A Demilitarized Zone or DMZ is a network segment that is separated from other networks. Many organizations use a DMZ to separate their Local Area Networks (LANs) from the Internet. This puts additional security between their corporate network and the public Internet.
Common items that are placed in a DMZ are public-facing servers. For example, if an organization maintains their website on a server, that web server could be placed in the DMZ. In this way, if the machine is ever compromised, the remainder of the company's network is not in danger
When connecting a LAN to the Internet, a router will provide the physical connection to the public Internet, and a firewall will provide a gateway to prevent malicious data from entering the network. One port on the firewall will often connect to the corporate network using an internal address on that network, allowing traffic being sent out by individuals within the company to reach the Internet. Another port will usually be configured with a public address which will allow Internet traffic to reach the organization. These two ports can allow inbound and outbound data to reach an organization on the Internet.
In creating a DMZ, an organization adds another network segment or subnet that is still part of the organization, but not connected directly to the corporate network. Adding a DMZ will make use of a third interface port on the firewall. This configuration allows the firewall to exchange data with both the corporate network and the DMZ network using Network Address Translation (NAT).
Network Address Translation allows data received on a specific port or interface to be routed to a specified network. For example, when someone visits an organization's web site, the browser is sent to the server where the site lives. If this organization keeps its web server in a DMZ, the firewall will know that all traffic sent to the IP address associated with their web site should be passed to the server sitting in the DMZ network rather than directly into the organization's internal network.
23 Ağustos 2010 Pazartesi
16 Ağustos 2010 Pazartesi
How To Clear The Browser Cache
Clear Your Browser's Cache
originated by:Jonathon, Will, Krystle, Travis Derouin (see all)
Article Edit Discuss View History
"Empty Cache" on Safari.Every web browser stores web pages, images and other downloaded content on the computer. This is called the browser's cache. Clearing it occasionally or regularly can protect your privacy and free up some space in your computer. Since every browser is different, the following sections will outline the steps involved in clearing the cache for several popular web browsers.
Contents1 Internet Explorer
1.1 Internet Explorer 8
2 Firefox
2.1 Firefox 3.5 and up
2.2 Firefox 1.5 / 2.0 / 3.0
2.3 Firefox 1.0
3 Mozilla SeaMonkey
4 Google Chrome
5 Opera
6 Konqueror
7 Safari
7.1 Safari for Mac OSX
7.2 Safari for Windows
8 Warnings
9 Tips
10 Related wikiHows
edit Internet Explorer
Internet Explorer 81. Click "Tools".Once your browser is open, click the Tools menu. Or, optionally you may simply press Ctrl-Shift-Delete to open the Delete Browsing History window (and skip step 2)
2. Delete Browsing History...Click on Delete Browsing History...
3. "Temporary Internet Files".Select "Temporary Internet Files".
4.Click the Delete button near the bottom of the window to delete your temporary files (i.e. clear your cache).
5.If you want the browser to automatically clear the cache whenever you close it, click the Advanced tab. Click to check the box next to the "Empty Temporary Internet Files folder when browser is closed" option (in the section labeled "Security"). Click OK. This will delete everything except cookies.
edit Firefox
Firefox 3.5 and up1. "Tools".After the browser opens, click on "Tools".
2. Clear Recent History...Now click on Clear Recent History. Alternatively, you can access this menu directly by pressing Ctrl+Shift+Delete.
3. Time range to clear EverythingNow, beside "Time range to clear", click "Everything".
4. Details Cache.Click on Details and select only Cache.
5.Select Clear Now.
Firefox 1.5 / 2.0 / 3.0Below is the full method, although it is possible to simply go to Tools, and select Clear Private Data, or to just press Ctrl+Shift+Delete. Please note that these options clear what you have set the browser to clear in Tools > Options... > Privacy, which can mean the cache, although it may also include passwords, and search and browsing history, so be careful.
1. Go to Tools and select Options... (Edit then Preferences... on Linux).
2. Go to the Privacy tab, and click Settings... (in the blue box in the image).
3. Select what you would like to have cleared.
4.Return to the Options menu. If you want your cache cleared automatically, every time you close the browser, click the appropriate checkbox (shown in red in an earlier image).
5.Press "Clear Now" under the Settings button.
Firefox 1.01.Once your browser is open:
2.Click the Tools menu and select Options... (Edit then Preferences... on Linux).
3.Click the Privacy button and select the Cache tab.
4.Click the Clear Cache Now button.
edit Mozilla SeaMonkey1.Once your browser is open, click the Edit menu and select Preferences.
2.In the left-side list, open the Advanced node and select Cache.
3.Click the Clear Cache button.
edit Google Chrome1. Tools menu.Once your browser is open, select the tools menu. (the spanner(UK) / wrench(US) in the upper-right corner) and select Options.
2. Clear Browsing DataSelect Clear Browsing data... under the "Under the Hood" tab.
3. Clear cacheSelect the Empty the cache check-box.
4.If you do not wish to delete cookies, etc., remove checks from them in the list.
5. Select your time period.Select the period of time for which you wish to delete cached information using the Clear data from this period: drop-down menu. (If in doubt select Everything).
6. Done!Click the Clear Browsing Data button.
edit Opera1.Once your browser is open, select the tools menu and click delete private data.
2.Click the details button.
3.If you do not wish to delete cookies, saved passwords, etc., remove checks from them in the list.
4.Press delete.
5.If you are using the Nintendo DSi browser, go to History (accessible from the start page (press start button) & extended toolbar) and touch Delete All.
6.Then go to the start page again and touch Settings.
7.Then scroll down until you find Delete Cookies and touch that.
edit Konqueror1.Once your browser is open, click the Settings menu and select Configure Konqueror.
2.Scroll down in the list of images and select Cache.
3.Click Clear Cache.
editSafari
Safari for Mac OSX1. "Click Empty Cache"Once your browser is open, click the Safari menu and select Empty Cache....
2.Click Empty.
Safari for Windows1.Once your browser is open, click the Edit menu and select Empty Cache....
2.Click Empty.
editWarningsDeleting cookies and deleting the cache are different. See this link for deleting cookies.
edit TipsIt is a good practice to clear your cache and delete your cookies regularly.
Ads by Google
İstanbul Kuaför Salonlarıİstanbul'un en iyi Kuaför Salonları %70'e varain indirimlerle. Şimdi!
www.SehirFirsati.com/Istanbul
You can also use a third-party software, like CCleaner or Click&Clean.
You can also disable the cache entirely in the Options screen. The cache speeds up access to sites by loading data from the cache rather than downloading it, but on broadband connections, you really won't see a benefit.
If it's just privacy you're concerned with, you can use Portable Firefox, which will keep your cache, cookies, and more, as well as your own bookmarks, settings, passwords, and authenticated log in sessions on a USB flash drive or portable hard drive.
originated by:Jonathon, Will, Krystle, Travis Derouin (see all)
Article Edit Discuss View History
"Empty Cache" on Safari.Every web browser stores web pages, images and other downloaded content on the computer. This is called the browser's cache. Clearing it occasionally or regularly can protect your privacy and free up some space in your computer. Since every browser is different, the following sections will outline the steps involved in clearing the cache for several popular web browsers.
Contents1 Internet Explorer
1.1 Internet Explorer 8
2 Firefox
2.1 Firefox 3.5 and up
2.2 Firefox 1.5 / 2.0 / 3.0
2.3 Firefox 1.0
3 Mozilla SeaMonkey
4 Google Chrome
5 Opera
6 Konqueror
7 Safari
7.1 Safari for Mac OSX
7.2 Safari for Windows
8 Warnings
9 Tips
10 Related wikiHows
edit Internet Explorer
Internet Explorer 81. Click "Tools".Once your browser is open, click the Tools menu. Or, optionally you may simply press Ctrl-Shift-Delete to open the Delete Browsing History window (and skip step 2)
2. Delete Browsing History...Click on Delete Browsing History...
3. "Temporary Internet Files".Select "Temporary Internet Files".
4.Click the Delete button near the bottom of the window to delete your temporary files (i.e. clear your cache).
5.If you want the browser to automatically clear the cache whenever you close it, click the Advanced tab. Click to check the box next to the "Empty Temporary Internet Files folder when browser is closed" option (in the section labeled "Security"). Click OK. This will delete everything except cookies.
edit Firefox
Firefox 3.5 and up1. "Tools".After the browser opens, click on "Tools".
2. Clear Recent History...Now click on Clear Recent History. Alternatively, you can access this menu directly by pressing Ctrl+Shift+Delete.
3. Time range to clear EverythingNow, beside "Time range to clear", click "Everything".
4. Details Cache.Click on Details and select only Cache.
5.Select Clear Now.
Firefox 1.5 / 2.0 / 3.0Below is the full method, although it is possible to simply go to Tools, and select Clear Private Data, or to just press Ctrl+Shift+Delete. Please note that these options clear what you have set the browser to clear in Tools > Options... > Privacy, which can mean the cache, although it may also include passwords, and search and browsing history, so be careful.
1. Go to Tools and select Options... (Edit then Preferences... on Linux).
2. Go to the Privacy tab, and click Settings... (in the blue box in the image).
3. Select what you would like to have cleared.
4.Return to the Options menu. If you want your cache cleared automatically, every time you close the browser, click the appropriate checkbox (shown in red in an earlier image).
5.Press "Clear Now" under the Settings button.
Firefox 1.01.Once your browser is open:
2.Click the Tools menu and select Options... (Edit then Preferences... on Linux).
3.Click the Privacy button and select the Cache tab.
4.Click the Clear Cache Now button.
edit Mozilla SeaMonkey1.Once your browser is open, click the Edit menu and select Preferences.
2.In the left-side list, open the Advanced node and select Cache.
3.Click the Clear Cache button.
edit Google Chrome1. Tools menu.Once your browser is open, select the tools menu. (the spanner(UK) / wrench(US) in the upper-right corner) and select Options.
2. Clear Browsing DataSelect Clear Browsing data... under the "Under the Hood" tab.
3. Clear cacheSelect the Empty the cache check-box.
4.If you do not wish to delete cookies, etc., remove checks from them in the list.
5. Select your time period.Select the period of time for which you wish to delete cached information using the Clear data from this period: drop-down menu. (If in doubt select Everything).
6. Done!Click the Clear Browsing Data button.
edit Opera1.Once your browser is open, select the tools menu and click delete private data.
2.Click the details button.
3.If you do not wish to delete cookies, saved passwords, etc., remove checks from them in the list.
4.Press delete.
5.If you are using the Nintendo DSi browser, go to History (accessible from the start page (press start button) & extended toolbar) and touch Delete All.
6.Then go to the start page again and touch Settings.
7.Then scroll down until you find Delete Cookies and touch that.
edit Konqueror1.Once your browser is open, click the Settings menu and select Configure Konqueror.
2.Scroll down in the list of images and select Cache.
3.Click Clear Cache.
editSafari
Safari for Mac OSX1. "Click Empty Cache"Once your browser is open, click the Safari menu and select Empty Cache....
2.Click Empty.
Safari for Windows1.Once your browser is open, click the Edit menu and select Empty Cache....
2.Click Empty.
editWarningsDeleting cookies and deleting the cache are different. See this link for deleting cookies.
edit TipsIt is a good practice to clear your cache and delete your cookies regularly.
Ads by Google
İstanbul Kuaför Salonlarıİstanbul'un en iyi Kuaför Salonları %70'e varain indirimlerle. Şimdi!
www.SehirFirsati.com/Istanbul
You can also use a third-party software, like CCleaner or Click&Clean.
You can also disable the cache entirely in the Options screen. The cache speeds up access to sites by loading data from the cache rather than downloading it, but on broadband connections, you really won't see a benefit.
If it's just privacy you're concerned with, you can use Portable Firefox, which will keep your cache, cookies, and more, as well as your own bookmarks, settings, passwords, and authenticated log in sessions on a USB flash drive or portable hard drive.
12 Ağustos 2010 Perşembe
Very Basic Linux Commands
Moving Around the Filesystem
Commands for moving around the filesystem include the following.
• pwd: The pwd command allows you to know the directory in which you're located (pwd stands for "print working directory"). For example, pwd in the desktop directory will show ~/Desktop. Note that the GNOME terminal also displays this information in the title bar of its window.
• cd: The cd command allows you to change directories. When you open a terminal, you will be in your home directory. To move around the filesystem, use cd.
• To navigate to your desktop directory, use cd ~/Desktop
• To navigate into the root directory, use cd /
• To navigate to your home directory, use cd
• To navigate up one directory level, use cd ..
• To navigate to the previous directory (or back), use cd -
• To navigate through multiple levels of directories at once, use cd /var/www, for example, which will take you directly to the /www subdirectory of /var.
Manipulating Files and Folders
You can manipulate files and folders by using the following commands.
• cp: The cp command makes a copy of a file for you. For example, cp file foo makes an exact copy of the file whose name you entered and names the copy foo, but the first file will still exist with its original name. After you use mv, the original file no longer exists, but after you use cp, that file stays and a new copy is made.
• mv: The mv command moves a file to a different location or renames a file. Examples are as follows: mv file foo renames the original file to foo. mv foo ~/Desktop moves the file foo to your desktop directory but does not rename it. You must specify a new filename to rename a file.
• To save on typing, you can substitute ~ in place of the home directory.
Note: If you are using mv with sudo, you will not be able to use the ~ shortcut. Instead, you will have to use the full pathnames to your files.
• rm: Use this command to remove or delete a file in your directory. It does not work on directories that contain files.
• ls: The ls command shows you the files in your current directory. Used with certain options, it lets you see file sizes, when files where created, and file permissions. For example, ls ~ shows you the files that are in your home directory.
• mkdir: The mkdir command allows you to create directories. For example, mkdir music creates a music directory.
• chmod: The chmod command changes the permissions on the files listed.
Permissions are based on a fairly simple model. You can set permissions for user, group, and world, and you can set whether each can read, write, and/or execute the file. For example, if a file had permission to allow everybody to read but only the user could write, the permissions would read rwxr--r--. To add or remove a permission, you append a + or a - in front of the specific permission. For example, to add the capability for the group to edit in the previous example, you could type chmod g+x file.
• chown: The chown command allows the user to change the user and group ownerships of a file. For example, chown jim file changes the ownership of the file to Jim.
System Information Commands
System information commands include the following.
• df: The df command displays filesystem disk space usage for all partitions. The command df-h is probably the most useful. It uses megabytes (M) and gigabytes (G) instead of blocks to report. (-h means "human-readable.")
• free: The free command displays the amount of free and used memory in the system. For example, free -m gives the information using megabytes, which is probably most useful for current computers.
• top: The top command displays information on your Linux system, running processes, and system resources, including the CPU, RAM, swap usage, and total number of tasks being run. To exit top, press Q.
• uname -a: The uname command with the -a option prints all system information, including machine name, kernel name, version, and a few other details. This command is most useful for checking which kernel you're using.
• lsb_release -a: The lsb_release command with the -a option prints version information for the Linux release you're running. For example:
user@computer:~$ lsb_release -a
LSB Version: n/a
Distributor ID: Ubuntu
Description: Ubuntu (The Breezy Badger Release)
Release:
Codename: breezy
• ifconfig: This reports on your system's network interfaces.
• iwconfig: The iwconfig command shows you any wireless network adapters and the wireless-specific information from them, such as speed and network connected.
• ps: The ps command allows you to view all the processes running on the machine.
The following commands list the hardware on your computer, either of a specific type or with a specific method. They are most useful for debugging when a piece of hardware does not function correctly.
• lspci: The lspci command lists all PCI buses and devices connected to them. This commonly includes network cards and sound cards.
• lsusb: The lsusb command lists all USB buses and any connected USB devices, such as printers and thumb drives.
• lshal: The lshal command lists all devices the hardware abstraction layer (HAL) knows about, which should be most hardware on your system.
• lshw: The lshw command lists hardware on your system, including maker, type, and where it is connected.
Searching and Editing Text Files
Search and edit text files by using the following commands.
• grep: The grep command allows you to search inside a number of files for a particular search pattern and then print matching lines. For example, grep blah file will search for the text "blah" in the file and then print any matching lines.
• sed: The sed (or Stream EDitor) command allows search and replace of a particular string in a file. For example, if you want to find the string "cat" and replace it with "dog" in a file named pets, type
sed s/cat/dog/g pets.
Both grep and sed are extremely powerful programs. There are many excellent tutorials available on using them, but here are a few good Web sites to get you started:
• www.panix.com/~elflord/unix/grep.html
• www.itworld.com/Comp/2378/swol-1199-unix101/
Three other commands are useful for dealing with text.
• cat: The cat command, short for concatenate, is useful for viewing and adding to text files. The simple command cat FILENAME displays the contents of the file. Using cat FILENAME file adds the contents of the first file to the second.
• nano: Nano is a simple text editor for the command line. To open a file, use nano filename. Commands listed at the bottom of the screen are accessed via pressing Ctrl followed by the letter.
• less: The less command is used for viewing text files as well as standard output. A common usage is to pipe another command through less to be able to see all the output, such as ls
less.
Dealing with Users and Groups
You can use the following commands to administer users and groups.
• adduser: The adduser command creates a new user. To create a new user, simply type sudo adduser $loginname. This creates the user's home directory and default group. It prompts for a user password and then further details about the user.
• passwd: The passwd command changes the user's password. If run by a regular user, it will change his or her password. If run using sudo, it can change any user's password. For example, sudo passwd joe changes Joe's password.
• who: The who command tells you who is currently logged into the machine.
• addgroup: The addgroup command adds a new group. To create a new group, type sudo addgroup $groupname.
• deluser: The deluser command removes a user from the system. To remove the user's files and home directory, you need to add the
-remove-home option.
• delgroup: The delgroup command removes a group from the system. You cannot remove a group that is the primary group of any users.
Getting Help on the Command Line
This section provides you with some tips for getting help on the command line. The commands --help and man are the two most important tools at the command line.
Virtually all commands understand the -h (or --help) option, which produces a short usage description of the command and its options, then exits back to the command prompt. Try man -h or man --help to see this in action.
Every command and nearly every application in Linux has a man (manual) file, so finding such a file is as simple as typing man command to bring up a longer manual entry for the specified command. For example, man mv brings up the mv (move) manual.
Some helpful tips for using the man command include the following.
• Arrow keys: Move up and down the man file by using the arrow keys.
• q: Quit back to the command prompt by typing q.
• man man: man man brings up the manual entry for the man command, which is a good place to start!
• man intro: man intro is especially useful. It displays the Introduction to User Commands, which is a well-written, fairly brief introduction to the Linux command line.
There are also info pages, which are generally more in-depth than man pages. Try info info for the introduction to info pages.
Searching for Man Files
If you aren't sure which command or application you need to use, you can try searching the man files.
• man -k foo: This searches the man files for "foo". Try man -k nautilus to see how this works.
Note: man -k foo is the same as the apropos command.
• man -f foo: This searches only the titles of your system's man files. Try man -f gnome, for example.
Note: man -f foo is the same as the whatis command.
Using Wildcards
Sometimes you need to look at or use multiple files at the same time. For instance, you might want to delete all .rar files or move all .odt files to another directory. Thankfully, you can use a series of wildcards to accomplish such tasks.
• * matches any number of characters. For example, *.rar matches any file with the ending .rar.
• ? matches any single character. For example, ?.rar matches a.rar but not ab.rar.
• [characters] matches any of the characters within the brackets. For example, [ab].rar matches a.rar and b.rar but not c.rar.
• [!characters] matches any characters that are not listed. For example, [!ab].rar matches c.rar but not a.rar or b.rar.
Executing Multiple Commands
Often you may want to execute several commands together, either by running one after another or by passing output from one to another.
Running Sequentially
If you need to execute multiple commands in sequence but don't need to pass output between them, there are two options based on whether or not you want the subsequent commands to run only if the previous commands succeed or not. If you want the commands to run one after the other regardless of whether or not preceding commands succeed, place a ; between the commands. For example, if you want to get information about your hardware, you could run lspci ; lsusb, which would output information on your PCI buses and USB devices in sequence.
However, if you need to conditionally run the commands based on whether the previous command has succeeded, insert && between commands. An example of this is building a program from source, which is traditionally done with ./configure, make, and make install. The commands make and make install require that the previous commands have completed successfully, so you would use ./configure && make && make install.
Passing Output
If you need to pass the output of one command so that it goes to the input of the next, after the character used between the commands, you need something called a pipe, which looks like a vertical bar or pipe (
).
To use the pipe, insert the
between each command. For example, using the
in the command ls
less allows you to view the contents of the ls more easily.
Moving to More Advanced Uses of the Command Line
There are a great number of good books out there for working the command line. In addition, because most of the command line has not changed in many years, a large body of information is available on the Internet. If you need help with something, often simply searching for the command will turn up what you need.
To get you started, here are some recommendations.
• A Practical Guide to Linux Commands, Editors and Shell Programming by Mark G. Sobell (Prentice Hall, 2005) is a good book for any user of the shell in Linux to have on his or her bookshelf.
• LinuxCommand.org is an excellent Web site designed to help people new to using the command line.
• The Linux Documentation Project is an excellent and free resource for many things Linux.
This content was excerpted from the new second edition of The Official Ubuntu Book, authored by Benjamin Mako Hill and Jono Bacon, with Ivan Krstic, David Murphy, Jonathan Jesse, Peter Savage and Corey Burger, published by Prentice Hall Professional, July 2007. Copyright 2007 Canonical Ltd., all rights reserved.
Commands for moving around the filesystem include the following.
• pwd: The pwd command allows you to know the directory in which you're located (pwd stands for "print working directory"). For example, pwd in the desktop directory will show ~/Desktop. Note that the GNOME terminal also displays this information in the title bar of its window.
• cd: The cd command allows you to change directories. When you open a terminal, you will be in your home directory. To move around the filesystem, use cd.
• To navigate to your desktop directory, use cd ~/Desktop
• To navigate into the root directory, use cd /
• To navigate to your home directory, use cd
• To navigate up one directory level, use cd ..
• To navigate to the previous directory (or back), use cd -
• To navigate through multiple levels of directories at once, use cd /var/www, for example, which will take you directly to the /www subdirectory of /var.
Manipulating Files and Folders
You can manipulate files and folders by using the following commands.
• cp: The cp command makes a copy of a file for you. For example, cp file foo makes an exact copy of the file whose name you entered and names the copy foo, but the first file will still exist with its original name. After you use mv, the original file no longer exists, but after you use cp, that file stays and a new copy is made.
• mv: The mv command moves a file to a different location or renames a file. Examples are as follows: mv file foo renames the original file to foo. mv foo ~/Desktop moves the file foo to your desktop directory but does not rename it. You must specify a new filename to rename a file.
• To save on typing, you can substitute ~ in place of the home directory.
Note: If you are using mv with sudo, you will not be able to use the ~ shortcut. Instead, you will have to use the full pathnames to your files.
• rm: Use this command to remove or delete a file in your directory. It does not work on directories that contain files.
• ls: The ls command shows you the files in your current directory. Used with certain options, it lets you see file sizes, when files where created, and file permissions. For example, ls ~ shows you the files that are in your home directory.
• mkdir: The mkdir command allows you to create directories. For example, mkdir music creates a music directory.
• chmod: The chmod command changes the permissions on the files listed.
Permissions are based on a fairly simple model. You can set permissions for user, group, and world, and you can set whether each can read, write, and/or execute the file. For example, if a file had permission to allow everybody to read but only the user could write, the permissions would read rwxr--r--. To add or remove a permission, you append a + or a - in front of the specific permission. For example, to add the capability for the group to edit in the previous example, you could type chmod g+x file.
• chown: The chown command allows the user to change the user and group ownerships of a file. For example, chown jim file changes the ownership of the file to Jim.
System Information Commands
System information commands include the following.
• df: The df command displays filesystem disk space usage for all partitions. The command df-h is probably the most useful. It uses megabytes (M) and gigabytes (G) instead of blocks to report. (-h means "human-readable.")
• free: The free command displays the amount of free and used memory in the system. For example, free -m gives the information using megabytes, which is probably most useful for current computers.
• top: The top command displays information on your Linux system, running processes, and system resources, including the CPU, RAM, swap usage, and total number of tasks being run. To exit top, press Q.
• uname -a: The uname command with the -a option prints all system information, including machine name, kernel name, version, and a few other details. This command is most useful for checking which kernel you're using.
• lsb_release -a: The lsb_release command with the -a option prints version information for the Linux release you're running. For example:
user@computer:~$ lsb_release -a
LSB Version: n/a
Distributor ID: Ubuntu
Description: Ubuntu (The Breezy Badger Release)
Release:
Codename: breezy
• ifconfig: This reports on your system's network interfaces.
• iwconfig: The iwconfig command shows you any wireless network adapters and the wireless-specific information from them, such as speed and network connected.
• ps: The ps command allows you to view all the processes running on the machine.
The following commands list the hardware on your computer, either of a specific type or with a specific method. They are most useful for debugging when a piece of hardware does not function correctly.
• lspci: The lspci command lists all PCI buses and devices connected to them. This commonly includes network cards and sound cards.
• lsusb: The lsusb command lists all USB buses and any connected USB devices, such as printers and thumb drives.
• lshal: The lshal command lists all devices the hardware abstraction layer (HAL) knows about, which should be most hardware on your system.
• lshw: The lshw command lists hardware on your system, including maker, type, and where it is connected.
Searching and Editing Text Files
Search and edit text files by using the following commands.
• grep: The grep command allows you to search inside a number of files for a particular search pattern and then print matching lines. For example, grep blah file will search for the text "blah" in the file and then print any matching lines.
• sed: The sed (or Stream EDitor) command allows search and replace of a particular string in a file. For example, if you want to find the string "cat" and replace it with "dog" in a file named pets, type
sed s/cat/dog/g pets.
Both grep and sed are extremely powerful programs. There are many excellent tutorials available on using them, but here are a few good Web sites to get you started:
• www.panix.com/~elflord/unix/grep.html
• www.itworld.com/Comp/2378/swol-1199-unix101/
Three other commands are useful for dealing with text.
• cat: The cat command, short for concatenate, is useful for viewing and adding to text files. The simple command cat FILENAME displays the contents of the file. Using cat FILENAME file adds the contents of the first file to the second.
• nano: Nano is a simple text editor for the command line. To open a file, use nano filename. Commands listed at the bottom of the screen are accessed via pressing Ctrl followed by the letter.
• less: The less command is used for viewing text files as well as standard output. A common usage is to pipe another command through less to be able to see all the output, such as ls
less.
Dealing with Users and Groups
You can use the following commands to administer users and groups.
• adduser: The adduser command creates a new user. To create a new user, simply type sudo adduser $loginname. This creates the user's home directory and default group. It prompts for a user password and then further details about the user.
• passwd: The passwd command changes the user's password. If run by a regular user, it will change his or her password. If run using sudo, it can change any user's password. For example, sudo passwd joe changes Joe's password.
• who: The who command tells you who is currently logged into the machine.
• addgroup: The addgroup command adds a new group. To create a new group, type sudo addgroup $groupname.
• deluser: The deluser command removes a user from the system. To remove the user's files and home directory, you need to add the
-remove-home option.
• delgroup: The delgroup command removes a group from the system. You cannot remove a group that is the primary group of any users.
Getting Help on the Command Line
This section provides you with some tips for getting help on the command line. The commands --help and man are the two most important tools at the command line.
Virtually all commands understand the -h (or --help) option, which produces a short usage description of the command and its options, then exits back to the command prompt. Try man -h or man --help to see this in action.
Every command and nearly every application in Linux has a man (manual) file, so finding such a file is as simple as typing man command to bring up a longer manual entry for the specified command. For example, man mv brings up the mv (move) manual.
Some helpful tips for using the man command include the following.
• Arrow keys: Move up and down the man file by using the arrow keys.
• q: Quit back to the command prompt by typing q.
• man man: man man brings up the manual entry for the man command, which is a good place to start!
• man intro: man intro is especially useful. It displays the Introduction to User Commands, which is a well-written, fairly brief introduction to the Linux command line.
There are also info pages, which are generally more in-depth than man pages. Try info info for the introduction to info pages.
Searching for Man Files
If you aren't sure which command or application you need to use, you can try searching the man files.
• man -k foo: This searches the man files for "foo". Try man -k nautilus to see how this works.
Note: man -k foo is the same as the apropos command.
• man -f foo: This searches only the titles of your system's man files. Try man -f gnome, for example.
Note: man -f foo is the same as the whatis command.
Using Wildcards
Sometimes you need to look at or use multiple files at the same time. For instance, you might want to delete all .rar files or move all .odt files to another directory. Thankfully, you can use a series of wildcards to accomplish such tasks.
• * matches any number of characters. For example, *.rar matches any file with the ending .rar.
• ? matches any single character. For example, ?.rar matches a.rar but not ab.rar.
• [characters] matches any of the characters within the brackets. For example, [ab].rar matches a.rar and b.rar but not c.rar.
• [!characters] matches any characters that are not listed. For example, [!ab].rar matches c.rar but not a.rar or b.rar.
Executing Multiple Commands
Often you may want to execute several commands together, either by running one after another or by passing output from one to another.
Running Sequentially
If you need to execute multiple commands in sequence but don't need to pass output between them, there are two options based on whether or not you want the subsequent commands to run only if the previous commands succeed or not. If you want the commands to run one after the other regardless of whether or not preceding commands succeed, place a ; between the commands. For example, if you want to get information about your hardware, you could run lspci ; lsusb, which would output information on your PCI buses and USB devices in sequence.
However, if you need to conditionally run the commands based on whether the previous command has succeeded, insert && between commands. An example of this is building a program from source, which is traditionally done with ./configure, make, and make install. The commands make and make install require that the previous commands have completed successfully, so you would use ./configure && make && make install.
Passing Output
If you need to pass the output of one command so that it goes to the input of the next, after the character used between the commands, you need something called a pipe, which looks like a vertical bar or pipe (
).
To use the pipe, insert the
between each command. For example, using the
in the command ls
less allows you to view the contents of the ls more easily.
Moving to More Advanced Uses of the Command Line
There are a great number of good books out there for working the command line. In addition, because most of the command line has not changed in many years, a large body of information is available on the Internet. If you need help with something, often simply searching for the command will turn up what you need.
To get you started, here are some recommendations.
• A Practical Guide to Linux Commands, Editors and Shell Programming by Mark G. Sobell (Prentice Hall, 2005) is a good book for any user of the shell in Linux to have on his or her bookshelf.
• LinuxCommand.org is an excellent Web site designed to help people new to using the command line.
• The Linux Documentation Project is an excellent and free resource for many things Linux.
This content was excerpted from the new second edition of The Official Ubuntu Book, authored by Benjamin Mako Hill and Jono Bacon, with Ivan Krstic, David Murphy, Jonathan Jesse, Peter Savage and Corey Burger, published by Prentice Hall Professional, July 2007. Copyright 2007 Canonical Ltd., all rights reserved.
11 Ağustos 2010 Çarşamba
VNC® - the original cross-platform remote control solution
VNC is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install software.
VNC is in widespread active use by many millions throughout industry, academia and privately. There are several versions to choose from, including a free version and some substantially enhanced commercial versions.
VNC is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install software.
VNC is in widespread active use by many millions throughout industry, academia and privately. There are several versions to choose from, including a free version and some substantially enhanced commercial versions.
4 Ağustos 2010 Çarşamba
How To Configure InterVLAN Routing on Layer 3 Switches
Ref: See original Essay on Cisco Website
Introduction
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to communicate with hosts in another VLAN, the traffic must be routed between them. This is known as inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual interfaces (SVI) ). This document provides the configuration and troubleshooting steps applicable to this capability.
Note: This document uses a Catalyst 3550 as an example. However, the concepts can also be applied to other Layer 3 switches that run Cisco IOS® (for example, Catalyst 3560, 3750, Catalyst 4500/4000 Series with Sup II+ or later, or Catalyst 6500/6000 Series that run Cisco IOS System software).
Prerequisites
Requirements
Catalyst switch models 3560, 3750, Catalyst 4500/4000 Series with Sup II+ or later, or Catalyst 6500/6000 Series that run Cisco IOS system software support basic InterVLAN routing features in all their supported software versions. Before you attempt this configuration on a 3550 series switch, ensure that you meet these prerequisites:
•InterVLAN routing on the Catalyst 3550 has certain software requirements to support interVLAN routing on the switch. See this table to determine whether your switch can support interVLAN routing.
For more information on the differences between SMI and EMI, refer to Upgrading Software Images on Catalyst 3550 Series Switches Using the Command Line Interface. This document also provides the procedure to upgrade the IOS code to a version that supports interVLAN routing.
•This document assumes that Layer 2 has been configured and that the devices within the same VLAN connected to the 3550 communicate with one another. If you need information on configuring VLANs, access ports and trunking on the 3550, refer to Creating Ethernet VLANs on Catalyst Switches or the Catalyst 3550 Software Configuration Guide for the specific IOS version you run on the switch.
Components Used
The information in this document is based on these software and hardware versions:
•Catalyst 3550-48 that runs Cisco IOS Software Release 12.1(12c)EA1 EMI
The information presented in this document was created from devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If you are working in a live network, ensure that you understand the potential impact of any command before using it.
Conventions
For more information on document conventions, refer to the Cisco Technical Tips Conventions.
Configure InterVLAN Routing
Task
In this section, you are presented with the information to configure the features described in this document.
This logical diagram explains a simple interVLAN routing scenario. The scenario can be expanded to include a multi-switch environment by first configuring and testing inter-switch connectivity across the network before configuring the routing capability. For such a scenario that uses a Catalyst 3550, refer to Configuring InterVLAN Routing with Catalyst 3550 Series Switches.
Step-by-Step Instructions
Complete these steps to configure a switch to perform interVLAN routing.
1.Enable routing on the switch by using the ip routing command. Even if IP routing was previously enabled, this step ensures that it is activated.
Switch(config)#ip routing
Note: If the switch does not accept the ip routing command, upgrade to either SMI image Cisco IOS Software Release12.1(11)EA1 or later, or an EMI image, and repeat this step. See the Prerequisites section for more information.
Tip: Check the show running-configuration. Verify whether ip routing is enabled. The command, if enabled, appears towards the top of the output.
hostname Switch
!
!
ip subnet-zero
ip routing
!
vtp domain Cisco
vtp mode transparent2.Make note of the VLANs that you want to route between. In this example, you want to route traffic between VLANs 2, 3 and 10.
3.Use the show vlan command to verify that the VLANs exist in the VLAN database. If they do not exist, add them on the switch. This is an example of adding VLANs 2, 3, and 10 to the switch VLAN database
Switch#vlan database
Switch(vlan)#vlan 2
VLAN 2 added:
Name: VLAN0002
Switch(vlan)#vlan 3
VLAN 3 added:
Name: VLAN0003
Switch(vlan)#vlan 10
VLAN 10 added:
Name: VLAN0010
Switch(vlan)#exit
APPLY completed.
Exiting....Tip: You can use VLAN Trunking Protocol (VTP) to propagate these VLANs to other switches. Refer to Understanding and Configuring VLAN Trunk Protocol (VTP).
4.Determine the IP addresses you want to assign to the VLAN interface on the switch. For the switch to be able to route between the VLANs, the VLAN interfaces must be configured with an IP address. When the switch receives a packet destined for another subnet/VLAN, the switch looks at the routing table to determine where to forward the packet. The packet is then passed to the VLAN interface of the destination. It is in turn sent to the port where the end device is attached.
5.Configure the VLAN interfaces with the IP address identified in step 4.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#interface Vlan2
Switch(config-if)#ip address 10.1.2.1 255.255.255.0
Switch(config-if)#no shutdown
Repeat this process for all VLANs identified in step 1.
6.Configure the interface to the default router. In this scenario you have a Layer 3 FastEthernet port.
Switch(config)#interface FastEthernet 0/1
Switch(config-if)#no switchport
Switch(config-if)#ip address 200.1.1.1 255.255.255.0
Switch(config-if)#no shutdown
The no switchport command makes the interface Layer 3 capable. The IP address is in the same subnet as the default router.
Note: This step can be omitted if the switch reaches the default router through a VLAN. In its place, configure an IP address for that VLAN interface.
7.Configure the default route for the switch.
Switch(config)#ip route 0.0.0.0 0.0.0.0 200.1.1.2
From the diagram in the Task section, note that the IP address of the default router is 200.1.1.2. If the switch receives a packet for a network not in the routing table, it forwards it to the default gateway for further processing. From the switch, verify that you can ping the default router.
Note: The ip default-gateway command is used to specify the default gateway when routing is not enabled. However, in this case, routing is enabled (from step 1). Therefore, the ip default-gateway command is unnecessary.
8.Configure your end devices to use the respective Catalyst 3550 VLAN interface as their default gateway. For example, devices in VLAN 2 should use the interface VLAN 2 IP address as its default gateway. Refer to the appropriate client configuration guide for more information on how to designate the default gateway.
9.(Optional) When you implement Inter-VLAN routing, you can also isolate some VLANs from being routed. Refer to the Isolation Between Two Layer 3 VLANs section of Creating Ethernet VLANs on Catalyst Switches for more information.
Verify
This section provides the information to confirm that your configuration works properly.
Certain show commands are supported by the Output Interpreter Tool ( registered customers only) . This allows you to view an analysis of show command output.
•show ip route - Provides a snapshot of the routing table entries.
Cat3550#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is 200.1.1.2 to network 0.0.0.0
200.1.1.0/30 is subnetted, 1 subnets
C 200.1.1.0 is directly connected, FastEthernet0/48
10.0.0.0/24 is subnetted, 3 subnets
C 10.1.10.0 is directly connected, Vlan10
C 10.1.3.0 is directly connected, Vlan3
C 10.1.2.0 is directly connected, Vlan2
S* 0.0.0.0/0 [1/0] via 200.1.1.2
Note that the routing table has an entry for each VLAN interface subnet. Therefore, devices in VLAN 3 can communicate with devices in VLAN 10, VLAN 2 and vice versa. The default route with the next hop 200.1.1.2 allows the switch to forward traffic to the gateway of last resort (for traffic the switch cannot route).
•show ip interface brief - Lists a brief summary of an interface's IP information and status. This command is used to verify that the VLAN interfaces and ports on the switch are up/up.
Troubleshoot
This section provides the information used to troubleshoot your configuration.
Troubleshooting Procedure
Here is troubleshooting information relevant to this configuration. Follow the instructions to troubleshoot your configuration.
1.Verify you have Layer 2 connectivity by issuing Intrenet Control Message Prptocol (ICMP) pings.
◦If you are not able to ping between two devices on the same VLAN on the same switch, verify that your source and destination ports have devices connected to them and are assigned to the same VLAN. For more information, refer to Creating Ethernet VLANs on Catalyst Switches.
◦If you are not able to ping between two devices on the same VLAN but not on the same switch, verify that trunking is configured properly and that the native VLAN matches on both sides of the trunk.
2.Initiate an ICMP ping from an end device connected to the Catalyst 3550 to its corresponding VLAN interface. In this example, you can use a host on VLAN 2 (10.1.2.2) and ping interface VLAN 2 (10.1.2.1). If you are not able to ping the interface, verify that the host's default gateway points to the corresponding VLAN interface IP address and that the subnet masks match. For example, the default gateway of the device on VLAN 2 should point to Interface VLAN 2 (10.1.2.1). Also verify the interface VLAN status by issuing the show ip interface brief command.
◦If the interface status is administratively down, issue the no shutdown command in the VLAN interface configuration mode.
◦If the interface status is down/down, verify the VTP configuration and that the VLANs have been added to the VLAN database. Check to see if a port is assigned to the VLAN and whether it is in the Spanning Tree forwarding state.
3.Initiate a ping from an end device in one VLAN to the interface VLAN on another VLAN to verify that the switch routes between VLANs. In this example, ping from VLAN 2 (10.1.2.1) to Interface VLAN 3 (10.1.3.1) or Interface VLAN 10 (10.1.10.1). If the ping fails, verify that IP routing is enabled and that the VLAN interfaces status is up by issuing the show ip interface brief command.
4.Initiate a ping from the end device in one VLAN to the end device in another VLAN. For example, a device on VLAN 2 should be able to ping a device on VLAN 3. If the ping test is successful in step 3, but fails to reach the end device on other the VLAN, verify that the default gateway on the connected device is configured correctly.
5.If you are not able to reach the Internet or corporate network, verify that the default route on the 3550 points to the correct IP address on the default router. Also verify that the IP address and subnet mask on the switch are configured correctly.
There is no set recommended value of bandwidth on a VLAN interface (SVI). The default is BW 1000000 Kbit (1 Gigabit), because the route processor internal inband is only 1 Gigabit by design. The bandwidth parameter on the show interface vlan output is not fixed bandwidth used by SVI as traffic is routed on the switch backplane. The bandwidth number can be used in order to manipulate routing metrics, calculate interface load statistics, and so forth.
The Catalyst 6500 switch platform mostly forwards traffic in hardware with the exception of control/special traffic, for example, SNMP, Telnet, SSH, Routing protocols, and ARP, which has to be processed by the Supervisor, which is done in the software.
Cisco Support Community - Featured Conversations
Cisco Support Community is a forum for you to ask and answer questions, share suggestions, and collaborate with your peers. Below are just some of the most recent and relevant conversations happening right now.
Cisco Cihazlara Nasıl Şifre Girilir?
Ağ teknolojisinin en popüler cihazlarından Cisco router (yönlendirici) ve switch (anahtarlayıcı)'lere erişimin güvenlik açısından kısıtlanması gerektiği aşikardır. Cihaz IP'sine Telnet çeken, ya da konsol yuvasına kabloyu takan herkes istediği değişikliği yapabilmeli mi? Hayır.
O zaman ne yapılır, nasıl yapılır görelim.
1- Konsol Girişine şifre koyma :
2- İmtiyazlı Kullanıcı Moduna (Privileged Exec Mode) Giriş Şifresi :
Görüldüğü üzere bu işlem de conf t yaptıktan sonra yazılan enable secret ***** komutuyla yapılmış ve write mem diyerek kaydedilmiştir. İkinci bir giriş artık eskisi kadar kolay olmayıp şifre sağlanmasını şart koşmaktadır. "Enable Secret" komutu yerine "Enable Password" de yazılabilirdi fakat, secret kelimesinin kullanımıyla cihaz üzerinde koşan konfigürasyon görüntülendiğinde, şifrelerin kriptolanması sağlanır.
3- Telnet Bağlantısına Şifre Koyma:
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#line vty 0 4
Router(config-line)#password sinan
Router(config-line)#login
Router(config-line)#exit
Router(config)#write mem
Denenirse görülecektir ki telnet çekilmeye çalışıldığında şifre istenecektir.
O zaman ne yapılır, nasıl yapılır görelim.
1- Konsol Girişine şifre koyma :
Router>enable Router#conf t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#line console 0 Router(config-line)#password sinan Router(config-line)#login Router(config-line)#exit Router(config)#exit%SYS-5-CONFIG_I: Configured from console by consoleRouter#write memBuilding configuration...[OK] ----------User Access VerificationPassword:Router>Görüldüğü gibi line console 0, password ***** ve login komutlarıyla şifreyi verdik ve bir sonraki girişimizde bu şifre istendi.
2- İmtiyazlı Kullanıcı Moduna (Privileged Exec Mode) Giriş Şifresi :
deneme>
deneme>ena
deneme#conf t
Enter configuration commands, one per line. End with CNTL/Z.
deneme(config)#enable secret sinan
deneme(config)#exit
%SYS-5-CONFIG_I: Configured from console by console
deneme#exit
----------
deneme>enable
Password:
deneme#
Görüldüğü üzere bu işlem de conf t yaptıktan sonra yazılan enable secret ***** komutuyla yapılmış ve write mem diyerek kaydedilmiştir. İkinci bir giriş artık eskisi kadar kolay olmayıp şifre sağlanmasını şart koşmaktadır. "Enable Secret" komutu yerine "Enable Password" de yazılabilirdi fakat, secret kelimesinin kullanımıyla cihaz üzerinde koşan konfigürasyon görüntülendiğinde, şifrelerin kriptolanması sağlanır.
3- Telnet Bağlantısına Şifre Koyma:
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#line vty 0 4
Router(config-line)#password sinan
Router(config-line)#login
Router(config-line)#exit
Router(config)#write mem
Denenirse görülecektir ki telnet çekilmeye çalışıldığında şifre istenecektir.
Kaydol:
Kayıtlar (Atom)