개발/시스템 썸네일형 리스트형 mount fs # mount / umount> mount -[fnrvw] -t [fs type] -o [options] [device name] [directory name]> umount -[nv] [device name or directory name]> cat /proc/mounts # permanently mount> vi /etc/fstab> mount -a 더보기 ssh using rsa key 1. Create rsa private/public key in local> ssh-keygen -t rsa> copy id_rsa ~/.ssh/> cat id_rsa.pub -> (a) 2. Login to the remote server (or scp id_rsa.pub to the remote server)> goto the account root directory (whatever account you want to login with)> vi .ssh/authorized_keys> paste (a) into this file(authorized_keys) 3. Login with rsa key> ssh -i id_rsa xxx@ip ref: http://news.softpedia.com/news.. 더보기 Create certificates using OpenSSL 0. Openssl설치여부 확인> rpm -qa | grep openssl 1. Generate a self-signed certificate (주로 개발환경)> openssl req -new -x509 -days 730 -nodes -out xxx.pem -keyout xxx.key2048byte로 인코딩하려면 -newkey rsa:2048 추가 2. Generate a new private key and CSR> openssl req –nodes -newkey rsa:2048 -keyout xxx.key –out xxx.csr 3. View certificate info> echo -- | openssl s_client -connect xxx:443 -msg 날짜보기> echo -- | openssl.. 더보기 Linux Command * Background로 실행후 로그아웃해도 떠있게 nohup java -jar a.jar & * 특정폴더 하위 .svn폴더 모두 지워버리기find . -name '.svn' -exec rm -rf {} \; 더보기 Linux버젼 확인 [root@ca1xw101:/home/www/src]$ uname -a Linux ca1xw101 2.6.18-92.1.22.el5 #1 SMP Tue Dec 16 11:57:43 EST 2008 x86_64 x86_64 x86_64 GNU/Linux [root@ca1xw101:/home/www/src]$ cat /etc/*release* CentOS release 5.2 (Final) 더보기 OpenVPN 설치 * Mac TunnelBlick설치후, 안내에 따라 진행 http://code.google.com/p/tunnelblick/ * Windows Openvpn설치후, 안내에 따라 진행 http://openvpn.se/download.html * Linux 1. install rpmforge for downloading openvpn source http://pkgs.repoforge.org/rpmforge-release/ [root@ca1xw101:/home/www/src]$ wget http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.2-2.el5.rf.x86_64.rpm [root@ca1xw101:/home/www/src]$ rpm -Uvh.. 더보기 SSH Tunneling * Forward vs Reverse 타겟서버에 접근가능한 서버를 통한 proxy설정 => Forward Tunneling 타겟서버에 직접 proxy를 설정 => Reverse Tunneling * Forward Tunneling > ssh -f -C -N -L10101:10.37.116.29:1433 mdh0130@ca1xa104 10101 Port로 들어오는 모든 접속을 ca1xa104서버를 통해 10.37.116.1433포트로 전달 이경우 타겟서버는 10.37.116.29가 되며, ca1xa104서버는 10.37.116.29:1433에 대한 ACL이 열려있어야 한다. * Reverse Tunneling > ssh -R 10101:localhost:1433 mdh0130@blackhole blackh.. 더보기 이전 1 다음