scp username@10.9.9.90:/opt/mpp/projects/ /opt/misserver
rpm -qa|grep #check rpm installation
rpm -e
ssh -s nat@10.9.205.29 -p 22 netconf #ssh connection to netconf
ls -lR|grep "205.29"|wc -l #count the number of files
find ./ -type f -name "*.*" | xargs grep "symm" #find files by content in ./ drectory
request snmp spoof-trap jnxFruRemoval variable-bindings "jnxFruName=PIC:1x10GE(LAN/WAN)@2/0/0" ###spoof trap in juniper device
keytool -import -alias cacerts -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -file "%JAVA_HOME%\jre\lib\security\maven.cer" -trustcacerts ##import certificate for jvm
netstat -tlnp|grep ##to see what process is using this port
tracert 10.9.186.184 #in NT
Pinging 10.0.44.42 with 32 bytes of data:
Reply from 10.0.44.42: bytes=32 time=33ms TTL=251
操作系统 TTL(Time To Live) LINUX 64 WIN2K/NT 128 WINDOWS系列 32 UNIX系列 255, 每过一个路由至少-1
rpm -qa|grep #check rpm installation
rpm -e
ssh -s nat@10.9.205.29 -p 22 netconf #ssh connection to netconf
ls -lR|grep "205.29"|wc -l #count the number of files
find ./ -type f -name "*.*" | xargs grep "symm" #find files by content in ./ drectory
request snmp spoof-trap jnxFruRemoval variable-bindings "jnxFruName=PIC:1x10GE(LAN/WAN)@2/0/0" ###spoof trap in juniper device
keytool -import -alias cacerts -keystore "%JAVA_HOME%\jre\lib\security\cacerts" -file "%JAVA_HOME%\jre\lib\security\maven.cer" -trustcacerts ##import certificate for jvm
netstat -tlnp|grep ##to see what process is using this port
tracert 10.9.186.184 #in NT
Pinging 10.0.44.42 with 32 bytes of data:
Reply from 10.0.44.42: bytes=32 time=33ms TTL=251
操作系统 TTL(Time To Live) LINUX 64 WIN2K/NT 128 WINDOWS系列 32 UNIX系列 255, 每过一个路由至少-1
本文档详细介绍了如何通过SSH连接进行远程系统管理和文件搜索,包括检查RPM安装情况、统计特定目录下文件数量及查找含有指定内容的文件等实用技巧。此外还涉及了SNMP陷阱伪造、证书导入到JVM信任库、查看占用端口的进程以及网络连通性测试等常见网络管理任务。

被折叠的 条评论
为什么被折叠?



