /etc/ssh/sshd_config, setfacl
Problem background: Other systems need to get files on the server when requesting my interface, but I don’t want to give them to users with more permissions. So I want to create a new user sftpuser on Linux. This user can only download files from the directory and subdirectories I provided, and cannot perform other […]
OpenWRT realizes safe and reliable ssh remote connection through intranet penetration
Article directory 1. Install cpolar intranet penetration 2. Configure SSH remote access tunnel 3. Public network remote connection 4. Fixed remote connection address A few simple steps to implement openWRT combined with cpolar intranet penetration tool to achieve remote ssh connection 1. Install cpolar intranet penetration cpolar is a great cross-platform and intranet penetration tool […]
Advanced Network Security Administrator – Network Device and Security Configuration: SSH Configuration
Article directory Using the software Cisco Packet Tracer (Cisco Simulator) Introduction to SSH SSHv2 configuration (1) Configuration requirements (2) Draw topology diagram 1. Add a router 2. Connect to the router 3. Open the f0/0 port 4. Configure the port IP address (3) Enable password configuration 1. Configuration command 2. Configuration process (4) Configure the […]