/l3/users/eb/2009/linux6/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 :36 :37 :38 :39 :40 |
|
#traceroute -I -n tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 0.846 ms 1.043 ms 1.449 ms 2 10.0.35.1 0.217 ms 0.215 ms 0.212 ms 3 * * * 4 * * * 5 194.150.92.14 63.188 ms 63.389 ms 63.388 ms 6 217.27.155.29 17.704 ms 62.970 ms 63.167 ms 7 195.35.65.224 62.957 ms 62.502 ms 62.349 ms 8 62.80.172.91 61.826 ms 99.410 ms 54.138 ms 9 62.80.163.45 53.922 ms 53.915 ms 53.922 ms |
#traceroute -n tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 6.887 ms 7.283 ms 7.477 ms 2 10.0.35.1 0.224 ms 0.417 ms 0.405 ms 3 * * * 4 194.150.93.65 25.939 ms 25.931 ms 25.923 ms 5 194.150.92.14 41.496 ms 52.932 ms 52.923 ms 6 217.27.155.29 26.089 ms 25.941 ms 25.753 ms 7 195.35.65.224 25.742 ms 19.252 ms 25.463 ms 8 62.80.172.91 25.146 ms 27.190 ms 27.180 ms 9 62.80.163.45 26.964 ms 26.972 ms 26.964 ms |
#traceroute -n -q5 tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 1.069 ms 1.258 ms 1.656 ms 1.851 ms 2.041 ms 2 10.0.35.1 0.394 ms 0.385 ms 0.367 ms 0.360 ms 0.348 ms 3 * * * * * 4 * * * * * 5 194.150.92.14 49.167 ms 48.553 ms 48.594 ms 48.191 ms 47.223 ms 6 217.27.155.29 47.008 ms 9.699 ms 21.174 ms 27.814 ms 27.631 ms 7 195.35.65.224 27.823 ms 27.816 ms 25.635 ms 20.271 ms 21.070 ms 8 62.80.172.91 21.060 ms 21.112 ms 21.103 ms 18.629 ms 19.095 ms 9 62.80.163.45 18.476 ms 18.465 ms 18.267 ms 18.466 ms 19.561 ms |
#дlsusb
Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 006 Device 002: ID 03eb:0002 Atmel Corp. Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 005 Device 002: ID 0403:6001 Future Technology Devices International, Ltd FT232 USB-Serial (UART) IC Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub |
#lsusb
Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 006 Device 002: ID 03eb:0002 Atmel Corp. Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub |
#tail -f /var/log/messages
Jun 2 10:41:19 linux6 kernel: [90973.171198] atl1 0000:02:00.0: eth0 link is up 1000 Mbps full duplex Jun 2 11:28:34 linux6 kernel: [93807.992038] usb 6-2: new low speed USB device using uhci_hcd and address 2 Jun 2 11:28:34 linux6 kernel: [93808.174095] usb 6-2: New USB device found, idVendor=03eb, idProduct=0002 Jun 2 11:28:34 linux6 kernel: [93808.174099] usb 6-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Jun 2 11:28:34 linux6 kernel: [93808.174102] usb 6-2: Product: IgorPlug-USB (AVR) Jun 2 11:28:34 linux6 kernel: [93808.174105] usb 6-2: Manufacturer: Ing. Igor Cesko http://www.cesko.host.sk Jun 2 11:28:34 linux6 kernel: [93808.174197] usb 6-2: configuration #1 chosen from 1 choice Jun 2 11:28:58 linux6 kernel: [93832.704051] usb 5-2: USB disconnect, address 2 Jun 2 11:28:58 linux6 kernel: [93832.704279] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 Jun 2 11:28:58 linux6 kernel: [93832.704292] ftdi_sio 5-2:1.0: device disconnected Jun 2 11:32:02 linux6 kernel: [94016.224082] usb 6-2: USB disconnect, address 2 Jun 2 11:32:06 linux6 kernel: [94020.760027] usb 6-2: new low speed USB device using uhci_hcd and address 3 Jun 2 11:32:07 linux6 kernel: [94020.942087] usb 6-2: New USB device found, idVendor=03eb, idProduct=0002 Jun 2 11:32:07 linux6 kernel: [94020.942091] usb 6-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Jun 2 11:32:07 linux6 kernel: [94020.942094] usb 6-2: Product: IgorPlug-USB (AVR) Jun 2 11:32:07 linux6 kernel: [94020.942096] usb 6-2: Manufacturer: Ing. Igor Cesko http://www.cesko.host.sk Jun 2 11:32:07 linux6 kernel: [94020.942182] usb 6-2: configuration #1 chosen from 1 choice ^C |
#apt-cache irda
E: Неверная операция irda |
#apt-cache search irda
anyremote-doc - Documentation for anyremote gnome-vfs-obexftp - GNOME VFS module for OBEX FTP gsm-utils - GSM mobile phone access applications libgsmme1c2a - GSM mobile phone access library obexfs - mount filesystem of ObexFTP capable devices obexftp - file transfer utility for devices that use the OBEX protocol obexpushd - program for receiving files via Bluetooth or IRDA opensync-plugin-irmc - IrMC plugin for opensync ussp-push - Client for OBEX PUSH anyremote - служба удалённого управления приложениями через Bluetooth, IrDA или WiFi irda-utils - утилиты управления и обслуживания IrDA toshset - доступ к большинству аппаратных интерфейсов ноутбука Toshiba |
#apt-cache search irlink
|
#ÑÑcat /etc/ap
apm/ approx/ apt/ |
#cat /etc/apt/sources.list
#deb http://192.168.15.7:9999/debian sid main deb http://10.0.35.1:9999/debian sid main |
#еÑtcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 11:44:40.413185 LLDP, name ProCurve Switch 3400cl-48G, length 166 [|LLDP] ^C 1 packets captured 1 packets received by filter 0 packets dropped by kernel |
#tcpdump -n eth0
tcpdump: syntax error |
#tcpdump -n host 192.168.103.1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 0 packets received by filter 0 packets dropped by kernel |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 0.835 ms 1.188 ms 1.380 ms 2 10.0.35.1 (10.0.35.1) 0.344 ms 0.335 ms 0.325 ms 3 192.168.70.1 (192.168.70.1) 9.368 ms 57.009 ms 56.998 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 57.188 ms 57.178 ms 57.166 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 57.156 ms 57.146 ms 57.136 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 57.123 ms 56.842 ms 56.830 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 56.820 ms 64.149 ms 64.296 ms 8 62.80.172.91 (62.80.172.91) 55.343 ms 63.408 ms 21.994 ms 9 alpha.eb.co.ua (62.80.163.45) 21.933 ms 21.872 ms 22.020 ms |
#traceroute 10.0.35.100
traceroute to 10.0.35.100 (10.0.35.100), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 0.845 ms 1.017 ms 1.467 ms 2 10.0.35.100 (10.0.35.100) 0.531 ms 0.522 ms 0.512 ms |
#traceroute 10.0.35.100
traceroute to 10.0.35.100 (10.0.35.100), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 1.048 ms 1.107 ms 1.254 ms 2 10.0.35.100 (10.0.35.100) 0.380 ms 0.326 ms 0.273 ms |
#tcpdump -Ñn- eth0 not port 22
tcpdump version 4.0.0 libpcap version 1.0.0 Usage: tcpdump [-aAdDefIKlLnNOpqRStuUvxX] [ -B size ] [ -c count ] [ -C file_size ] [ -E algo:secret ] [ -F file ] [ -G seconds ] [ -i interface ] [ -M secret ] [ -r file ] [ -s snaplen ] [ -T type ] [ -w file ] [ -W filecount ] [ -y datalinktype ] [ -z command ] [ -Z user ] [ expression ] |
#tcpdump -n -i eth0 not port 22
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 11:52:05.927571 IP 192.168.15.6.52776 > 10.0.35.100.33434: UDP, length 32 11:52:05.927712 IP 192.168.15.6.49717 > 10.0.35.100.33435: UDP, length 32 11:52:05.927770 IP 192.168.15.6.55081 > 10.0.35.100.33436: UDP, length 32 11:52:05.927825 IP 192.168.15.6.39021 > 10.0.35.100.33437: UDP, length 32 11:52:05.927881 IP 192.168.15.6.36953 > 10.0.35.100.33438: UDP, length 32 11:52:05.927934 IP 192.168.15.6.40380 > 10.0.35.100.33439: UDP, length 32 11:52:05.927984 IP 192.168.15.6.40678 > 10.0.35.100.33440: UDP, length 32 11:52:05.928036 IP 192.168.15.6.34423 > 10.0.35.100.33441: UDP, length 32 ... 11:52:38.860981 IP 212.109.52.54.5222 > 192.168.15.6.35926: Flags [P.], seq 315:629, ack 154, win 4006, options [nop,nop,TS val 125931956 ecr 23732026], length 314 11:52:38.861000 IP 192.168.15.6.35926 > 212.109.52.54.5222: Flags [.], ack 629, win 1002, options [nop,nop,TS val 23738174 ecr 125931956], length 0 11:52:38.872400 IP 192.168.15.6.49986 > 10.0.35.1.53: 46208+ A? localhost.unix.nt. (35) 11:52:38.872575 IP 192.168.15.6.49986 > 10.0.35.1.53: 24756+ AAAA? localhost.unix.nt. (35) 11:52:38.872830 IP 10.0.35.1.53 > 192.168.15.6.49986: 46208 NXDomain* 0/1/0 (87) 11:52:38.872839 IP 10.0.35.1.53 > 192.168.15.6.49986: 24756 NXDomain* 0/1/0 (87) ^C 122 packets captured 122 packets received by filter 0 packets dropped by kernel |
#traceroute 10.0.35.100
traceroute to 10.0.35.100 (10.0.35.100), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 1.111 ms 1.364 ms 1.765 ms 2 10.0.35.100 (10.0.35.100) 0.392 ms 0.385 ms 0.376 ms |
#tcpdump -n -i eth0.103 not port 22
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0.103, link-type EN10MB (Ethernet), capture size 96 bytes 11:52:51.620361 IP 192.168.103.2.45937 > 10.0.35.1.53: 19739+ A? xgu.ru. (24) 11:52:51.620368 IP 192.168.103.2.45937 > 10.0.35.1.53: 48436+ AAAA? xgu.ru. (24) 11:52:51.620767 IP 10.0.35.1.53 > 192.168.103.2.45937: 19739 1/3/0 A 194.150.93.78 (106) 11:52:51.620771 IP 10.0.35.1.53 > 192.168.103.2.45937: 48436 0/1/0 (87) 11:52:51.620969 IP 192.168.103.2.55420 > 194.150.93.78.80: Flags [S], seq 476005573, win 5840, options [mss 1460,sackOK,TS val 1773257 ecr 0,nop,wscale 6], length 0 11:52:51.629404 IP 194.150.93.78.80 > 192.168.103.2.55420: Flags [S.], seq 2829160317, ack 476005574, win 5792, options [mss 1460,sackOK,TS val 689185829 ecr 1773257,nop,wscale 7], length 0 11:52:51.629606 IP 192.168.103.2.55420 > 194.150.93.78.80: Flags [.], ack 1, win 92, options [nop,nop,TS val 1773259 ecr 689185829], length 0 11:52:51.629809 IP 192.168.103.2.55420 > 194.150.93.78.80: Flags [P.], seq 1:460, ack 1, win 92, options [nop,nop,TS val 1773259 ecr 689185829], length 459 11:52:51.638980 IP 194.150.93.78.80 > 192.168.103.2.55420: Flags [.], ack 460, win 54, options [nop,nop,TS val 689185832 ecr 1773259], length 0 11:52:56.619107 ARP, Request who-has 192.168.103.2 tell 192.168.103.1, length 28 11:52:56.619329 ARP, Reply 192.168.103.2 is-at 00:0a:01:d4:d3:5a, length 46 ^C 11 packets captured 11 packets received by filter 0 packets dropped by kernel |
#traceroute 10.0.35.100
traceroute to 10.0.35.100 (10.0.35.100), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 0.834 ms 1.035 ms 1.274 ms 2 10.0.35.100 (10.0.35.100) 0.390 ms 0.382 ms 0.370 ms |
#traceroute 10.0.35.100
traceroute to 10.0.35.100 (10.0.35.100), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 0.838 ms 1.021 ms 1.265 ms 2 10.0.35.100 (10.0.35.100) 0.386 ms 0.379 ms 0.371 ms |
#tcpdump -n -i eth0 icmp not port 22
tcpdump: syntax error |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 12.133 ms 12.528 ms 12.723 ms 2 10.0.35.1 (10.0.35.1) 0.457 ms 0.446 ms 0.437 ms 3 192.168.70.1 (192.168.70.1) 7.225 ms 47.428 ms 47.416 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 47.609 ms 47.599 ms 47.584 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 47.577 ms 47.569 ms 47.561 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 47.549 ms 47.166 ms 47.155 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 47.146 ms 59.798 ms 54.507 ms 8 62.80.172.91 (62.80.172.91) 45.881 ms 53.434 ms 27.074 ms 9 alpha.eb.co.ua (62.80.163.45) 26.856 ms 23.561 ms 23.564 ms |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 1.267 ms 1.422 ms 1.576 ms 2 10.0.35.1 (10.0.35.1) 0.297 ms 0.252 ms 0.202 ms 3 192.168.70.1 (192.168.70.1) 5.866 ms 15.482 ms 15.435 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 15.589 ms 15.493 ms 15.443 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 23.768 ms 23.916 ms 23.873 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 23.629 ms 23.569 ms 23.714 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 23.665 ms 22.787 ms 22.214 ms 8 62.80.172.91 (62.80.172.91) 22.163 ms 28.978 ms 30.596 ms 9 alpha.eb.co.ua (62.80.163.45) 29.350 ms 29.310 ms 29.482 ms |
#tcpdump -i eth0 -n not port 22
11:54:51.273263 IP 192.168.15.6.37057 > 62.80.163.45.33461: UDP, length 32 11:54:51.317946 IP 217.27.155.29 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:51.317947 IP 194.150.92.14 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:51.318149 IP 192.168.15.6.48655 > 10.0.35.1.53: 64313+ PTR? 14.92.150.194.in-addr.arpa. (44) 11:54:51.318150 IP 217.27.155.29 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:51.318150 IP 217.27.155.29 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:51.318151 IP 194.150.92.14 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:51.318151 IP 195.35.65.224 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:51.318152 IP 194.150.92.14 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:51.318152 IP 195.35.65.224 > 192.168.15.6: ICMP time exceeded in-transit, length 36 ... 11:54:53.172775 IP 195.35.65.224 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:53.172776 IP 195.35.65.224 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:54:53.173042 IP 192.168.15.6.59210 > 10.0.35.1.53: 10416+ PTR? 91.172.80.62.in-addr.arpa. (43) 11:54:53.173281 IP 10.0.35.1.53 > 192.168.15.6.59210: 10416 NXDomain 0/1/0 (102) 11:54:53.173406 IP 192.168.15.6.33554 > 10.0.35.1.53: 34914+ PTR? 45.163.80.62.in-addr.arpa. (43) 11:54:53.173691 IP 10.0.35.1.53 > 192.168.15.6.33554: 34914 1/2/2 (145) ^C 289 packets captured 289 packets received by filter 0 packets dropped by kernel |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 0.851 ms 1.039 ms 1.399 ms 2 10.0.35.1 (10.0.35.1) 0.360 ms 0.348 ms 0.336 ms 3 192.168.70.1 (192.168.70.1) 7.550 ms 15.555 ms 15.544 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 15.737 ms 15.725 ms 15.642 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 61.274 ms 61.437 ms 61.424 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 61.177 ms 61.250 ms 61.225 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 61.215 ms 60.417 ms 60.369 ms 8 62.80.172.91 (62.80.172.91) 59.771 ms 53.542 ms 65.341 ms 9 alpha.eb.co.ua (62.80.163.45) 56.753 ms 64.191 ms 64.139 ms |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 1.275 ms 1.437 ms 1.795 ms 2 10.0.35.1 (10.0.35.1) 0.325 ms 0.291 ms 0.253 ms 3 192.168.70.1 (192.168.70.1) 6.665 ms 21.940 ms 21.912 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 22.085 ms 22.047 ms 22.016 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 21.986 ms 21.915 ms 21.883 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 21.851 ms 21.801 ms 21.770 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 408.567 ms 411.999 ms 411.955 ms 8 62.80.172.91 (62.80.172.91) 20.066 ms 19.476 ms 16.530 ms 9 alpha.eb.co.ua (62.80.163.45) 24.728 ms 21.898 ms * |
#tcpdump -i eth0.103 -n not port 22
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0.103, link-type EN10MB (Ethernet), capture size 96 bytes 11:55:59.131052 IP 192.168.103.2.44065 > 10.0.35.1.53: 27730+ A? www.google.com.ua. (35) 11:55:59.131072 IP 192.168.103.2.44065 > 10.0.35.1.53: 11441+ AAAA? www.google.com.ua. (35) 11:55:59.131458 IP 10.0.35.1.53 > 192.168.103.2.44065: 27730 6/7/7 CNAME[|domain] 11:55:59.131462 IP 10.0.35.1.53 > 192.168.103.2.44065: 11441 2/1/0 CNAME[|domain] 11:55:59.132074 IP 192.168.103.2.37778 > 74.125.87.104.33434: UDP, length 32 11:55:59.132102 IP 192.168.103.1 > 192.168.103.2: ICMP time exceeded in-transit, length 68 11:55:59.132106 IP 192.168.103.2.43202 > 74.125.87.104.33435: UDP, length 32 11:55:59.132110 IP 192.168.103.1 > 192.168.103.2: ICMP time exceeded in-transit, length 68 ... 11:55:59.244883 IP 74.125.87.104 > 192.168.103.2: ICMP 74.125.87.104 udp port 33481 unreachable, length 36 11:55:59.244886 IP 74.125.87.104 > 192.168.103.2: ICMP 74.125.87.104 udp port 33483 unreachable, length 36 11:55:59.244888 IP 74.125.87.104 > 192.168.103.2: ICMP 74.125.87.104 udp port 33484 unreachable, length 36 11:55:59.244891 IP 74.125.87.104 > 192.168.103.2: ICMP 74.125.87.104 udp port 33485 unreachable, length 36 11:56:04.129395 ARP, Request who-has 192.168.103.1 tell 192.168.103.2, length 46 11:56:04.129407 ARP, Reply 192.168.103.1 is-at 00:1b:fc:7d:b5:a7, length 28 ^C 110 packets captured 110 packets received by filter 0 packets dropped by kernel |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 8.090 ms 8.486 ms 8.680 ms 2 10.0.35.1 (10.0.35.1) 9.207 ms 9.402 ms 9.596 ms 3 192.168.70.1 (192.168.70.1) 27.846 ms 27.837 ms 27.828 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 28.019 ms 28.009 ms 28.000 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 27.985 ms 27.978 ms 27.969 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 27.959 ms 8.404 ms 19.521 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 19.096 ms 18.422 ms 18.385 ms 8 62.80.172.91 (62.80.172.91) 18.373 ms 17.806 ms 14.722 ms 9 alpha.eb.co.ua (62.80.163.45) 21.424 ms 21.416 ms 18.726 ms |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 3.115 ms 3.510 ms 3.704 ms 2 10.0.35.1 (10.0.35.1) 0.454 ms 0.445 ms 0.435 ms 3 192.168.70.1 (192.168.70.1) 7.118 ms 20.813 ms 20.803 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 20.998 ms 20.981 ms 20.972 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 20.965 ms 20.957 ms 20.949 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 20.938 ms 20.556 ms 20.548 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 27.349 ms 24.320 ms 24.293 ms 8 62.80.172.91 (62.80.172.91) 16.920 ms 20.274 ms 14.729 ms 9 alpha.eb.co.ua (62.80.163.45) 23.309 ms 21.419 ms 21.614 ms |
#traceroute tango.eb.co.ua
traceroute to tango.eb.co.ua (62.80.163.45), 30 hops max, 60 byte packets 1 192.168.15.254 (192.168.15.254) 0.894 ms 1.081 ms 1.275 ms 2 10.0.35.1 (10.0.35.1) 0.240 ms 0.228 ms 0.218 ms 3 192.168.70.1 (192.168.70.1) 8.125 ms 17.156 ms 17.146 ms 4 ip.194.150.93.65.veer.net.ua (194.150.93.65) 17.129 ms 17.323 ms 17.314 ms 5 uplink-uaix.veer.net.ua (194.150.92.14) 17.304 ms 17.296 ms 17.287 ms 6 217.27.155.29.sitel.com.ua (217.27.155.29) 17.276 ms 17.013 ms 17.002 ms 7 cyfra-10G-gw.ix.net.ua (195.35.65.224) 16.992 ms 18.663 ms 17.557 ms 8 62.80.172.91 (62.80.172.91) 17.544 ms 18.324 ms 19.428 ms 9 alpha.eb.co.ua (62.80.163.45) 19.368 ms 19.356 ms 24.247 ms |
#tcpdump -i eth0 -n icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 11:57:08.786371 IP 10.0.35.1 > 192.168.15.6: ICMP time exceeded in-transit, length 68 11:57:08.786372 IP 10.0.35.1 > 192.168.15.6: ICMP time exceeded in-transit, length 68 11:57:08.786373 IP 10.0.35.1 > 192.168.15.6: ICMP time exceeded in-transit, length 68 11:57:08.786985 IP 192.168.15.254 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:57:08.787190 IP 192.168.15.254 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:57:08.787395 IP 192.168.15.254 > 192.168.15.6: ICMP time exceeded in-transit, length 36 11:57:08.794294 IP 192.168.70.1 > 192.168.15.6: ICMP time exceeded in-transit, length 68 11:57:08.803336 IP 192.168.70.1 > 192.168.15.6: ICMP time exceeded in-transit, length 68 ... 11:57:08.823665 IP 62.80.163.45 > 192.168.15.6: ICMP 62.80.163.45 udp port 33458 unreachable, length 68 11:57:08.823665 IP 62.80.163.45 > 192.168.15.6: ICMP 62.80.163.45 udp port 33459 unreachable, length 68 11:57:08.831237 IP 62.80.163.45 > 192.168.15.6: ICMP 62.80.163.45 udp port 33460 unreachable, length 68 11:57:08.831237 IP 62.80.163.45 > 192.168.15.6: ICMP 62.80.163.45 udp port 33461 unreachable, length 68 11:57:08.831238 IP 62.80.163.45 > 192.168.15.6: ICMP 62.80.163.45 udp port 33462 unreachable, length 68 11:57:08.831440 IP 62.80.163.45 > 192.168.15.6: ICMP 62.80.163.45 udp port 33463 unreachable, length 68 ^C 30 packets captured 30 packets received by filter 0 packets dropped by kernel |
#iptables
iptables v1.4.3.2: no command specified Try `iptables -h' or 'iptables --help' for more information. |
#less /etc/service
|
#less /etc/services
|
#nets
netselect netselect-apt netstat |
#netstat -lnp
Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:9999 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 2500/sshd tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 2767/exim4 tcp6 0 0 :::22 :::* LISTEN 2500/sshd Active UNIX domain sockets (only servers) Proto RefCnt Flags Type State I-Node PID/Program name Path unix 2 [ ACC ] STREAM LISTENING 6942 2479/syslog-ng /dev/log ... unix 2 [ ACC ] STREAM LISTENING 9818 3229/gam_server @/tmp/fam-user- unix 2 [ ACC ] STREAM LISTENING 9633 3204/dbus-daemon @/tmp/dbus-EC6zISBDvc unix 2 [ ACC ] STREAM LISTENING 8003 2969/X /tmp/.X11-unix/X0 unix 2 [ ACC ] STREAM LISTENING 8939 3075/gnome-keyring- /tmp/keyring-rvHTC9/socket unix 2 [ ACC ] STREAM LISTENING 9618 3200/ssh-agent /tmp/ssh-FHfjyZ3088/agent.3088 unix 2 [ ACC ] STREAM LISTENING 9664 3088/x-session-mana /tmp/.ICE-unix/3088 unix 2 [ ACC ] STREAM LISTENING 41723 9233/gconfd-2 /tmp/orbit-user/linc-2411-0-a2ed27f5d697 unix 2 [ ACC ] STREAM LISTENING 41744 9229/firefox-bin /tmp/orbit-user/linc-240d-0-bd3c1d668904 unix 2 [ ACC ] STREAM LISTENING 309516 26488/notification- /tmp/orbit-user/linc-6778-0-6fcbd4f611dd1 unix 2 [ ACC ] STREAM LISTENING 7312 2798/hald @/var/run/hald/dbus-qn33AKyYVr |
#netstat -ln
Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:9999 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN tcp6 0 0 :::22 :::* LISTEN Active UNIX domain sockets (only servers) Proto RefCnt Flags Type State I-Node Path unix 2 [ ACC ] STREAM LISTENING 6942 /dev/log ... unix 2 [ ACC ] STREAM LISTENING 9818 @/tmp/fam-user- unix 2 [ ACC ] STREAM LISTENING 9633 @/tmp/dbus-EC6zISBDvc unix 2 [ ACC ] STREAM LISTENING 8003 /tmp/.X11-unix/X0 unix 2 [ ACC ] STREAM LISTENING 8939 /tmp/keyring-rvHTC9/socket unix 2 [ ACC ] STREAM LISTENING 9618 /tmp/ssh-FHfjyZ3088/agent.3088 unix 2 [ ACC ] STREAM LISTENING 9664 /tmp/.ICE-unix/3088 unix 2 [ ACC ] STREAM LISTENING 41723 /tmp/orbit-user/linc-2411-0-a2ed27f5d697 unix 2 [ ACC ] STREAM LISTENING 41744 /tmp/orbit-user/linc-240d-0-bd3c1d668904 unix 2 [ ACC ] STREAM LISTENING 309516 /tmp/orbit-user/linc-6778-0-6fcbd4f611dd1 unix 2 [ ACC ] STREAM LISTENING 7312 @/var/run/hald/dbus-qn33AKyYVr |
#netstat -ln -A
netstat: option requires an argument -- 'A' usage: netstat [-vWeenNcCF] [<Af>] -r netstat {-V|--version|-h|--help} netstat [-vWnNcaeol] [<Socket> ...] netstat { [-vWeenNac] -i | [-cWnNe] -M | -s } -r, --route display routing table -i, --interfaces display interface table -g, --groups display multicast group memberships -s, --statistics display networking statistics (like SNMP) -M, --masquerade display masqueraded connections -v, --verbose be verbose ... -a, --all, --listening display all sockets (default: connected) -o, --timers display timers -F, --fib display Forwarding Information Base (default) -C, --cache display routing cache instead of FIB <Socket>={-t|--tcp} {-u|--udp} {-w|--raw} {-x|--unix} --ax25 --ipx --netrom <AF>=Use '-6|-4' or '-A <af>' or '--<af>'; default: inet List of possible address families (which support routing): inet (DARPA Internet) inet6 (IPv6) ax25 (AMPR AX.25) netrom (AMPR NET/ROM) ipx (Novell IPX) ddp (Appletalk DDP) x25 (CCITT X.25) |
#netstat -ln -A inet
Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:9999 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN |
#netstat -lnp -A inet
Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:9999 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 2500/sshd tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 2767/exim4 |
#cat /etc/inetd.conf | grep -v ^# |grep -xv ''
pop-3 stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.qpopper -f /etc/qpopper.conf 9999 stream tcp nowait approx /usr/sbin/approx |
#ÑÑÐcat /tmp/netstat
cat: /tmp/netstat: ÐÐµÑ Ñакого Ñайла или каÑалога |
#digitemp_DS9097 -a -q -o "%.1C"
25.6 27.2 |
#cat /etc/host
host.conf hostname hosts.allow hosts.deny |
#cat /etc/host
host.conf hostname hosts.allow hosts.deny |
#cat /etc/hosts.allow
# /etc/hosts.allow: list of hosts that are allowed to access the system. # See the manual pages hosts_access(5) and hosts_options(5). # # Example: ALL: LOCAL @some_netgroup # ALL: .foobar.edu EXCEPT terminalserver.foobar.edu # # If you're going to protect the portmapper use the name "portmap" for the # daemon name. Remember that you can only use the keyword "ALL" and IP # addresses (NOT host or domain names) for the portmapper, as well as for # rpc.mountd (the NFS mount daemon). See portmap(8) and rpc.mountd(8) # for further information. # |
#nc -l -p 3000
^C |
#nc -l -p 80
^C |
#nmap
Nmap 4.68 ( http://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254 -iL <inputfilename>: Input from list of hosts/networks -iR <num hosts>: Choose random targets --exclude <host1[,host2][,host3],...>: Exclude hosts/networks --excludefile <exclude_file>: Exclude list from file HOST DISCOVERY: ... --send-eth/--send-ip: Send using raw ethernet frames or IP packets --privileged: Assume that the user is fully privileged --unprivileged: Assume the user lacks raw socket privileges -V: Print version number -h: Print this help summary page. EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sP 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -PN -p 80 SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES |
#nmap 10.0.35.100
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:27 EEST Interesting ports on 10.0.35.100: Not shown: 1712 closed ports PORT STATE SERVICE 22/tcp open ssh 79/tcp open finger 9999/tcp open abyss Nmap done: 1 IP address (1 host up) scanned in 2.571 seconds |
#nmap -p 10.0.35.100
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:27 EEST Error #487: Your port specifications are illegal. Example of proper form: "-100,200-1024,T:3000-4000,U:60000-" QUITTING! |
#nmap -p 79 10.0.35.100
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:27 EEST Interesting ports on 10.0.35.100: PORT STATE SERVICE 79/tcp open finger Nmap done: 1 IP address (1 host up) scanned in 0.141 seconds |
#nmap -p 1-500 10.0.35.100
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:28 EEST Interesting ports on 10.0.35.100: Not shown: 498 closed ports PORT STATE SERVICE 22/tcp open ssh 79/tcp open finger Nmap done: 1 IP address (1 host up) scanned in 3.450 seconds |
#nmap -p 1-5000 10.0.35.100
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:28 EEST Interesting ports on 10.0.35.100: Not shown: 4997 closed ports PORT STATE SERVICE 22/tcp open ssh 79/tcp open finger 3002/tcp open unknown Nmap done: 1 IP address (1 host up) scanned in 2.936 seconds |
#nmap -p 1-5000 192.168.15.7
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:28 EEST Interesting ports on linux7.unix.nt (192.168.15.7): Not shown: 4998 closed ports PORT STATE SERVICE 22/tcp open ssh 111/tcp open rpcbind MAC Address: 00:1B:FC:7D:B5:98 (Asustek Computer) Nmap done: 1 IP address (1 host up) scanned in 0.283 seconds |
#nmap -p 1-5000 10.0.35.1
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:29 EEST Interesting ports on 10.0.35.1: Not shown: 4996 closed ports PORT STATE SERVICE 22/tcp open ssh 53/tcp open domain 80/tcp open http 3128/tcp open squid-http Nmap done: 1 IP address (1 host up) scanned in 3.130 seconds |
#nmap -p 1-5000 192.168.15.254
Starting Nmap 4.68 ( http://nmap.org ) at 2009-06-02 12:29 EEST Interesting ports on 192.168.15.254: Not shown: 4995 closed ports PORT STATE SERVICE 22/tcp open ssh 23/tcp open telnet 80/tcp open http 1506/tcp open utcd 1513/tcp open fujitsu-dtc MAC Address: 00:15:60:7A:63:80 (Hewlett Packard) Nmap done: 1 IP address (1 host up) scanned in 3.437 seconds |
#ÑÑfind /proc -name \*cookies\*
/proc/sys/net/ipv4/tcp_syncookies |
#cat /proc/sys/net/ipv4/tcp_syncookies
0 |
#find /proc -name \*file\* | less
|
#df -i
Файловая система Инодов Испол Своб Исп % смонтирована на tmpfs 219966 4 219962 1% /lib/init/rw udev 219966 1396 218570 1% /dev tmpfs 219966 3 219963 1% /dev/shm rootfs 2443200 64441 2378759 3% / |
#dumpe2fs /dev/sda1 | less
|
#dumpe2fs /dev/h
hda hpet |
#dumpe2fs /dev/hda | less
|
#усecho @@ iptables -A INPUT -m conntrack --ctstate RELATED -j ACCEPT
@@ iptables -A INPUT -m conntrack --ctstate RELATED -j ACCEPT |
#iptables
iptables v1.4.3.2: no command specified Try `iptables -h' or 'iptables --help' for more information. |
#iptables -h
iptables v1.4.3.2 Usage: iptables -[AD] chain rule-specification [options] iptables -I chain [rulenum] rule-specification [options] iptables -R chain rulenum rule-specification [options] iptables -D chain rulenum [options] iptables -[LS] [chain [rulenum]] [options] iptables -[FZ] [chain] [options] iptables -[NX] chain iptables -E old-chain-name new-chain-name iptables -P chain target [options] ... [!] --out-interface -o output name[+] network interface name ([+] for wildcard) --table -t table table to manipulate (default: `filter') --verbose -v verbose mode --line-numbers print line numbers when listing --exact -x expand numbers (display exact values) [!] --fragment -f match second or further fragments only --modprobe=<command> try to insert modules using this command --set-counters PKTS BYTES set the counter during insert/append [!] --version -V print package version. |
#iptables -h |less
|
#iptables-save > /etc/network/iptables
|
#cat /etc/network/iptables
|
#iptables -L
Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination |
#nm
nm nmap |
#iptables -A INPUT -i eth0 -p tcp -s 192.168.15.6 -j REJECT
|
#iptables -h
iptables v1.4.3.2 Usage: iptables -[AD] chain rule-specification [options] iptables -I chain [rulenum] rule-specification [options] iptables -R chain rulenum rule-specification [options] iptables -D chain rulenum [options] iptables -[LS] [chain [rulenum]] [options] iptables -[FZ] [chain] [options] iptables -[NX] chain iptables -E old-chain-name new-chain-name iptables -P chain target [options] ... [!] --out-interface -o output name[+] network interface name ([+] for wildcard) --table -t table table to manipulate (default: `filter') --verbose -v verbose mode --line-numbers print line numbers when listing --exact -x expand numbers (display exact values) [!] --fragment -f match second or further fragments only --modprobe=<command> try to insert modules using this command --set-counters PKTS BYTES set the counter during insert/append [!] --version -V print package version. |
#nm
nm nmap |
#nstat -l
nstat: invalid option -- 'l' Usage: nstat [ -h?vVzrnasd:t: ] [ PATTERN [ PATTERN ] ] |
#nstat
#kernel IpInReceives 260077 0.0 IpInHdrErrors 15 0.0 IpInAddrErrors 342 0.0 IpForwDatagrams 44029 0.0 IpInDelivers 215353 0.0 IpOutRequests 273532 0.0 IcmpInErrors 88241 0.0 IcmpInDestUnreachs 66 0.0 IcmpInTimeExcds 170 0.0 ... TcpExtTCPDSACKOldSent 361 0.0 TcpExtTCPDSACKOfoSent 4 0.0 TcpExtTCPDSACKRecv 67 0.0 TcpExtTCPAbortOnData 110 0.0 TcpExtTCPAbortOnClose 21 0.0 TcpExtTCPAbortOnTimeout 28 0.0 TcpExtTCPDSACKIgnoredOld 17 0.0 TcpExtTCPDSACKIgnoredNoUndo 9 0.0 TcpExtTCPSackShiftFallback 328 0.0 IpExtInBcastPkts 496 0.0 |
#nstat --help
nstat: invalid option -- '-' Usage: nstat [ -h?vVzrnasd:t: ] [ PATTERN [ PATTERN ] ] |
#nstat -h
Usage: nstat [ -h?vVzrnasd:t: ] [ PATTERN [ PATTERN ] ] |
#net
netcat netselect netselect-apt netstat |
#netstat -lpn
Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:9999 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 2500/sshd tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 2767/exim4 tcp6 0 0 :::22 :::* LISTEN 2500/sshd Active UNIX domain sockets (only servers) Proto RefCnt Flags Type State I-Node PID/Program name Path unix 2 [ ACC ] STREAM LISTENING 6942 2479/syslog-ng /dev/log ... unix 2 [ ACC ] STREAM LISTENING 9818 3229/gam_server @/tmp/fam-user- unix 2 [ ACC ] STREAM LISTENING 9633 3204/dbus-daemon @/tmp/dbus-EC6zISBDvc unix 2 [ ACC ] STREAM LISTENING 8003 2969/X /tmp/.X11-unix/X0 unix 2 [ ACC ] STREAM LISTENING 8939 3075/gnome-keyring- /tmp/keyring-rvHTC9/socket unix 2 [ ACC ] STREAM LISTENING 9618 3200/ssh-agent /tmp/ssh-FHfjyZ3088/agent.3088 unix 2 [ ACC ] STREAM LISTENING 9664 3088/x-session-mana /tmp/.ICE-unix/3088 unix 2 [ ACC ] STREAM LISTENING 41723 9233/gconfd-2 /tmp/orbit-user/linc-2411-0-a2ed27f5d697 unix 2 [ ACC ] STREAM LISTENING 41744 9229/firefox-bin /tmp/orbit-user/linc-240d-0-bd3c1d668904 unix 2 [ ACC ] STREAM LISTENING 309516 26488/notification- /tmp/orbit-user/linc-6778-0-6fcbd4f611dd1 unix 2 [ ACC ] STREAM LISTENING 7312 2798/hald @/var/run/hald/dbus-qn33AKyYVr |
#туnetstat -lnp
Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:9999 0.0.0.0:* LISTEN 27942/inetd tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 2500/sshd tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 2767/exim4 tcp6 0 0 :::22 :::* LISTEN 2500/sshd Active UNIX domain sockets (only servers) Proto RefCnt Flags Type State I-Node PID/Program name Path unix 2 [ ACC ] STREAM LISTENING 6942 2479/syslog-ng /dev/log ... unix 2 [ ACC ] STREAM LISTENING 9818 3229/gam_server @/tmp/fam-user- unix 2 [ ACC ] STREAM LISTENING 9633 3204/dbus-daemon @/tmp/dbus-EC6zISBDvc unix 2 [ ACC ] STREAM LISTENING 8003 2969/X /tmp/.X11-unix/X0 unix 2 [ ACC ] STREAM LISTENING 8939 3075/gnome-keyring- /tmp/keyring-rvHTC9/socket unix 2 [ ACC ] STREAM LISTENING 9618 3200/ssh-agent /tmp/ssh-FHfjyZ3088/agent.3088 unix 2 [ ACC ] STREAM LISTENING 9664 3088/x-session-mana /tmp/.ICE-unix/3088 unix 2 [ ACC ] STREAM LISTENING 41723 9233/gconfd-2 /tmp/orbit-user/linc-2411-0-a2ed27f5d697 unix 2 [ ACC ] STREAM LISTENING 41744 9229/firefox-bin /tmp/orbit-user/linc-240d-0-bd3c1d668904 unix 2 [ ACC ] STREAM LISTENING 309516 26488/notification- /tmp/orbit-user/linc-6778-0-6fcbd4f611dd1 unix 2 [ ACC ] STREAM LISTENING 7312 2798/hald @/var/run/hald/dbus-qn33AKyYVr |
#iptables-save
# Generated by iptables-save v1.4.3.2 on Tue Jun 2 14:45:50 2009 *filter :INPUT ACCEPT [3279:1107453] :FORWARD ACCEPT [1368:370880] :OUTPUT ACCEPT [3186:221560] -A INPUT -s 192.168.15.6/32 -i eth0 -p tcp -j REJECT --reject-with icmp-port-unreachable COMMIT # Completed on Tue Jun 2 14:45:50 2009 |
#iptables -A INPUT -t tcp --dport 22 -j ACCEPT
iptables v1.4.3.2: unknown option `--dport' Try `iptables -h' or 'iptables --help' for more information. |
#iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
#iptables-save
# Generated by iptables-save v1.4.3.2 on Tue Jun 2 14:48:47 2009 *filter :INPUT ACCEPT [3809:1150723] :FORWARD ACCEPT [1456:379120] :OUTPUT ACCEPT [3542:259321] -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT COMMIT # Completed on Tue Jun 2 14:48:47 2009 |
#iptables -A INPUT -p tcp -j DROP
|
#iptables-save
# Generated by iptables-save v1.4.3.2 on Tue Jun 2 14:49:31 2009 *filter :INPUT ACCEPT [3818:1152062] :FORWARD ACCEPT [2292:800904] :OUTPUT ACCEPT [3601:267046] -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT -A INPUT -p tcp -j DROP COMMIT # Completed on Tue Jun 2 14:49:31 2009 |
#deb http://192.168.15.7:9999/debian sid main deb http://10.0.35.1:9999/debian sid main
host.conf hostname hosts.allow hosts.deny
# /etc/hosts.allow: list of hosts that are allowed to access the system. # See the manual pages hosts_access(5) and hosts_options(5). # # Example: ALL: LOCAL @some_netgroup # ALL: .foobar.edu EXCEPT terminalserver.foobar.edu # # If you're going to protect the portmapper use the name "portmap" for the # daemon name. Remember that you can only use the keyword "ALL" and IP # addresses (NOT host or domain names) for the portmapper, as well as for # rpc.mountd (the NFS mount daemon). See portmap(8) and rpc.mountd(8) # for further information. #
0
netstat() > { > /bin/netstat "$@" | grep -v :79 > }
Время первой команды журнала | 11:20:45 2009- 6- 2 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 14:49:28 2009- 6- 2 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 101 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 19.80 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 0.00 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 2.06 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 0.82 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008