type “mkisofs -o /tmp/cd.iso /tmp/directory/”
Делаем PEM сертификат из CRT и KEY Дано: rsa.key,ssl.crt Необходимо:ssl.pem Действия: Выпиливаем пароль из сертификата openssl rsa -in rsa.key -out ssl.key Делаем pem сертификат (с приват кеем) cat ssl.key ssl.crt > ssl.pem
openssl genrsa -des3 -out server.key 2048
openssl req -new -key server.key -out server.csr
Если сертификат будет самоподписанным, то подписывать так
openssl x509 -req -days 730 -in server.csr -signkey server.key -out server.crt
type “mkisofs -o /tmp/cd.iso /tmp/directory/”
Here is our sample input file:
192.168.1.100
192.168.1.19
192.168.1.102
192.168.2.1
192.168.0.2
Type the following sort command:
$ sort -t . -k 3,3n -k 4,4n /path/to/file
Sample output:
192.168.0.2
192.168.1.19
192.168.1.100
192.168.1.102
192.168.2.1
Where:
yum install nfs-utils nfs-utils-lib
chkconfig –levels 235 nfs on
/etc/init.d/nfs start
On Server:
mkdir /var/nfs
chown 65534:65534 /var/nfs
chmod 755 /var/nfs
* 65534 – group- nfsnobody
vi /etc/exports
{
/home 192.168.0.101(rw,sync,no_root_squash,no_subtree_check) /var/nfs 192.168.0.101(rw,sync,no_subtree_check)
}
exportfs -a
On Client:
mkdir -p /mnt/nfs/home
mkdir -p /mnt/nfs/var/nfs
mount 192.168.0.100:/home /mnt/nfs/home
mount 192.168.0.100:/var/nfs /mnt/nfs/var/nfs
vi /etc/fstab
{
192.168.0.100:/home /mnt/nfs/home nfs rw,sync,hard,intr 0 0 192.168.0.100:/var/nfs /mnt/nfs/var/nfs nfs
}
gpg –gen-key
EXPORT KEYS
export public key: gpg –export –armor [email protected] > jqdoe-pubkey.asc
export private key: gpg –export-secret-keys –armor [email protected] > jqdoe-privkey.asc export to keyserver: gpg –keyserver hkp://subkeys.pgp.net –send-key KEYNAME
IMPORT KEYS
public: gpg –import jqdoe-pubkey.asc
private: gpg –allow-secret-key-import –import jqdoe-privkey.asc
TRUST KEY
gpg –edit-key KEYNAME
trust – quit